千家信息网

Apache httpd2.2版本以及2.4版本部分实验

发表于:2024-11-15 作者:千家信息网编辑
千家信息网最后更新 2024年11月15日,环境准备实验环境:主机IP描述192.168.5.181操作系统为CentOS7,安装httpd2.4版本192.168.5.121操作系统为CentOS6,安装httpd2.2版本,安装MySQL数
千家信息网最后更新 2024年11月15日Apache httpd2.2版本以及2.4版本部分实验


环境准备

实验环境:

主机IP描述
192.168.5.181操作系统为CentOS7,安装httpd2.4版本
192.168.5.121操作系统为CentOS6,安装httpd2.2版本,安装MySQL数据库
192.168.5.180测试用Linux系统,安装有curl工具
192.168.5.190测试用Linux系统,安装有curl工具
192.168.5.182CA证书颁发机构

在两台主机上面先清空防火墙规则,关闭Selinux,然后用yum安装httpd,在CentOS6上面,默认的Base源里面是httpd2.2版本;在CentOS7上面,默认的Base源里面是httpd2.4版本。

$ iptables -t filter -F$ setenforce 0$ yum install httpd在CentOS7上面查看httpd版本:$ yum info httpd | grep -i versionVersion     : 2.4.6在CentOS6上面查看httpd版本:$ yum info httpd | grep -i versionVersion     : 2.2.15


实验一:基于主机名称的虚拟主机
  • CentOS6, httpd2.2环境

在/etc/httpd/conf.d/目录下面添加一个新的配置项virtualhost.conf,编辑里面的内容如下所示,添加NameVirtualHost指令,指明用192.168.5.121:80作为基于FQDN的虚拟主机,添加两个VirtualHost配置段,分别使用www1.stuX.com和www2.stuX.com作为主机名

分别给两台虚拟主机自定义日志功能:
www1.stuX.com的访问日志是/web/vhosts/www1/access_log
www1.stuX.com的错误日志是/web/vhosts/www1/error_log
www2.stuX.com的访问日志是/web/vhosts/www2/access_log
www2.stuX.com的错误日志是/web/vhosts/www2/error_log
之后重启httpd服务:

$ cat /etc/httpd/conf.d/virtualhost.conf NameVirtualHost 192.168.5.121:80        ServerName www1.stuX.com        DocumentRoot "/web/vhosts/www1"        LogFormat "%h %u %t \"%r\" %>s \"%{Referer}i\" \"%{User-Agent}i\"" custom1        CustomLog /web/vhosts/www1/access_log custom1        ErrorLog /web/vhosts/www1/error_log                        Order allow,deny                Allow from all                ServerName www2.stuX.com        DocumentRoot "/web/vhosts/www2"        LogFormat "%h %u %t \"%r\" %>s \"%{Referer}i\" \"%{User-Agent}i\"" custom2        CustomLog /web/vhosts/www2/access_log custom2        ErrorLog /web/vhosts/www2/error_log                        Order allow,deny                Allow from all        $ service httpd start

创建/web/vhosts/www1和/web/vhosts/www2目录,分别在目录里面添加一个简单的测试页面:

$ mkdir -p /web/vhosts/www{1,2}$ echo "This is www1.stuX.com" > /web/vhosts/www1/index.html$ echo "This is www2.stuX.com" > /web/vhosts/www2/index.html
  • CentOS7, httpd2.4环境

同样在/etc/httpd/conf.d目录下面添加一个新的配置项virtualhost.conf。与CentOS6不同的是,省略掉了NameVirtualHost指令,并且ACL权限的配置也发生了变化。使用www3.stuX.com和www4.stuX.com作为主机名。
定义日志功能:
www3.stuX.com的访问日志是/web/vhosts/www3/access_log
www3.stuX.com的错误日志是/web/vhosts/www3/error_log
www4.stuX.com的访问日志是/web/vhosts/www4/access_log
www4.stuX.com的错误日志是/web/vhosts/www4/error_log
之后重启httpd.service

