设为首页 收藏本站
查看: 1709|回复: 0

[经验分享] 基于openssl的https服务配置

[复制链接]
累计签到:1 天
连续签到:1 天
发表于 2016-2-22 09:34:06 | 显示全部楼层 |阅读模式
CA服务器:192.168.75.131
httpd服务器:192.168.75.128

操作系统版本:redhat 6.5(x_86_64)


一、安装openssl
1、源码安装:
openssl :wget http://www.openssl.org/source/openssl-1.0.0a.tar.gz

# tar xvf openssl-1.0.0a.tar.gz
# cd openssl-1.0.0a
# ./config --prefix=/usr/local/openssl
# make && make install

2、RPM安装
yum install openssl openssl-devel -y

二、安装Apache

1、源码安装httpd 参考:编译安装Apache(httpd-2.4.18)
--enable-so #动态模块支持
--enable-ssl #开启ssl模块支持
--with-ssl=/usr/local/openssl 使用编译版本的openssl,如果不指定,则使用RPM版本的openssl

编译参数:
./configure --prefix=/usr/local/apache  --enable-so --enable-ssl --enable-cgi --enable-rewrite --with-zlib --with-pcre=/usr/local/pcre --with-apr=/usr/local/apr --with-apr-util=/usr/local/apr-util --enable-mpms-shared=all  --with-mpm=event  --enable-proxy --enable-proxy-http --enable-proxy-ajp   --enable-proxy-balancer   --enable-lbmethod-heartbeat --enable-heartbeat  --enable-slotmem-shm  --enable-slotmem-plain  --enable-watchdog    --with-ssl=/usr/local/openssl

2、RPM包安装httpd

需要安装mod_ssl模块
# yum install httpd   mod_ssl  -y

三、CA服务器生成自签证书(在CA服务器:192.168.75.131上操作)
# yum install openssl -y
# cd /etc/pki/CA/
# (umask 077;openssl genrsa -out private/cakey.pem 2048)   #生成私钥

# ll private/
total 4
-rw-------. 1 root root 1679 Feb 18 17:49 cakey.pem

生成自签证书的时候会有很多选项需要填写,如果不想填,可以编辑配置文件,更换默认值

# cd  ../tls/
# diff openssl.cnf openssl.cnf.orig
130c130
< countryName_default= CN
---
> countryName_default= XX
135c135
< stateOrProvinceName_default= GuangDong
---
> #stateOrProvinceName_default= Default Province
138c138
< localityName_default= ShenZhen
---
> localityName_default= Default City
141c141
< 0.organizationName_default= SmallFish Company Ltd
---
> 0.organizationName_default= Default Company Ltd
148c148
< organizationalUnitName_default= Tech
---
> #organizationalUnitName_default=


# vim ../tls/openssl.cnf  #保证dir是在/etc/pki/CA目录
[ CA_default ]


dir             = /etc/pki/CA           # Where everything is kept

# openssl req -new -x509 -key private/cakey.pem  -out cacert.pem -days 3665  #根据私钥给自己生成一个自签证书,这个证书可以给用户使用的

You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [CN]:
State or Province Name (full name) [GuangDong]:
Locality Name (eg, city) [ShenZhen]:
Organization Name (eg, company) [SmallFish Company Ltd]: #给别人签发的公司也必须是这个
Organizational Unit Name (eg, section) [Tech]:
Common Name (eg, your name or your server's hostname) []:ca.smallfish.com #发给自己的证书
Email Address []:admin@smallfish.com


# cd /etc/pki/CA/
# touch index.txt
# echo 00 >serial

# tree .
.
├── cacert.pem
├── certs
├── crl
├── index.txt
├── newcerts
├── private
│   └── cakey.pem
└── serial


四、web服务器端,生成证书颁发请求(在192.168.75.128上操作)
# cd /usr/local/apache/conf
# mkdir ssl
# cd ssl/
#(umask 077;openssl genrsa 1024 > httpd.key)  #生成密钥
Generating RSA private key, 1024 bit long modulus
.......++++++
.............................++++++
e is 65537 (0x10001)

# ll
total 4
-rw-------. 1 root root 887 Feb  8 18:40 httpd.key



# openssl req -new -key httpd.key -out httpd.csr #生成证书申请请求
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [XX]:CN #信息必须和CA端保持一致
State or Province Name (full name) []:GuangDong #信息必须和CA端保持一致
Locality Name (eg, city) [Default City]:ShenZhen #信息必须和CA端保持一致
Organization Name (eg, company) [Default Company Ltd]:SmallFish Company Ltd #必须是CA证书中填写的是同一个公司,不如后面生成公司证书的时候会报错
Organizational Unit Name (eg, section) []:Tech
Common Name (eg, your name or your server's hostname) []:www.vip.com
Email Address []:www.vip.com

Please enter the following 'extra' attributes
to be sent with your certificate request
A challenge password []:
An optional company name []:
[iyunv@master ssl]#



