CA(Certificate Authority)证书颁发机构主要负责证书的颁发、管理以及归档和吊销。证书内包含了拥有证书者的姓名、地址、电子邮件帐号、公钥、证书有效期、发放证书的CA、CA的数字签名等信息。证书主要有三大功能:加密、签名、身份验证。
1.什么是CA认证?
CA认证,即CA认证机构,为电子签名相关各方提供真实性、可靠性验证的行为。
2.什么是CA证书?
证书实际是由证书签证机关(CA)签发的对用户的公钥的认证。
3.CA证书类型?
- 证书颁发机构自签名证书
- 服务器证书
- 用户证书
二. CA服务器部署
1. 部署环境
[root@linux-ca ~]# touch /etc/pki/CA/index.txt #index.txt:索引文件,用于匹配证书编号;
[root@linux-ca ~]# echo 01 >/etc/pki/CA/serial #serial:证书序列号文件,只在首次生成证书时赋值。
[root@linux-ca ~]# cat /etc/pki/CA/serial
01
2. 生成密钥
[root@linux-ca private]# (umask 077; openssl genrsa -out /etc/pki/CA/private/cakay.pem 2048)
genrsa:生成私钥;
-out:私钥的存放路径,cakey.pem:为密钥名,与配置文件中保持一致;
2048:密钥长度,默认为1024。
3. 修改配置文件/etc/pki/tls/openssl.cnf
40 [ CA_default ]
41
42 dir = /etc/pki/CA # Where everything is kept
43 certs = $dir/certs # Where the issued certs are kept
44 crl_dir = $dir/crl # Where the issued crl are kept
45 database = $dir/index.txt # database index file.
46 #unique_subject = no # Set to 'no' to allow creation of
47 # several ctificates with same subject.
48 new_certs_dir = $dir/newcerts # default place for new certs.
49
50 certificate = $dir/cacert.pem # The CA certificate
51 serial = $dir/serial # The current serial number
52 crlnumber = $dir/crlnumber # the current crl number
53 # must be commented out to leave a V1 CRL
54 crl = $dir/crl.pem # The current CRL
55 private_key = $dir/private/cakey.pem# The private key
56 RANDFILE = $dir/private/.rand # private random number file
83 # For the CA policy
84 [ policy_match ]
85 countryName = match
86 stateOrProvinceName = match
87 organizationName = match
88 organizationalUnitName = optional
89 commonName = supplied
90 emailAddress = optional
128 [ req_distinguished_name ]
129 countryName = Country Name (2 letter code)
130 countryName_default = US
131 countryName_min = 2
132 countryName_max = 2
133
134 stateOrProvinceName = State or Province Name (full name)
135 stateOrProvinceName_default = California
136
137 localityName = Locality Name (eg, city)
138 localityName_default = Redwood City
139
140 0.organizationName = Organization Name (eg, company)
141 0.organizationName_default = Electronic Arts, Inc.
142
143 # we can do this but it is not needed normally :-)
144 #1.organizationName = Second Organization Name (eg, company)
145 #1.organizationName_default = World Wide Web Pty Ltd
146
147 organizationalUnitName = Organizational Unit Name (eg, section)
148 organizationalUnitName_default = EA Online/pogo.com
149
150 commonName = Common Name (eg, your name or your server\'s hostname)
151 commonName_max = 64
152 commonName_default =
153
154 emailAddress = Email Address
155 emailAddress_max = 64
156 emailAddress_default =
4. CA 创建自签根证书
[root@linux-ca CA]# openssl req -new -x509 -key /etc/pki/CA/private/cakay.pem -out /etc/pki/CA/cacert.pem -days 365
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [US]:
State or Province Name (full name) [California]:
Locality Name (eg, city) [Redwood City]:
Organization Name (eg, company) [Electronic Arts, Inc.]:
Organizational Unit Name (eg, section) [EA Online/pogo.com]:
Common Name (eg, your name or your server's hostname) []:cacert
Email Address []:vxxxxxxxxxxxxxxxxx
req:生成证书签署请求;
-x509:生成自签署证书;
-days n:证书的有效天数;
-new:新请求;
-key /path/to/keyfile:指定私钥文件;
-out /path/to/somefile:输出文件位置。
三. 客户端申请证书
1. 生成客户端私钥
[root@web ~]# mkdir ssl
[root@web ~]# cd ssl/
[root@web ssl]# (umask 077; openssl genrsa -out /root/ssl/web.key 2048)
Generating RSA private key, 2048 bit long modulus
.......................................+++
.................................................+++
e is 65537 (0x10001)
2. 生成证书请求文件
[root@web ssl]# openssl req -new -key /root/ssl/web.key -out /root/ssl/web.csr
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [XX]:US
State or Province Name (full name) []:California
Locality Name (eg, city) [Default City]:Redwood City
Organization Name (eg, company) [Default Company Ltd]:Electronic Arts, Inc.
Organizational Unit Name (eg, section) []:EA Online/pogo.com
Common Name (eg, your name or your server's hostname) []:web
Email Address []:xxxxxxxxxxx
3. 将生成的申请文件发送到CA颁发服务器
[root@web ssl]# scp web.csr root@10.17.160.241:/etc/pki/CA/csr/
四. CA服务器为客户端颁发证书
1.为客户端颁发证书
[root@linux-ca CA]# openssl ca -in /etc/pki/CA/csr/web.csr -out /etc/pki/CA/certs/web.crt -days 365
Using configuration from /etc/pki/tls/openssl.cnf
Check that the request matches the signature
Signature ok
Certificate Details:
Serial Number: 1 (0x1)
Validity
Not Before: May 15 06:58:48 2019 GMT
Not After : May 14 06:58:48 2020 GMT
Subject:
countryName = US
stateOrProvinceName = California
organizationName = Electronic Arts, Inc.
organizationalUnitName = EA Online/pogo.com
commonName = web
emailAddress = vli@contractor.ea.com
X509v3 extensions:
X509v3 Basic Constraints:
CA:FALSE
Netscape Comment:
OpenSSL Generated Certificate
X509v3 Subject Key Identifier:
4E:FE:C1:E2:17:92:C6:D1:48:42:70:1F:59:95:FA:9D:49:76:B0:47
X509v3 Authority Key Identifier:
keyid:82:81:30:91:40:F8:D2:FD:B4:D5:A8:52:DF:FE:D2:62:12:38:53:7F
Certificate is to be certified until May 14 06:58:48 2020 GMT (365 days)
Sign the certificate? [y/n]:y
1 out of 1 certificate requests certified, commit? [y/n]y
Write out database with 1 new entries
Data Base Updated
2. 将生成的证书发送给申请的客户端
五. 吊销证书
1. 获取证书serial
[root@linux-ca CA]# openssl x509 -in certs/web.crt -noout -serial -subject
serial=01
subject= /C=US/ST=California/O=Electronic Arts, Inc./OU=EA Online/pogo.com/CN=web/emailAddress=xxxxxxxxxxxxxx
x509:证书格式;
-in:要吊销的证书;
-noout:不输出额外信息;
-serial:显示序列号;
-subject:显示subject信息。
二) CA验证信息
1、节点提交的serial和subject信息来验证与index.txt文件中的信息是否一致
2、吊销证书
-revoke:删除证书。
查看被吊销的证书列表
3、生成吊销证书的编号(如果是第一次吊销)
4、更新证书吊销列表
-gencrl:生成证书吊销列表;
5、查看crl文件内容
-text:以文本形式显示。