        ServerName www3.stuX.com        DocumentRoot "/web/vhosts/www3"        LogFormat "%h %u %t \"%r\" %>s \"%{Referer}i\" \"%{User-Agent}i\"" custom3        CustomLog /web/vhosts/www3/access_log custom3        ErrorLog /web/vhosts/www3/error_log                        Options None                AllowOverride None                                        Require all granted                        Require not ip 192.168.5.190                                ServerName www4.stuX.com        DocumentRoot "/web/vhosts/www4"        LogFormat "%h %u %t \"%r\" %>s \"%{Referer}i\" \"%{User-Agent}i\"" custom4        CustomLog /web/vhosts/www4/access_log custom3        ErrorLog /web/vhosts/www4/error_log                        Options None                AllowOverride None                Require all granted        

创建/web/vhosts/www3和/web/vhosts/www4目录,分别在目录里面添加一个简单的测试页面:

$ mkdir -p /web/vhosts/www{3,4}$ echo "This is www3.stuX.com" > /web/vhosts/www3/index.html$ echo "This is www4.stuX.com" > /web/vhosts/www4/index.html
  • 客户端测试
    在客户端配置/etc/hosts文件,用来解析主机名

root@alternative:~# cat /etc/hosts | grep -i www192.168.5.121   www1.stuX.com www2.stuX.com192.168.5.181   www3.stuX.com www4.stuX.com

通过客户端的测试,可以看到结果如下所示,完成了基于主机名的虚拟主机配置:

root@alternative:~# curl http://www1.stuX.comThis is www1.stuX.comroot@alternative:~# curl http://www2.stuX.comThis is www2.stuX.comroot@alternative:~# curl http://www3.stuX.comThis is www3.stuX.comroot@alternative:~# curl http://www4.stuX.comThis is www4.stuX.com伪装客户端和跳转地址root@alternative:~# curl -A "curl test" -e "http://www.baidu.com" http://www1.stuX.comThis is www1.stuX.comroot@alternative:~# curl -A "curl test2" -e "http://www.sina.com" http://www2.stuX.com     This is www2.stuX.comroot@alternative:~# curl -A "curl test3" -e "http://www.sohu.com" http://www3.stuX.com     This is www3.stuX.comroot@alternative:~# curl -A "curl test4" -e "http://www.163.com" http://www4.stuX.com     This is www4.stuX.com发起一些错误的请求,用来检测error_log是否生效root@alternative:~# curl http://www1.stuX.com/123404 Not Found

Not Found

The requested URL /123 was not found on this server.


Apache/2.2.15 (CentOS) Server at www1.stux.com Port 80
root@alternative:~# curl http://www2.stuX.com/456404 Not Found

Not Found

The requested URL /456 was not found on this server.


Apache/2.2.15 (CentOS) Server at www2.stux.com Port 80
root@alternative:~# curl http://www3.stuX.com/789404 Not Found

Not Found

The requested URL /789 was not found on this server.

root@alternative:~# curl http://www4.stuX.com/000404 Not Found

Not Found

The requested URL /000 was not found on this server.

查看一下访问日志以及错误日志:

$ tail -f /web/vhosts/www{1,2}/{access,error}_log==> /web/vhosts/www1/access_log <==192.168.5.180 - [02/Jun/2017:14:46:24 +0800] "GET / HTTP/1.1" 200 "-" "curl/7.22.0 (x86_64-pc-linux-gnu) libcurl/7.22.0 OpenSSL/1.0.1 zlib/1.2.3.4 libidn/1.23 librtmp/2.3"192.168.5.180 - [02/Jun/2017:14:46:40 +0800] "GET /123 HTTP/1.1" 404 "-" "curl/7.22.0 (x86_64-pc-linux-gnu) libcurl/7.22.0 OpenSSL/1.0.1 zlib/1.2.3.4 libidn/1.23 librtmp/2.3"192.168.5.180 - [02/Jun/2017:14:49:01 +0800] "GET / HTTP/1.1" 200 "http://www.baidu.com" "curl test"==> /web/vhosts/www1/error_log <==[Fri Jun 02 14:46:40 2017] [error] [client 192.168.5.180] File does not exist: /web/vhosts/www1/123==> /web/vhosts/www2/access_log <==192.168.5.180 - [02/Jun/2017:14:46:28 +0800] "GET / HTTP/1.1" 200 "-" "curl/7.22.0 (x86_64-pc-linux-gnu) libcurl/7.22.0 OpenSSL/1.0.1 zlib/1.2.3.4 libidn/1.23 librtmp/2.3"192.168.5.180 - [02/Jun/2017:14:46:52 +0800] "GET /456 HTTP/1.1" 404 "-" "curl/7.22.0 (x86_64-pc-linux-gnu) libcurl/7.22.0 OpenSSL/1.0.1 zlib/1.2.3.4 libidn/1.23 librtmp/2.3"192.168.5.180 - [02/Jun/2017:14:49:16 +0800] "GET / HTTP/1.1" 200 "http://www.sina.com" "curl test2"==> /web/vhosts/www2/error_log <==[Fri Jun 02 14:46:52 2017] [error] [client 192.168.5.180] File does not exist: /web/vhosts/www2/456


实验二:协议登录认证

对于httpd2.2版本的www1.stuX.com虚拟主机,以及httpd2.4版本的www3.stuX.com虚拟主机,分别添加状态监控页面,并且利用第三方模块mod_auth_mysql.so对用户账户进行认证与授权。用户账户存放在192.168.5.121这个节点的mysql服务器上面。认证采用aes加密认证。详细配置方案,请参照其他博文。

在mysql里面建立一个名为http_auth的数据库,在该数据库下建立一个名为mysql_auth的数据表,在表中添加两个用户,分别为admin和root,采用aes_encrypt函数对密码进行加密,加密用的salt分别为'hello'和'root'。如下所示:

mysql> use http_auth;Database changedmysql> show tables;+---------------------+| Tables_in_http_auth |+---------------------+| mysql_auth          |+---------------------+1 row in set (0.00 sec)mysql> desc mysql_auth;+-------------+----------+------+-----+---------+-------+| Field       | Type     | Null | Key | Default | Extra |+-------------+----------+------+-----+---------+-------+| user_name   | char(30) | NO   | PRI | NULL    |       || user_passwd | tinyblob | YES  |     | NULL    |       || user_group  | char(25) | YES  |     | NULL    |       || salt        | tinyblob | YES  |     | NULL    |       |+-------------+----------+------+-----+---------+-------+4 rows in set (0.01 sec)mysql> select * from mysql_auth;+-----------+------------------+------------+-------+| user_name | user_passwd      | user_group | salt  |+-----------+------------------+------------+-------+| admin     | ?G°??P-S       | admin      | hello || root      |???¥V′l?Gχ          | admin      | root  |+-----------+------------------+------------+-------+2 rows in set (0.00 sec)

注:确保mysql开启了用户远程访问的权限,在这里使用mysql的root@'%'用户,开启访问数据库的权限:grant all pribileges on *.* to root@'%' identified by 'root' with grant option

  • CentOS6, httpd2.2环境

mod_auth_mysql.so模块加载进来,确保mod_auth_mysql.so模块在操作系统中存在,并且在/etc/httpd/modules里面有副本,这样便可以使用相对于ServerRoot的相对路径来引用,在主配置文件/etc/httpd/conf/httpd.conf里面添加一行:

