一、詳細描述一次加密通信的過程,結合圖示最佳。git
二、描述建立私有CA的過程,以及爲客戶端發來的證書請求進行辦法證書。bash
三、搭建一套DNS服務器,負責解析magedu.com域名(自行設定主機名及IP)服務器
(1)、可以對一些主機名進行正向解析和逆向解析;session
(2)、對子域cdn.magedu.com進行子域受權,子域負責解析對應子域中的主機名;ide
(3)、爲了保證DNS服務系統的高可用性,請設計一套方案,並寫出詳細的實施過程測試
第一步,配置主配置文件/etc/named.confui
// // named.conf // // Provided by Red Hat bind package to configure the ISC BIND named(8) DNS // server as a caching only nameserver (as a localhost DNS resolver only). // // See /usr/share/doc/bind*/sample/ for example named configuration files. // options { // listen-on port 53 { 127.0.0.1; }; //監聽本地端口 listen-on-v6 port 53 { ::1; }; directory "/var/named"; dump-file "/var/named/data/cache_dump.db"; statistics-file "/var/named/data/named_stats.txt"; memstatistics-file "/var/named/data/named_mem_stats.txt"; allow-query { any; }; //容許查詢 /* - If you are building an AUTHORITATIVE DNS server, do NOT enable recursion. - If you are building a RECURSIVE (caching) DNS server, you need to enable recursion. - If your recursive DNS server has a public IP address, you MUST enable access control to limit queries to your legitimate users. Failing to do so will cause your server to become part of large scale DNS amplification attacks. Implementing BCP38 within your network would greatly reduce such attack surface */ recursion yes;//是否遞歸 若是是no 那麼這臺DNS服務器講不會解析 yes或註釋掉不寫,默認是容許; dnssec-enable no; dnssec-validation no; /* Path to ISC DLV key */ bindkeys-file "/etc/named.iscdlv.key"; managed-keys-directory "/var/named/dynamic"; pid-file "/run/named/named.pid"; session-keyfile "/run/named/session.key"; }; logging { channel default_debug { file "data/named.run"; severity dynamic; }; }; zone "." IN { type hint; file "named.ca"; }; include "/etc/named.rfc1912.zones"; //區域配置文件 include "/etc/named.root.key";
第二步,添加magedu.com的正反向解析加密
zone "magedu.com" IN { type master; file "magedu.com.zone"; allow-transfer { 192.168.0.103; }; }; zone "0.168.192.in-addr.arpa" IN { type master; file "0.168.192.zone"; allow-transfer { 192.168.0.103; }; };
第三步,添加正反方向區域文件spa
$TTL 1D $ORIGIN magedu.com. @ IN SOA ns1.magedu.com. admin.magedu.com. ( 2016102901 1H 5M 7D 12H ) IN NS ns1 IN NS ns2 IN MX 10 mx1 ns1 IN A 192.168.0.102 ns2 IN A 192.168.0.103 mx1 IN A 192.168.0.102 www IN A 192.168.0.102 cdn IN CNAME 192.168.0.111 ftp IN CNAME www
$TTL 86400debug
$ORIGIN 0.168.192.in-addr.arpa.
@ IN SOA ns1.magedu.com. admin.magedu.com. (
2016102601
1H
5M
7D
12H )
IN NS ns1.magedu.com.
@ IN NS ns2.magedu.com.
102 IN PTR ns1.magedu.com.
103 IN PTR ns2.magedu.com.
102 IN PTR www.magedu.com.
102 IN PTR mx1.magedu.com.
111 IN PTR cdn.magedu.com
第四步,重啓服務
[root@localhost ~]# systemctl restart named.service
第五步,測試
[root@localhost ~]# dig -t [root@localhost ~]# dig -x 192.168.0.111@cdn.magedu.com
四、請描述一次完整的http請求處理過程;