# scp  httpd.csr 192.168.75.131:/tmp #用U盘拷贝,发邮件都可以


五、CA服务器签发证书(在CA服务器:192.168.75.131上操作)


# openssl ca -in /tmp/httpd.csr -out /tmp/httpd.crt -days 3650   #CA进行签署证书,公司名称不一样,会报错
Using configuration from /etc/pki/tls/openssl.cnf
Check that the request matches the signature
Signature ok
The organizationName field needed to be the same in the
CA certificate (SmallFish Company Ltd) and the request (vip Ltd)



# openssl ca -in /tmp/httpd.csr -out /tmp/httpd.crt -days 3650   #CA进行签署证书
Using configuration from /etc/pki/tls/openssl.cnf
Check that the request matches the signature
Signature ok
Certificate Details:
        Serial Number: 0 (0x0)
        Validity
            Not Before: Feb 18 10:10:26 2016 GMT
            Not After : Feb 15 10:10:26 2026 GMT
        Subject:
            countryName               = CN
            stateOrProvinceName       = GuangDong
            organizationName          = SmallFish Company Ltd
            organizationalUnitName    = Tech
            commonName                = www.vip.com
            emailAddress              = www.vip.com
        X509v3 extensions:
            X509v3 Basic Constraints:
                CA:FALSE
            Netscape Comment:
                OpenSSL Generated Certificate
            X509v3 Subject Key Identifier:
                68:4F:A6:95:E8:65:0D:FE:9E:E2:81:31:8A:AF:69:3A:4C:43:E0:94
            X509v3 Authority Key Identifier:
                keyid:AA:27:66:F1:0F:7A:7C:CA:CD:85:95:1F:D5:92:5A:36:23:FE:1A:36

Certificate is to be certified until Feb 15 10:10:26 2026 GMT (3650 days)
Sign the certificate? [y/n]:y


1 out of 1 certificate requests certified, commit? [y/n]y
Write out database with 1 new entries
Data Base Updated

# cat index.txt
V260215101026Z00unknown/C=CN/ST=GuangDong/O=SmallFish Company Ltd/OU=Tech/CN=www.vip.com/emailAddress=www.vip.com

# cat serial
01

# tree .
.
├── cacert.pem
├── certs
├── crl
├── index.txt
├── index.txt.attr
├── index.txt.old
├── newcerts
│   └── 00.pem
├── private
│   └── cakey.pem
├── serial
└── serial.old

4 directories, 8 files


# scp /tmp/httpd.crt 192.168.75.128:/usr/local/apache/conf/ssl #拷贝证书到Web服务器

# rm /tmp/httpd.crt /tmp/httpd.csr  #CA服务器端制作完毕之后可以删除掉web服务器端证书

六、web服务器端配置openssl(在192.168.75.128上操作)
vim /usr/local/apache/conf/extra/httpd-ssl.conf

<VirtualHost _default_:443>

DocumentRoot "/usr/local/apache/htdocs"  #和80端口文档目录的保持一致,不然和80访问的内容不一样
ServerName www.vip.com:443
ServerAdmin admin@vip.com
ErrorLog "/usr/local/apache/logs/error_log"
TransferLog "/usr/local/apache/logs/access_log"


SSLEngine on


SSLCertificateFile "/usr/local/apache/conf/ssl/httpd.crt"
SSLCertificateKeyFile "/usr/local/apache/conf/ssl/httpd.key"


# vim /usr/local/apache/conf/httpd.conf #打开下面的注释

LoadModule socache_shmcb_module modules/mod_socache_shmcb.so
LoadModule ssl_module modules/mod_ssl.so
LoadModule slotmem_shm_module modules/mod_slotmem_shm.so
Include conf/extra/httpd-ssl.conf


# /usr/local/apache/bin/httpd -t
Syntax OK

# httpd -M| grep ssl_mod   #查看是否支持ssl_module
ssl_module (shared)

# /usr/local/apache/bin/apachectl start
# lsof -i:80
COMMAND   PID   USER   FD   TYPE DEVICE SIZE/OFF NODE NAME
httpd   13445   root    4u  IPv6 349321      0t0  TCP *:http (LISTEN)
httpd   13446 daemon    4u  IPv6 349321      0t0  TCP *:http (LISTEN)
httpd   13447 daemon    4u  IPv6 349321      0t0  TCP *:http (LISTEN)
httpd   13448 daemon    4u  IPv6 349321      0t0  TCP *:http (LISTEN)
# lsof -i:443
COMMAND   PID   USER   FD   TYPE DEVICE SIZE/OFF NODE NAME
httpd   13445   root    6u  IPv6 349329      0t0  TCP *:https (LISTEN)
httpd   13446 daemon    6u  IPv6 349329      0t0  TCP *:https (LISTEN)
httpd   13447 daemon    6u  IPv6 349329      0t0  TCP *:https (LISTEN)
httpd   13448 daemon    6u  IPv6 349329      0t0  TCP *:https (LISTEN)

