......... .. ++ ......... .... ++ e is 65537 (0x10001) Bạn cần đến bạn cần nhập vào thông tin mà sẽ được hợp lệ vào bạn yêu cầu certificate. What are you about to enter is called a Distinguished Name or a DN. Có đủ một trường mà nhưng bạn bỏ bỏ một trống Để có một trường này sẽ là một giá trị mặc định, Nếu bạn nhập vào., Trường này sẽ được trống. ----- Country Name (2 letter code) [AU]: State or Province Name (full name) [Some-State]: Locality Name (eg, city) []: Organization Name (eg, company) [Internet Widgits Pty Ltd]: Organizational Unit Name (eg, section) []: Common Name (eg, YOUR name) []: Email Address []:
Please enter the following 'extra' attributes cần gửi với yêu cầu xác thực A challenge password []: An tùy chọn company tên []: ghi RSA key
If the original certificate initialization steps with data are misleading, you can update ISPConfig by typing the command:
ispconfig_update.sh
Or if you have installed the latest version of ISPConfig , use the command:
cd / tmp wget http://www.ispconfig.org/downloads/ISPConfig-3-stable.tar.gz tar xvfz ISPConfig-3 - stable.tar.gz cd ispconfig3_install / install php -q update.php
This process will allow users to create new ISPConfig 3certificates by answering the following question with the yes :
Create new ISPConfig SSL certificate (yes, no) [no]:
If you are using ISPConfig version older than 3.0.4 , you should update with the command:
ispconfig_update.sh
The above syntax also allows users to create an SSL connection for ISPConfig 3 by answering the question with the option yes :
Create new ISPConfig SSL certificate (yes, no) [no]:
As mentioned above, you should report the information exactly. After that, the system will have full SSL , CSR, and self-signed certificate keys in the directory / usr / local / ispconfig / interface / ssl /
ls -l / usr / local / ispconfig / interface / ssl /
root @ server1: ~ # ls -l / usr / local / ispconfig / interface / ssl / total 16 -rwxr-x --- 1 ispconfig ispconfig 2423 Jan 16 13:29 ispserver.crt -rwxr-x --- 1 ispconfig ispconfig 1777 Jan 16 13:29 ispserver.csr -rwxr-x --- 1 ispconfig ispconfig 3243 Jan 16 13:29 ispserver.key -rwxr-x --- 1 ispconfig ispconfig 3311 Jan 16 13:28 ispserver.key.secure root @ server1: ~ #
All we need in this test is the private key (ispserver.key) and CSR (ispserver.csr) , you need to replace ispserver.crt with SSLClass1certificate , and can ignore ispserver .key.secure . Or create the key ispserver.key and ispserver.csr as follows:
The next step is to access StartSSL and create a new account. After confirming the correct domain information (at the Validations Wizard tab), request your certificate in the Certificates Wizard> SSL Server / TLS Certificate tab from the Certificate Target menu as shown below:
Secure the installation of ISPConfig 3 with Certificate Class1 SSL of StartSSL Picture 1
If private key and CSR are available, you can skip this step, click Skip >>:
Secure the installation of ISPConfig 3 with Certificate Class1 SSL of StartSSL Picture 2
On the next page, enter the contents of the CSR file, for example inside the file /usr/local/ispconfig/interface/ssl/ispserver.csr (usually begins with ----- BEGIN CERTIFICATE REQUEST ----- and end by ----- END CERTIFICATE REQUEST ----- ):
Secure the installation of ISPConfig 3 with Certificate Class1 SSL of StartSSL Picture 3
Then, following the instructions displayed, the system will ask you about the domain and sub domain that initializes the certificate, if using server1.example.com for all services, enter example.com as domain and server1 as the sub domain. . And after a few minutes, we will receive an email telling us that the certificate is complete. Open Toolbox> Retrieve Certificate and select our certificate:
Secure the installation of ISPConfig 3 with Certificate Class1 SSL of StartSSL Picture 4
Copy certificate from the web interface of StartSSL:
Secure the installation of ISPConfig 3 with Certificate Class1 SSL of StartSSL Picture 5
Back up 1 copy of the original ispserver.crt file, then enter the contents of the Class1 certificate StartSSL file into the ispserver.crt file just manipulated:
mv /usr/local/ispconfig/interface/ssl/ispserver.crt /usr/local/ispconfig/interface/ssl/ispserver.crt_bak vi /usr/local/ispconfig/interface/ssl/ispserver.crt
Change the second command in case you use Class2 certificate. However, there are some services that require the use of .pem files created in the following way (change the 2nd command accordingly if using Class2 certificate):
If you use ISPConfig 3 with Apache, open the file /etc/apache2/sites-available/ispconfig.vhost with the command:
en /etc/apache2/sites-available/ispconfig.vhost
then add the SSLCertificateChainFile /usr/local/ispconfig/interface/ssl/startssl.sub.class1.server.ca.crt line to the # SSL Configuration section as follows:
[.] # SSL Configuration SSLEngine On SSLCertificateFile /usr/local/ispconfig/interface/ssl/ispserver.crt SSLCertificateKeyFile /usr/local/ispconfig/interface/ssl/ispserver.key ## phải là re-thêm sau khi ISPConfig update !!! SSLCertificateChainFile /usr/local/ispconfig/interface/ssl/startssl.sub.class1.server.ca.crt [.]
Please note to change the appropriate specifications if using the Class2 certificate , restart Apache:
/etc/init.d/apache2 restart
ISPConfig interface - nginx:
On nginx, all we need to do here is apply the intermediate certificate to the ispserver.crt file :
For Postfix, we need to backup /etc/postfix/smtpd.cert, /etc/postfix/smtpd.key then create a symlink to /usr/local/ispconfig/interface/ssl/ispserver.crt and / usr / local / ispconfig / interface / ssl / ispserver.key:
To do so, open the file /etc/dovecot/dovecot.conf:
en /etc/dovecot/dovecot.conf
and add the line ssl_ca_file = /usr/local/ispconfig/interface/ssl/startssl.chain.class1.server.crt (note that you must redo this operation after updating ISPConfig):
[.] ssl_cert_file = /etc/postfix/smtpd.cert ssl_key_file = /etc/postfix/smtpd.key ## phải là re-thêm sau khi ISPConfig update !!! ssl_ca_file = /usr/local/ispconfig/interface/ssl/startssl.chain.class1.server.crt [.]
Restart Dovecot:
/etc/init.d/dovecot restart
Courier:
The first thing to do here is to backup the file / etc / courier / imapd.pem and /etc/courier/pop3d.pem:
If you have installed and used Monit via HTTPS protocol, you can use the StartSSL certificate to remove unwanted messages. Open the file / etc / monit / monitrc:
vi / etc / monit / monitrc
and specify / usr / local / ispconfig / interface / ssl / ispserver.pem at the PEMFILE line. Examples are as follows:
[.] set httpd port 2812 and SSL ENABLE PEMFILE /usr/local/ispconfig/interface/ssl/ispserver.pem allow admin: secret [.]
Restart Monit :
/etc/init.d/monit restart
So, we have completed the basic steps to secure the installation of ISPConfig 3 with Certificate Class1 SSL of StartSSL . Good luck!