1、下载 mod_ssl 和 apache
登入http://www.modssl.org/source/,下载
mod_ssl-2.8.31-1.3.41.targz;
2.8.31是mod_ssl版本号;1.3.41是apache版本号(mod_ssl和apache是一一对应的)
apache_1.3.41.tar.gz (https://archive.apache.org/dist/httpd/)
2、下载openssl
openssl-0.9.6.tar.gz (http://www.openssl.org/source/openssl-0.9.6.tar.gz)
[注意:
将下载好的压缩包统一放在/usr/local/src/下(便于管理接下来的配置)]
解压
tar zxvf *.tar.gz
安装
一、配置apache
# cd /usr/local/src/apache_1.3.41
# ./configure --prefix=/usr/local/apache
二、编译openssl
# cd ../openssl-0.9.6
# ./config --prefix=/usr/local/openssl
[注意:这里是 config 而不是 configure。]
# make
# make test
# make install
make[1]: gcc: Command not found, download gcc http://ftp.gnu.org/gnu.
三、配置mod_ssl
# cd ../mod_ssl-2.8.31-1.3.41
# ./configure --with-apache=../apache_1.3.41
四、编译apache
# cd ../apache_1.3.41
# SSL_BASE=../openssl-0.9.6
#./configure --prefix=/usr/local/apache --enable-module=ssl --enable-shared=ssl
# make
五、生成CA
# make certificate TYPE=custom
这一步要生成你自己的 CA (如果你不知道,我也不能细说了,简单地 说就是认证中心),和用它来为你的服务器签署证书。 有很多东西要输入。
______________________________________________________________________
STEP 0: R选择算法,使用缺省的 RSA
______________________________________________________________________
STEP 1: 生成 ca.key,CA的私人密钥
______________________________________________________________________
STEP 2: Generating X.509 certificate signing request for CA [ca.csr]
You are about to be asked to enter information that will be incorporated
into your certificate request.
(为CA生成X.509的认证请求 ca.csr 要输入一些信息)
Country Name: cn 国家代码,两个字母
State or Provice name: fujain省份
Locality Name: xiamen城市名
Organization Name: home CA 组织名,随便写吧
Organization Unit Name: home CA
Common Name: home CA
Email Address: [email protected]我的Email
Certificate Validity: 4096 四千多天,够了吧
______________________________________________________________________
STEP 3: Generating X.509 certificate for CA signed by itself [ca.crt]
Certificate Version (1 or 3) [3]:1
______________________________________________________________________
STEP 4: Generating RSA private key for SERVER (1024 bit) [server.key]
(生成服务器的私人密钥,server.key)
______________________________________________________________________
STEP 5: Generating X.509 certificate signing request for SERVER [server.csr]
You are about to be asked to enter information that will be incorporated
into your certificate request.
(生成服务器的认证请求,server.csr 要输入一些信息,和STEP 2类似)
[注意:
Common Name是你的网站域名,如 www.mydomain.com
Certificate Validity不要太大,365就可以了]
Country Name: cn
State or Provice name: fujain
Locality Name: xiamen
Organization Name: home
Organization Unit Name: home
Common Name: home
Email Address: [email protected]
Certificate Validity: 365
______________________________________________________________________
STEP 6: Generating X.509 certificate signed by own CA [server.crt]
Certificate Version (1 or 3) [3]:1
(为你的服务器签名,得到server.crt)
______________________________________________________________________
STEP 7: Enrypting RSA private key of CA with a pass phrase for security [ca.key]
(为你的 ca.key加密)
Encrypt the private key now? [Y/n]: y
______________________________________________________________________
STEP 8: Enrypting RSA private key of SERVER with a pass phrase for security [server.key]
(为你的 server.key加密)
Encrypt the private key now? [Y/n]: y
六、apache安装
# make install
七、配置http.conf
# vi /usr/local/apache/conf/httpd.conf
修改BindAddress 和 ServerName 加入关于PHP4的行 .如果要改变 DocumentRoot 要记得把httpd.conf里SSL Virtual Host Context部分的DocumentRoot设定也改掉。
SSLCertificateFile和SSLCertificatKeyFile的设定也在 SSL Virtual Host Context部分。 它可能是这样设定的:
SSLCertificateFile /usr/local/apache/conf/ssl.crt/server.crt
SSLCertificateKeyFile /usr/local/apache/conf/ssl.key/server.key
要注意ssl.key ssl.crt等目录和文件的权限! 所有的key,csr,crt,prm文件都应该设为 400 属性!
八、启动https端口
# cd /usr/local/apache
# bin/apachectl startssl
输入密码:ccy123
[错误:
#cd /usr/local/apache/bin
#apachectl startssl]
九、测试
#netstat -tunal |grep 443
linux上浏览器 / window 36浏览器输入:https://localhost/
[注意:
在window上的IE浏览器输入会报错]
虽然在安装MOD_SSL时已经使用 make certificate 命令建立了服务器 的证书签名,但是有时你可能需要改变它。
当然有很多自动的脚本可以实现它,但是最可靠的方法是手工签署 证书。
十、维护
1)/usr/local/openssl/bin加入 执行文件查找路径。
2)将MOD_SSL的源代码目录树下的pkg.contrib目录中,文件名为 sign.sh拷贝到 /usr/local/openssl/bin 中
十一、创建CA
1)先建立一个 CA 的证书,首先为 CA 创建一个 RSA 私用密钥
#cd /usr/local/openssl/bin#openssl genrsa -des3 -out ca.key 1024
#chmod 400 ca.key(生成 ca.key 文件属性改为400,并放在安全的地方)
#openssl rsa -noout -text -in ca.key(查看ca.key内容)
2)利用 CA 的 RSA 密钥创建一个自签署的 CA 证书(X.509结构)
#openssl req -new -x509 -days 3650 -key ca.key -out ca.crt然后需要输入下列信息:
Country Name: cn
State or Province Name: fujain
Locality Name: xiamen
Organization Name: Family home
Organizational Unit Name: home
Common Name: home
Email Address: [email protected]
#chmod 400 ca.crt
#openssl x509 -noout -text -in ca.crt
十二、创建服务器证书签署请求
1)首先为你的 Apache 创建一个 RSA 私用密钥:
#openssl genrsa -des3 -out server.key 1024#chmod 400 server.key
#openssl rsa -noout -text -in server.key
2)用server.key 生成证书签署请求 CSR.
#openssl req -new -key server.key -out server.csr#openssl req -noout -text -in server.csr
3)下面可以签署证书了,需要用到脚本 sign.sh
#./sign.sh server.csr(可以得到server.crt)#chmod 400 server.crt
#rm server.csr
十三、最后apache设置
如果你的apache编译参数prefix为/usr/local/apache,
拷贝server.crt 和 server.key 到 /usr/local/apache/conf .
修改httpd.conf 将下面的参数改为:
SSLCertificateFILE /usr/local/apache/conf/server.crt
SSLCertificateKeyFile /usr/local/apache/conf/server.key
十四、开启
#apachectl startssl
[注意:
配置修改后,必须重启apache才生效]