pki

kubernetes实战(二十七):CentOS 8 二进制 高可用 安装 k8s 1.16.x

有些话、适合烂在心里 提交于 2019-12-03 09:36:52
1. 基本说明   本文章将演示CentOS 8二进制方式安装高可用k8s 1.16.x,相对于其他版本,二进制安装方式并无太大区别。CentOS 8相对于CentOS 7操作更加方便,比如一些服务的关闭,无需修改配置文件即可永久生效,CentOS 8默认安装的内核版本是4.18,所以在安装k8s的过程中也无需在进行内核升级,系统环境也可按需升级,如果下载的是最新版的CentOS 8,系统升级也可省略。 2. 基本环境配置   主机信息 192.168.1.19 k8s-master01 192.168.1.18 k8s-master02 192.168.1.20 k8s-master03 192.168.1.88 k8s-master-lb 192.168.1.21 k8s-node01 192.168.1.22 k8s-node02   系统环境 [root@k8s-master01 ~]# cat /etc/redhat-release CentOS Linux release 8.0.1905 (Core) [root@k8s-master01 ~]# uname -a Linux k8s-master01 4.18.0-80.el8.x86_64 #1 SMP Tue Jun 4 09:19:46 UTC 2019 x86_64 x86_64 x86_64 GNU

Does X509TrustManagerImpl.checkServerTrusted() handle OCSP by itself if the appropriate properties are set?

烂漫一生 提交于 2019-12-03 09:11:00
public class CustomTrustManager implements X509TrustManager { private X509TrustManager trustManager; // If a connection was previously attempted and failed the certificate check, that certificate chain will be saved here. private Certificate[] rejectedCertificates = null; private Certificate[] encounteredCertificates = null; private KeyStore keyStore = null; private Logger logger; /** * Constructor * * @param loggerFactory * see {@link InstanceLoggerFactory} */ public CustomTrustManager(InstanceLoggerFactory loggerFactory) { try { this.logger = loggerFactory.getLogger(CustomTrustManager.class)

Find if a certificate is self signed or CA signed

霸气de小男生 提交于 2019-12-03 08:49:18
问题 I have a web app, which allows user to upload pkcs12. I store the pkcs12 as binary in database. Is there any way for me to know if the certificate in the pkcs12 is self signed or CA signed? I am running a Java web app on tomcat and have openssl at my disposal. 回答1: Edit: there are two better answers on this question today: https://stackoverflow.com/a/57927684/377270 https://stackoverflow.com/a/14515875/377270 However, I think there's something more important to address -- why would one want

YumRepo Error: All mirror URLs are not using ftp, http[s] or file

匿名 (未验证) 提交于 2019-12-03 08:35:02
可以将文章内容翻译成中文,广告屏蔽插件可能会导致该功能失效(如失效,请关闭广告屏蔽插件后再试): 问题: I have set up a centOS 6.5 server using VMWare Workstation 9 on a Windows 8.1 host laptop. When trying to use yum to install packages I get the following error: [root@localhost ~]# yum update Loaded plugins: fastestmirror Loading mirror speeds from cached hostfile YumRepo Error: All mirror URLs are not using ftp, http[s] or file. Eg. </html>/ removing mirrorlist with no valid mirrors: /var/cache/yum/i386/6/base/mirrorlist.txt Error: Cannot find a valid baseurl for repo: base The VM works on other machines ( Windows 7 desktop and an Windows 8

How does one access the raw ECDH public key, private key and params inside OpenSSL's EVP_PKEY structure?

二次信任 提交于 2019-12-03 07:07:48
问题 I'm using OpenSSL's c library to generate an elliptic curve Diffie-Hellman (ECDH) key pair, following the first code sample here. It glosses over the actual exchange of public keys with this line: peerkey = get_peerkey(pkey); The pkey variable and the return value are both of type EVP * . pkey contains the public key, private key, and params generated earlier, and the return value only contains the peer's public key. So this raises three questions: How would get_peerkey() actually extract