LoadModule mysql_auth_module modules/mod_auth_mysql.so

以实验一的virtualhost.conf文件为基础,添加指令段开启状态页面,并针对状态页面做基于用户的协议认证,添加权限控制的选项,如下所示:
注: 针对mod_auth_mysql.so的配置指令,详细请参照该模块的文档。
注:这里的AuthBasicAuthoritative指令尤为重要,因为使用的是第三方认证模块,如果不设定为Off的话,httpd将认为该模块为非法模块从而无法使用。

............                        SetHandler server-status                Order deny,allow                Allow from all                AuthType Basic                AuthBasicAuthoritative Off                AuthName "auth login"                AuthMySQLHost 192.168.5.121                AuthMySQLPort 3306                AuthMySQLUser root                AuthMySQLPassword shroot                AuthMySQLDB http_auth                AuthMySQLUserTable mysql_auth                AuthMySQLNameField user_name                AuthMySQLPasswordField user_passwd                AuthMySQLEnable on                AuthMySQLPwEncryption aes                AuthMySQLSaltField salt                require valid-user        ............

配置完毕之后,用service httpd restart命令重启httpd服务。

  • CentOS7, httpd2.4环境

同样需要将mod_auth_mysql.so添加进来,确保mod_auth_mysql.so模块在操作系统中存在,并且在/etc/httpd/modules里面有副本,这样便可以使用相对于ServerRoot的相对路径来引用。

httpd2.4的模块加载配置文件和上面的httpd2.2的模块配置加载文件不同,需要在/etc/httpd/conf.modules.d目录下面创建一个单独的模块加载配置文件,这里创建一个名字为10-mysql.conf的配置文件,在里面添加一行:

LoadModule mysql_auth_module modules/mod_auth_mysql.so

以实验一的virtualhost.conf文件为基础,添加指令段开启状态页面,并针对状态页面做基于用户的协议认证,添加权限控制的选项,如下所示:
注: 针对mod_auth_mysql.so的配置指令,详细请参照该模块的文档。
注:这里的AuthBasicAuthoritative指令尤为重要,因为使用的是第三方认证模块,如果不设定为Off的话,httpd将认为该模块为非法模块从而无法使用。
注:在httpd2.4里面,如果不显式定义AuthUserFile,有可能会遇到认证失败的情况。因为使用mysql里面的数据进行认证,因此这里只需要指定文件系统的认证文件为/dev/null即可。

                        SetHandler server-status                AuthType Basic                AuthBasicAuthoritative Off                AuthName "auth login"                AuthUserFile /dev/null                AuthMySQLHost 192.168.5.121                AuthMySQLPort 3306                AuthMySQLUser root                AuthMySQLPassword root                AuthMySQLDB http_auth                AuthMySQLUserTable mysql_auth                AuthMySQLNameField user_name                AuthMySQLPasswordField user_passwd                AuthMySQLEnable on                AuthMySQLPwEncryption aes                AuthMySQLSaltField salt                Require valid-user        
  • 客户端测试

由于被测试页面为status状态监控页面,因此这里采用Firefox的GUI界面进行验证:
在浏览器界面上面键入http://www1.stuX.com/status,弹出认证对话框,输入admin用户名以及密码,如下图所示:

可以发现登录成功,观察到的状态页面如下所示:

测试http://www3.stuX.com/status,亦登录成功,效果如下所示:

下面用curl命令行工具测试一下数据库关闭以及认证错误的情况。
模拟一些认证错误,故意输入错误的用户名和密码,测试效果如下:

root@alternative:~# curl -u admin:123 http://www1.stuX.com/status401 Authorization Required

Authorization Required

This server could not verify that youare authorized to access the documentrequested. Either you supplied the wrongcredentials (e.g., bad password), or yourbrowser doesn't understand how to supplythe credentials required.


Apache/2.2.15 (CentOS) Server at www1.stux.com Port 80
root@alternative:~# curl -u 123:123 http://www3.stuX.com/status 401 Unauthorized

Unauthorized

This server could not verify that youare authorized to access the documentrequested. Either you supplied the wrongcredentials (e.g., bad password), or yourbrowser doesn't understand how to supplythe credentials required.

