栏目分类:
子分类:
返回
名师互学网用户登录
快速导航关闭
当前搜索
当前分类
子分类
实用工具
热门搜索
名师互学网 > IT > 前沿技术 > 大数据 > 大数据系统

使用 Let‘s Encrypt 通配符 HTTPS 证书 tomcat,rabbitmq源码分析

使用 Let‘s Encrypt 通配符 HTTPS 证书 tomcat,rabbitmq源码分析

首先给系统添加 epel 源。

curl -o /etc/yum.repos.d/epel-7.repo https://mirrors.aliyun.com/repo/epel-7.repo

安装证书申请工具 Certbot。

yum install -y certbot

2.3、证书申请


hlvy.com是域名  比如www.baidu.com    需要填写baidu.com就好了  可以匹配任意xxx.baidu.com

certbot certonly -d *.hlvy.com --manual

–preferred-challenges dns

–server https://acme-v02.api.letsencrypt.org/directory

  • –manual交互式获取,

  • –preferred-challenges dns使用DNS验证的方式(泛域名只能使用DNS验证),如果取消此选项,将会默认使用 http 形式认证(.well-known),

  • –server指明支持acme-v02的Server地址,默认是acme-v01的地址。

申请过程如下,为了确保域名是

《一线大厂Java面试题解析+后端开发学习笔记+最新架构讲解视频+实战项目源码讲义》

【docs.qq.com/doc/DSmxTbFJ1cmN1R2dB】 完整内容开源分享

在你的管理权限之内,我们中间需要做一条 TXT 的 DNS 解析。

Saving debug log to /var/log/letsencrypt/letsencrypt.log

Plugins selected: Authenticator manual, Installer None

Enter email address (used for urgent renewal and security notices) (Enter ‘c’ to

cancel): wangzan18@126.com

Starting new HTTPS connection (1): acme-v02.api.letsencrypt.org


Please read the Terms of Service at

https://letsencrypt.org/documents/LE-SA-v1.2-November-15-2017.pdf. You must

agree in order to register with the ACME server at

https://acme-v02.api.letsencrypt.org/directory


(A)gree/©ancel: A


Would you be willing to share your email address with the Electronic Frontier

Foundation, a founding partner of the Let’s Encrypt project and the non-profit

organization that develops Certbot? We’d like to send you email about our work

encrypting the web, EFF news, campaigns, and ways to support digital freedom.


(Y)es/(N)o: N

Obtaining a new certificate

Performing the following challenges:

dns-01 challenge for wzlinux.com


NOTE: The IP of this machine will be publicly logged as having requested this

certificate. If you’re running certbot in manual mode on a machine that is not

your server, please ensure you’re okay with that.

Are you OK with your IP being logged?


(Y)es/(N)o: Y


Please deploy a DNS TXT record under the name

_acme-challenge.wzlinux.com with the following value:

EFC5zDV4Yyz1DY6796qHlUCS-TBWQCuxj3Re_-kTiiI

Before continuing, verify the record is deployed.


Press Enter to Continue

Waiting for verification…

Cleaning up challenges

Resetting dropped connection: acme-v02.api.letsencrypt.org

importANT NOTES:

  • Congratulations! Your certificate and chain have been saved at:

/etc/letsencrypt/live/hlvy.com/fullchain.pem

Your key file has been saved at:

/etc/letsencrypt/live/hlvy.com/privkey.pem

Your cert will expire on 2019-09-04. To obtain a new or tweaked

version of this certificate in the future, simply run certbot

again. To non-interactively renew all of your certificates, run

“certbot renew”

  • Your account credentials have been saved in your Certbot

configuration directory at /etc/letsencrypt. You should make a

secure backup of this folder now. This configuration directory will

also contain certificates and private keys obtained by Certbot so

making regular backups of this folder is ideal.

  • If you like Certbot, please consider supporting our work by:

Donating to ISRG / Let’s Encrypt: https://letsencrypt.org/donate

Donating to EFF: https://eff.org/donate-le

我们看到上面有一条 DNS 解析需求,我这里是在阿里云进行设定的。  在执行到Press Enter to Continue先别敲回车

先在阿里云配置域名

EFC5zDV4Yyz1DY6796qHlUCS-TBWQCuxj3Re_-kTiiI 这个是解析路径 是复制上面生成出来的

解析好之后,我们在服务器上面验证一下解析记录。

[root@ip-172-26-5-120 ~]# dig -t txt _acme-challenge.hlvy.com

; <<>> DiG 9.9.4-RedHat-9.9.4-73.el7_6 <<>> -t txt _acme-challenge.hlvy.com

;; global options: +cmd

;; Got answer:

;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 47252

;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:

; EDNS: version: 0, flags:; udp: 4096

;; QUESTION SECTION:

;_acme-challenge.hlvy.com.INTXT

;; ANSWER SECTION:

acme-challenge.hlvy.com. 58INTXT"EFC5zDV4Yyz1DY6796qHlUCS-TBWQCuxj3Re-kTiiI"

;; Query time: 0 msec

;; SERVER: 172.26.0.2#53(172.26.0.2)

;; WHEN: Thu Jun 06 07:04:07 UTC 2019

;; MSG SIZE rcvd: 112

2.4、证书查看


[root@ip-172-26-5-120 ~]# ll /etc/letsencrypt/live/hlvy.com/

total 4

lrwxrwxrwx. 1 root root 35 Jun 6 06:53 cert.pem -> …/…/archive/hlvy.com/cert1.pem

lrwxrwxrwx. 1 root root 36 Jun 6 06:53 chain.pem -> …/…/archive/hlvy.com/chain1.pem

lrwxrwxrwx. 1 root root 40 Jun 6 06:53 fullchain.pem -> …/…/archive/hlvy.com/fullchain1.pem

lrwxrwxrwx. 1 root root 38 Jun 6 06:53 privkey.pem -> …/…/archive/hlvy.com/privkey1.pem

-rw-r–r--. 1 root root 692 Jun 6 06:53 README

Tomcat7配置Let’s Encrypt免费SSL证书

从上图(证书获取成功的提示信息)可以看出,获取到的 Let’s Encrypt 证书保存在 /etc/letsencrypt/live/hlvy.com/ 目录下,相关的证书文件有4个:

cert.pem

chain.pem

fullchain.pem

privkey.pem

我们需要用到的是后面两个证书文件: fullchain.pem 和 privkey.pem。接下来,还需要用到 Linux 下的 openssl 和 keytool 工具,将SSL证书由 .pem 格式转换成 Tomcat 所支持的 .jks 格式。

导出.p12格式的证书

$ openssl pkcs12 -export -in fullchain.pem -inkey privkey.pem -out hlvy_letsencrypt.p12 -name tomcat_letsencrypt

再将证书由.p12格式转换成.jks格式

$ keytool -importkeystore -deststorepass ‘123456’ -destkeypass ‘123456’ -destkeystore hlvy_letsencrypt.jks -srckeystore zyxx_letsencrypt.p12 -srcstoretype PKCS12 -srcstorepass ‘123456’ -alias tomcat_letsencrypt

转载请注明:文章转载自 www.mshxw.com
本文地址:https://www.mshxw.com/it/676378.html
我们一直用心在做
关于我们 文章归档 网站地图 联系我们

版权所有 (c)2021-2022 MSHXW.COM

ICP备案号:晋ICP备2021003244-6号