OpenSSL Version V3 with Subject Alternative Name

柔情痞子 提交于 2019-12-03 04:59:03
问题 I'm using the OpenSSL command line tool to generate a self signed certificate. It seems to be working correctly except for two issues. I can't get it to create a .cer with a Subject Alternative Name (critical) and I haven't been able to figure out how to create a cert that is Version 3 (not sure if this is critical yet but would prefer learning how to set the version). Has anyone done this successfully? The default config (.cfg) file has seemingly clear documentation (seen below): " This

cURL SSL connect error 35 with NSS error -5961

匿名 (未验证) 提交于 2019-12-03 02:05:01
可以将文章内容翻译成中文,广告屏蔽插件可能会导致该功能失效(如失效,请关闭广告屏蔽插件后再试): 问题: I have a remote Windows 7 server that is accessible only via HTTPS on port 768. The server is using a signed certificate from a CA listed in the local CentOS server. Whenever I try to access the remote server via cURL using the following command, it errors out as follows: [usr@serv certs]# curl -3 -v https://1.1.1.1:768/user/login * About to connect() to 1.1.1.1 port 768 (#0) * Trying 1.1.1.1... connected * Connected to 1.1.1.1 (1.1.1.1) port 768 (#0) * Initializing NSS with certpath: sql:/etc/pki/nssdb * CAfile: /etc/pki/tls/certs/ca-bundle

邮件TLS/SSL加密通信

匿名 (未验证) 提交于 2019-12-03 00:39:02
案例1:邮件TLS/SSL加密通信 1 案例1:邮件TLS/SSL加密通信 1.1 问题 本案例要求为基于Postfix+Dovecot的邮件服务器提供加密通信支持,主要完成以下任务操作: 为SMTP服务(postfix)添加TLS/SSL加密通信支持 基于dovecot配置POP3s+IMAPS加密通信支持 客户端收发信测试,确保加密的邮件通信可用 1.2 方案 使用两台RHEL7虚拟机,其中svr7作为CA服务器,而mail作为测试用的Postfix+Dovecot邮件服务器。另外可准备一台pc120作为收发邮件的Windows测试机,安装邮件客户端软件或Outlook 2010。 1.3 步骤 实现此案例需要按照如下步骤进行。 步骤一:准备一个简单的Postfix+Dovecot邮件服务器,支持SMTP认证 1) 快速安装邮件相关软件、添加邮箱账号 确认已安装postfix、dovecot、cyrus-sasl软件包,启动saslauthd服务: [root@www ~]# yum -y install postfix dovecot cyrus-sasl .. .. [root@www ~]# vim /etc/sasl2/smtpd.conf pwcheck_method: saslauthd mech_list: plain login [root@www ~]#

Hyperledger Fabric中的Identity

匿名 (未验证) 提交于 2019-12-03 00:37:01
区块链网络中存在如下的角色:peers, orderers, client application, administrators等等。每一个这样的角色都有一个身份标识(Identity),该身份标识是通过X.509 数字证书来表示的。这些身份标识决定了该角色的对区块链网络上资源的权限,比如是否有权限访问区块链上的某种信息。 数字身份有很多附加属性,供fabric来判断权限。数字身份给出了一个身份的组合结构,与之相关的属性称之为principal。Principals 就像用户ID或者是群组ID,但是更加复杂,因为principal中包含了该角色的一系列属性信息。当我们谈论principal的时候,就是在说觉得角色权限的各种属性信息。 为了保证身份(identity)是可以被验证的,Identity必须来自于一个受信任的颁发机构。在Fabric中,这是通过membership service provider (MSP) 来实现的。MSP是Fabric中的一个组件,它定义了管理有效identity的规则。Fabric中默认的MSP实现是使用X.509证书作为identity,采用传统的PKI(Public Key Infrastructure )结构模型。 假设你正在逛超市买东西,在买单时发现收银台只支持银联和visa的银行卡。这时如果你想使用一张不属于银联和visa的卡来支付

Find if a certificate is self signed or CA signed

情到浓时终转凉″ 提交于 2019-12-03 00:25:12
I have a web app, which allows user to upload pkcs12. I store the pkcs12 as binary in database. Is there any way for me to know if the certificate in the pkcs12 is self signed or CA signed? I am running a Java web app on tomcat and have openssl at my disposal. Edit: there are two better answers on this question today: https://stackoverflow.com/a/57927684/377270 https://stackoverflow.com/a/14515875/377270 However, I think there's something more important to address -- why would one want to know about self-signed certificates. What's the goal? What problem is being solved? Probably trying to