在192.168.5.121上面关闭mysql数据库,再测试认证,发现认证失败:

$ service mysqld stoproot@alternative:~# curl -u admin:admin http://www3.stuX.com/status401 Unauthorized

Unauthorized

This server could not verify that youare authorized to access the documentrequested. Either you supplied the wrongcredentials (e.g., bad password), or yourbrowser doesn't understand how to supplythe credentials required.

相关的错误日志文件输出:

[Sun Jun 04 19:23:22 2017] [error] [pid 16685] mod_auth_mysql.c(521): [client 192.168.5.180:55679] MySQL ERROR: Can't connect to MySQL server on '192.168.5.121' (111)


实验三:基于IP的简单ACL控制

配置基于IP的简单认证规则,使得:

  1. 192.168.5.180这台客户端无法访问www1.stuX.com

  2. 192.168.5.190这台客户端无法访问www3.stuX.com

CentOS6, httpd2.2环境下
在实验二的virtualhost.conf配置文件基础上,在里面添加Deny from,如下所示:

                Order allow,deny            Allow from all            Deny from 192.168.5.180/32    

重启httpd服务service httpd restart

CentOS7 httpd2.4环境下
在实验二的virtualhost.conf配置文件的基础上,在里面添加标签,并配置IP访问权限,如下所示:

        Options None        AllowOverride None                        Require all granted                Require not ip 192.168.5.190        
  • 客户端测试

在192.168.5.180这台机器上面用curl命令访问,发现www1.stuX.com访问失败,提示403 Forbidden错误,证明访问控制生效。www3.stuX.com可以正常访问。

root@alternative:~# curl http://www1.stuX.com/index.html403 Forbidden

Forbidden

You don't have permission to access /index.htmlon this server.


Apache/2.2.15 (CentOS) Server at www1.stux.com Port 80
root@alternative:~# root@alternative:~# curl http://www3.stuX.com/index.htmlThis is www3.stuX.com

在192.168.5.190这台机器上面用curl命令访问,发现www3.stuX.com访问失败,提示403 Forbidden错误,证明访问控制生效。www1.stuX.com可以正常访问。

root@ubuntu-node1:~# curl http://www3.stuX.com/index.html403 Forbidden

Forbidden

You don't have permission to access /index.htmlon this server.

root@ubuntu-node1:~# curl http://www1.stuX.com/index.htmlThis is www1.stuX.com


实验四:基于虚拟主机的https服务

分别为www2.stuX.com和www4.stuX.com建立https服务,选用192.168.5.182这台机器作为CA。
首先需要将httpd2.2服务器、httpd2.4服务器、CA服务器、客户端进行时间同步,如果不同步的话,有可能会出现httpd服务器或者客户端的时间要早于CA根证书的有效起始时间,从而导致错误。使用ntpdate命令或者ntpd服务进行时间同步,详细步骤请参照linux的ntp服务及配置。

  • CA生成根证书

首先生成私钥:

$ cd /etc/pki/CA$ (umask 077; openssl genrsa -out private/cakey.pem 2048)$ ls -al private/total 4drwx------. 2 root root   22 Jun  4 20:16 .drwxr-xr-x. 6 root root   57 Mar 20 06:43 ..-rw-------  1 root root 1675 Jun  4 20:16 cakey.pem

然后通过私钥生成自签名证书:

$ openssl req -new -x509 -key private/cakey.pem -out cacert.pem -days 365You are about to be asked to enter information that will be incorporatedinto your certificate request.What you are about to enter is what is called a Distinguished Name or a DN.There are quite a few fields but you can leave some blankFor some fields there will be a default value,If you enter '.', the field will be left blank.-----Country Name (2 letter code) [XX]:CNState or Province Name (full name) []:BJLocality Name (eg, city) [Default City]:BJOrganization Name (eg, company) [Default Company Ltd]:CAOrganizational Unit Name (eg, section) []:caexecCommon Name (eg, your name or your server's hostname) []:ca.caexec.comEmail Address []:$ touch index.txt serial$ echo 01 > serial$ ls /etc/pki/CAcacert.pem  certs  crl  index.txt  newcerts  private  serial
  • httpd2.2服务器生成证书请求并到CA签名

