264 words
1 minute
CA
快速生成自签证书
openssl req -x509 \ -newkey rsa:2048 \ -keyout /etc/nginx/ssl/service.lan.key \ -out /etc/nginx/ssl/service.lan.crt \ -days 365 \ -nodes \ -subj "/C=CN/ST=ShangHai/L=Shanghai/O=Myhomw/OU=Myhome/CN=*.service.lan" \ -addext "subjectAltName = DNS:*.service.lan,DNS:service.lan # req -x509 创建一个自签名的X.509证书 # -nodes 私钥文件不加密创建本地CA并签发证书
- 创建目录
sudo mkdir -p /etc/nginx/ssl/service.lancd /etc/nginx/ssl/service.lan- 创建本地CA
- 生成CA私钥
sudo openssl genrsa -out ca.key 4096- 生成CA根证书
sudo openssl req -x509 -new -nodes -key ca.key -days 3650 -out ca.crt \-subj "/C=CN/ST=ShangHai/L=Shanghai/O=LocalCA/OU=Dev/CN=Local Root CA"# ca.crt是要导入到浏览器的根证书- 为域名生成证书请求(CSR)
- 生成服务私钥
sudo openssl genrsa -out service.lan.key 2048- 创建一个service.lan.conf,指定SAN
[req]default_bits = 2048prompt = nodefault_md = sha256req_extensions = req_extdistinguished_name = dn
[dn]C=CNST=ShanghaiL=ShanghaiO=MyhomeOU=MyhomeCN=app.service.lan
[req_ext]subjectAltName = @alt_name
[alt_name]DNS.1 = app.service.lanDNS.2 = *.service.lan- 生成CSR
sudo openssl req -new -key service.lan.key -out service.lan.csr -config service.lan.conf- 用CA签发证书
sudo openssl x509 -req -in service.lan.csr -CA ca.crt -CAkey ca.key -CAcreateserial \-out service.lan.crt -days 3650 -sha256 -extensions req_ext -extfile service.lan.conf- 导入证书
- 将证书下载到主机上,用浏览器导入后重启打开网站就不会显示不安全。
Some information may be outdated