七、访问验证
1、在win hosts文件中添加
C:\WINDOWS\System32\drivers\etc\hosts
192.168.85.128 www.vip.com


2、安装证书
拷贝CA服务器中的证书(/etc/pki/CA/cacert.pem)到客户端,重命名为cacert.crt,双击运行安装,导入到浏览器,用浏览器打开
wKiom1bGu-GQy7nDAAAG6I303R4809.jpg

wKioL1bGn5igpqQrAABwPNJi-4I005.jpg


wKiom1bGn0jD-M97AABiU6laGfM851.jpg

wKioL1bGn8DA5vnvAACDnTbH3cI407.jpg



wKiom1bGn2vBJqSzAABR8uN5NzE909.jpg




3、访问:
https://www.vip.com/

wKioL1bGoE-xi1uzAABupoXUnvg020.jpg

wKiom1bGn_miNLlmAAAoT9uYy1k547.jpg
http://www.vip.com/

wKiom1bGnw7DO1b6AAARSAtyAeI570.jpg

八、遇到的问题
问题1:
# /usr/local/apache2/bin/apachectl start
AH00526: Syntax error on line 51 of /usr/local/apache2/conf/extra/httpd-ssl.conf:
Invalid command 'SSLCipherSuite', perhaps misspelled or defined by a module not included in the server configuration

解决1:
# vi /usr/local/apache2/conf/httpd.conf
LoadModule ssl_module modules/mod_ssl.so

问题2:
# /usr/local/apache2/bin/apachectl start
AH00526: Syntax error on line 76 of /usr/local/apache2/conf/extra/httpd-ssl.conf:
SSLSessionCache: 'shmcb' session cache not supported (known names: ). Maybe you need to load the appropriate socache module (mod_socache_shmcb?).

解决2:
# vi /usr/local/apache2/conf/httpd.conf
LoadModule socache_shmcb_module modules/mod_socache_shmcb.so

问题3:
The countryName field needed to be the same in the

CA certificate (cn) and the request (sh)

解决3:证书的国家名称,省名要相同

九、注意:
SSL会话不能基于主机名区分,服务器只有一个ip地址,只能为一个主机提供ssl的功能,如果有很多基于域名的虚拟主机,ssl只能提供给其中的一个虚拟主机使用


运维网声明 1、欢迎大家加入本站运维交流群:群②:261659950 群⑤:202807635 群⑦870801961 群⑧679858003
2、本站所有主题由该帖子作者发表,该帖子作者与运维网享有帖子相关版权
3、所有作品的著作权均归原作者享有,请您和我们一样尊重他人的著作权等合法权益。如果您对作品感到满意,请购买正版
4、禁止制作、复制、发布和传播具有反动、淫秽、色情、暴力、凶杀等内容的信息,一经发现立即删除。若您因此触犯法律,一切后果自负,我们对此不承担任何责任
5、所有资源均系网友上传或者通过网络收集,我们仅提供一个展示、介绍、观摩学习的平台,我们不对其内容的准确性、可靠性、正当性、安全性、合法性等负责,亦不承担任何法律责任
6、所有作品仅供您个人学习、研究或欣赏,不得用于商业或者其他用途,否则,一切后果均由您自己承担,我们对此不承担任何法律责任
7、如涉及侵犯版权等问题,请您及时通知我们,我们将立即采取措施予以解决
8、联系人Email:admin@iyunv.com 网址:www.yunweiku.com

所有资源均系网友上传或者通过网络收集,我们仅提供一个展示、介绍、观摩学习的平台,我们不对其承担任何法律责任,如涉及侵犯版权等问题,请您及时通知我们,我们将立即处理,联系人Email:kefu@iyunv.com,QQ:1061981298 本贴地址:https://www.yunweiku.com/thread-181163-1-1.html 上篇帖子: 部署Apache网站服务 下篇帖子: Apache的三种工作模式
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

扫码加入运维网微信交流群X

扫码加入运维网微信交流群

扫描二维码加入运维网微信交流群,最新一手资源尽在官方微信交流群!快快加入我们吧...

扫描微信二维码查看详情

客服E-mail:kefu@iyunv.com 客服QQ:1061981298


QQ群⑦:运维网交流群⑦ QQ群⑧:运维网交流群⑧ k8s群:运维网kubernetes交流群


提醒:禁止发布任何违反国家法律、法规的言论与图片等内容;本站内容均来自个人观点与网络等信息,非本站认同之观点.


本站大部分资源是网友从网上搜集分享而来,其版权均归原作者及其网站所有,我们尊重他人的合法权益,如有内容侵犯您的合法权益,请及时与我们联系进行核实删除!



合作伙伴: 青云cloud

快速回复 返回顶部 返回列表