首先生成私钥

$ mkdir /web/vhosts/www2/ssl$ cd /web/vhosts/www2/ssl/$ (umask 077; openssl genrsa -out www2.key 2048)

根据私钥生成证书申请请求

$ openssl req -new -key www2.key -out www2.csrYou are about to be asked to enter information that will be incorporatedinto your certificate request.What you are about to enter is what is called a Distinguished Name or a DN.There are quite a few fields but you can leave some blankFor some fields there will be a default value,If you enter '.', the field will be left blank.-----Country Name (2 letter code) [XX]:CNState or Province Name (full name) []:BJLocality Name (eg, city) [Default City]:BJOrganization Name (eg, company) [Default Company Ltd]:CAOrganizational Unit Name (eg, section) []:opsCommon Name (eg, your name or your server's hostname) []:www2.stuX.comEmail Address []:Please enter the following 'extra' attributesto be sent with your certificate requestA challenge password []:An optional company name []:

将证书申请请求发送到CA服务器上面,CA进行签名,签完之后再返回给httpd2.2服务器

$ openssl ca -in www2.csr -out www2.crt -days 365Using configuration from /etc/pki/tls/openssl.cnfCheck that the request matches the signatureSignature okCertificate Details:        Serial Number: 1 (0x1)        Validity            Not Before: Jun  4 14:23:12 2017 GMT            Not After : Jun  4 14:23:12 2018 GMT        Subject:            countryName               = CN            stateOrProvinceName       = BJ            organizationName          = CA            organizationalUnitName    = ops            commonName                = www2.stuX.com        X509v3 extensions:            X509v3 Basic Constraints:                 CA:FALSE            Netscape Comment:                 OpenSSL Generated Certificate            X509v3 Subject Key Identifier:                 99:13:92:93:B4:64:FF:15:70:6A:FF:6A:E0:C1:AA:E9:C1:28:13:47            X509v3 Authority Key Identifier:                 keyid:D0:3B:30:3D:AF:76:F3:47:7D:83:FA:F1:19:F9:1D:29:11:9C:42:E1Certificate is to be certified until Jun  4 14:23:12 2018 GMT (365 days)Sign the certificate? [y/n]:y1 out of 1 certificate requests certified, commit? [y/n]yWrite out database with 1 new entriesData Base Updated

确保httpd2.2服务器上面安装有mod_ssl模块,如果没有的话,用yum install mod_ssl安装,或者编译安装。

$ httpd -M | grep ssl ssl_module (shared)Syntax OK

创建一个测试页面ssl.html

echo "This is ssl page for www2.stuX.com." > /web/vhosts/www2/ssl.html

在原有的virtualhost.conf文件上面配置一个新的,提供https服务,并将服务器私钥和CA签发的证书配置上去,配置完毕之后,重启httpd服务service httpd restart

        ServerName www2.stuX.com        DocumentRoot "/web/vhosts/www2"        DirectoryIndex ssl.html        ErrorLog /web/vhosts/www2/ssl_error_log        LogLevel info        TransferLog /web/vhosts/www2/ssl_access_log        SSLEngine on        SSLProtocol all -SSLv2        SSLCipherSuite DEFAULT:!EXP:!SSLv2:!DES:!IDEA:!SEED:+3DES        SSLCertificateFile /web/vhosts/www2/ssl/www2.crt        SSLCertificateKeyFile /web/vhosts/www2/ssl/www2.key                        Order allow,deny                Allow from all        
  • httpd2.4服务器生成证书请求并到CA签名

