製做證書以及Tomcat配置php
cd /d e:\temp\openssl_ca mkdir certs mkdir crl mkdir newcerts mkdir private
cd /d e:\temp\openssl_ca echo 0 > index.txt echo 01 > serial openssl rand -out private/.rand 1000
openssl genrsa -des3 -out private/ca.key.pem 2048
openssl req -new -key private/ca.key.pem -out newcerts/ca.csr -subj "/C=CN/ST=GD/L=SZ/O=oseye/OU=oseye/CN=*.oseye.net"
openssl x509 -req -days 100000 -sha1 -signkey private/ca.key.pem -in newcerts/ca.csr -out certs/ca.cer
openssl genrsa -des3 -out private/mobile.key.pem 2048
openssl req -new -key private/mobile.key.pem -out newcerts/mobile.csr -subj "/C=CN/ST=GD/L=SZ/O=oseye/OU=oseye/CN=mobile.oseye.net"
openssl x509 -req -days 100000 -sha1 -CA certs/ca.cer -CAkey private/ca.key.pem -CAserial ca.srl -CAcreateserial -in newcerts/mobile.csr -out certs/mobile.cer
openssl x509 -req -days 100000 -sha512 -CA certs/ca.cer -CAkey private/ca.key.pem -CAserial ca.srl -CAcreateserial -in newcerts/mobile.csr -out certs/mobile.cer
openssl pkcs12 -export -clcerts -inkey private/mobile.key.pem -in certs/mobile.cer -out certs/mobile.p12
keytool -list -keystore certs/mobile.p12 -storetype pkcs12 -v -storepass oseyep12
<Connector port="8443" protocol="HTTP/1.1" SSLEnabled="true" maxThreads="150" scheme="https" secure="true" clientAuth="false" sslProtocol="TLS" keystoreFile="/var/oseye2.0/certs/mobile.p12" keystorePass="oseyep12" keystoreType="PKCS12" />
<security-constraint> <web-resource-collection > <web-resource-name >SSL</web-resource-name> <url-pattern>/*</url-pattern> </web-resource-collection> <user-data-constraint> <transport-guarantee>CONFIDENTIAL</transport-guarantee> </user-data-constraint> </security-constraint>
Tomcat在debian中的一點點PShtml
apt-get install tomcat7
TCP的三次握手以及狀態的補充 java
可參考TCP的狀態 (SYN, FIN, ACK, PSH, RST, URG)和TCP協議中的三次握手和四次揮手(圖解)。 web