请参照以前的博文,配置好DNS和基本的Apache服务:
DNS文章:http://iminmin.blog.51cto.com/689308/162631(正向解析)
http://iminmin.blog.51cto.com/689308/193710 (反向解析)
Apache文章:http://iminmin.blog.51cto.com/689308/192805
请按照上面的文章,或者自己搭建好基本的Apache服务并能正常访问。
1、安装mod_ssl模块,让Linux支持SSL:
yum install mod_ssl -y
2、创建证书和密钥文件:
cd /etc/pki/tls/certs
make httpd.crt //证书文件的名字可以随便写,扩展名不要变。最后会生成两个文件,一个证书文件.crt结尾,一个密钥.key结尾。
umask 77 ; \
/usr/bin/openssl genrsa -des3 1024 > links.key
Generating RSA private key, 1024 bit long modulus
...........................++++++
.........................++++++
e is 65537 (0x10001)
Enter pass phrase: //密码。
Verifying - Enter pass phrase: //确认密码和上面相同。
umask 77 ; \
/usr/bin/openssl req -utf8 -new -key links.key -x509 -days 365 -out lis.crt -set_serial 0
Enter pass phrase for httpd.key: //httpd.key 文件密码
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [GB]:GB
State or Province Name (full name) [Berkshire]:JIANGSU
Locality Name (eg, city) [Newbury]:XUZHOU
Organization Name (eg, company) [My Company Ltd]:QINGNIAO
Organizational Unit Name (eg, section) []:
Common Name (eg, your name or your server's hostname) []:www.rhce.cn//真实域名
Email Address []:root@rhce.cn
------------------------------------------------------------------------------------
3、编辑配置文件:/etc/http/conf .d/ssl.conf
×××和密钥文件的路径为我们创建的证书和密钥的所在位置。
SSLCertificateFile /etc/pki/tls/certs/httpd.crt
SSLCertificateKeyFile /etc/pki/tls/certs/httpd.key
停止 httpd: [确定]
启动 httpd:Apache/2.2.3 mod_ssl/2.2.3 (Pass Phrase Dialog)
Some of your private key files are encrypted for security reasons.
In order to read them you have to provide the pass phrases.
Enter pass phrase: //输入我们创建证书和密钥时的密码。
[确定]