生成私钥

$ mkdir /web/vhosts/www4/ssl$ cd /web/vhosts/www4/ssl/$ (umask 077; openssl genrsa -out www4.key 2048)

根据私钥生成证书申请请求

$ openssl req -new -key www4.key -out www4.csrYou are about to be asked to enter information that will be incorporatedinto your certificate request.What you are about to enter is what is called a Distinguished Name or a DN.There are quite a few fields but you can leave some blankFor some fields there will be a default value,If you enter '.', the field will be left blank.-----Country Name (2 letter code) [XX]:CNState or Province Name (full name) []:BJLocality Name (eg, city) [Default City]:BJOrganization Name (eg, company) [Default Company Ltd]:CAOrganizational Unit Name (eg, section) []:opsCommon Name (eg, your name or your server's hostname) []:www4.stuX.comEmail Address []:Please enter the following 'extra' attributesto be sent with your certificate requestA challenge password []:An optional company name []:

将证书申请请求发送到CA服务器上面,CA进行签名,签完之后再返回给httpd2.2服务器

$ openssl ca -in www4.csr -out www4.crt -days 365Using configuration from /etc/pki/tls/openssl.cnfCheck that the request matches the signatureSignature okCertificate Details:        Serial Number: 2 (0x2)        Validity            Not Before: Jun  4 16:14:45 2017 GMT            Not After : Jun  4 16:14:45 2018 GMT        Subject:            countryName               = CN            stateOrProvinceName       = BJ            organizationName          = CA            organizationalUnitName    = ops            commonName                = www4.stuX.com        X509v3 extensions:            X509v3 Basic Constraints:                 CA:FALSE            Netscape Comment:                 OpenSSL Generated Certificate            X509v3 Subject Key Identifier:                 DE:84:D5:8C:11:7F:F8:C4:F4:26:49:A3:C2:0E:1A:07:62:00:06:8F            X509v3 Authority Key Identifier:                 keyid:D0:3B:30:3D:AF:76:F3:47:7D:83:FA:F1:19:F9:1D:29:11:9C:42:E1Certificate is to be certified until Jun  4 16:14:45 2018 GMT (365 days)Sign the certificate? [y/n]:y1 out of 1 certificate requests certified, commit? [y/n]yWrite out database with 1 new entriesData Base Updated

确保httpd2.4服务器上面安装有mod_ssl模块,如果没有的话,用yum install mod_ssl安装,或者编译安装。

$ httpd -M | grep ssl ssl_module (shared)

创建一个测试页面ssl.html

echo "This is ssl page for www4.stuX.com." > /web/vhosts/www4/ssl.html

在原有的virtualhost.conf文件上面配置一个新的,提供https服务,并将服务器私钥和CA签发的证书配置上去,配置完毕之后,重启httpd服务systemctl restart httpd.service

        ServerName www4.stuX.com        DocumentRoot "/web/vhosts/www4"        DirectoryIndex ssl.html        ErrorLog /web/vhosts/www4/ssl_error_log        LogLevel info        TransferLog /web/vhosts/www4/ssl_access_log        SSLEngine on        SSLProtocol all -SSLv2        SSLCipherSuite DEFAULT:!EXP:!SSLv2:!DES:!IDEA:!SEED:+3DES        SSLCertificateFile /web/vhosts/www4/ssl/www4.crt        SSLCertificateKeyFile /web/vhosts/www4/ssl/www4.key                        Options None                AllowOverride None                Require all granted        
  • 客户端测试

将CA服务器的自签名证书拷贝到客户端上面,用curl工具进行测试,分别访问httpd2.2服务器和httpd2.4服务器的https服务页面:

root@alternative:~# curl --cacert cacert.pem https://www2.stuX.comThis is ssl page for www2.stuX.com.root@alternative:~# curl --cacert cacert.pem https://www4.stuX.comThis is ssl page for www4.stuX.com.
0