{"id":25377,"date":"2024-05-11T17:00:12","date_gmt":"2024-05-11T09:00:12","guid":{"rendered":"https:\/\/www.zhidianwl.net\/zhidianwl\/?p=25377"},"modified":"2024-05-11T17:00:12","modified_gmt":"2024-05-11T09:00:12","slug":"ssl%e9%93%be%e6%8e%a5%e5%85%8d%e8%b4%b9%e7%94%b3%e8%af%b7%e5%8a%9e%e6%b3%95%e4%bb%8b%e7%bb%8d","status":"publish","type":"post","link":"https:\/\/www.zhidianwl.net\/zhidianwl\/2024\/05\/11\/ssl%e9%93%be%e6%8e%a5%e5%85%8d%e8%b4%b9%e7%94%b3%e8%af%b7%e5%8a%9e%e6%b3%95%e4%bb%8b%e7%bb%8d\/","title":{"rendered":"ssl\u94fe\u63a5\u514d\u8d39\u7533\u8bf7\u529e\u6cd5\u4ecb\u7ecd"},"content":{"rendered":"
SSL\uff08Secure Sockets Layer\uff09\u662f\u4e00\u79cd\u52a0\u5bc6\u901a\u4fe1\u534f\u8bae\uff0c\u53ef\u4ee5\u4fdd\u8bc1\u6570\u636e\u5728\u4f20\u8f93\u8fc7\u7a0b\u4e2d\u7684\u5b89\u5168\u6027\uff0c\u9632\u6b62\u6570\u636e\u88ab\u7a83\u53d6\u6216\u7be1\u6539\u3002\u5728\u4e92\u8054\u7f51\u4e0a\uff0c\u4f7f\u7528SSL\u534f\u8bae\u53ef\u4ee5\u5b9e\u73b0\u7f51\u7ad9\u7684HTTPS\u52a0\u5bc6\u4f20\u8f93\uff0c\u63d0\u9ad8\u7f51\u7ad9\u7684\u5b89\u5168\u6027\u3002<\/p>\n
\u4e3a\u4e86\u4f7f\u7528SSL\u534f\u8bae\uff0c\u9700\u8981\u5728\u7f51\u7ad9\u4e0a\u5b89\u88c5SSL\u8bc1\u4e66\u3002SSL\u8bc1\u4e66\u662f\u4e00\u4e2a\u6570\u5b57\u8bc1\u4e66\uff0c\u7531\u8ba4\u8bc1\u673a\u6784\uff08CA\uff09\u9881\u53d1\uff0c\u7528\u4e8e\u8bc1\u660e\u7f51\u7ad9\u7684\u8eab\u4efd\u548c\u5b89\u5168\u6027\u3002\u5e38\u89c1\u7684CA\u673a\u6784\u5305\u62ecSymantec\u3001Comodo\u3001Let’s Encrypt\u7b49\u3002<\/p>\n
\u5728\u8fc7\u53bb\uff0c\u7533\u8bf7SSL\u8bc1\u4e66\u9700\u8981\u652f\u4ed8\u4e00\u5b9a\u7684\u8d39\u7528\u3002\u4f46\u662f\uff0c\u73b0\u5728\u6709\u4e00\u4e9bCA\u673a\u6784\u63d0\u4f9b\u4e86\u514d\u8d39\u7684SSL\u8bc1\u4e66\u670d\u52a1\uff0c\u5982Let’s Encrypt\u3002\u4e0b\u9762\uff0c\u6211\u4eec\u6765\u8be6\u7ec6\u4ecb\u7ecd\u4e00\u4e0bLet’s Encrypt\u514d\u8d39SSL\u8bc1\u4e66\u7684\u7533\u8bf7\u548c\u4f7f\u7528\u3002<\/p>\n
Let’s Encrypt\u662f\u4e00\u4e2a\u7531\u975e\u8425\u5229\u7ec4\u7ec7ISRG\uff08Internet Security Research Group\uff09\u63d0\u4f9b\u7684\u514d\u8d39SSL\u8bc1\u4e66\u670d\u52a1\u3002\u8be5\u670d\u52a1\u53ef\u4ee5\u81ea\u52a8\u5316\u5730\u4e3a\u7f51\u7ad9\u7b7e\u53d1SSL\u8bc1\u4e66\uff0c\u5927\u5927\u964d\u4f4e\u4e86SSL\u8bc1\u4e66\u7684\u7533\u8bf7\u548c\u4f7f\u7528\u95e8\u69db\u3002\u4ee5\u4e0b\u662f\u7533\u8bf7Let’s Encrypt\u514d\u8d39SSL\u8bc1\u4e66\u7684\u5177\u4f53\u6b65\u9aa4\uff1a<\/p>\n
1. \u5b89\u88c5Certbot\u5ba2\u6237\u7aef<\/p>\n
Certbot\u662f\u4e00\u4e2a\u7531Let’s Encrypt\u63d0\u4f9b\u7684\u547d\u4ee4\u884c\u5de5\u5177\uff0c\u7528\u4e8e\u81ea\u52a8\u5316\u7533\u8bf7\u3001\u5b89\u88c5\u548c\u66f4\u65b0SSL\u8bc1\u4e66\u3002\u5728\u7533\u8bf7L<\/p>\n
et’s Encrypt\u514d\u8d39SSL\u8bc1\u4e66\u4e4b\u524d\uff0c\u9700\u8981\u5148\u5b89\u88c5Certbot\u5ba2\u6237\u7aef\u3002Certbot\u652f\u6301Linux\u3001macOS\u548cWindows\u7cfb\u7edf\uff0c\u5177\u4f53\u5b89\u88c5\u65b9\u6cd5\u53ef\u4ee5\u53c2\u8003\u5b98\u65b9\u6587\u6863\u3002<\/p>\n 2. \u7533\u8bf7SSL\u8bc1\u4e66<\/p>\n \u5728\u5b89\u88c5Certbot\u5ba2\u6237\u7aef\u4e4b\u540e\uff0c\u53ef\u4ee5\u4f7f\u7528\u4ee5\u4e0b\u547d\u4ee4\u7533\u8bf7SSL\u8bc1\u4e66\uff1a<\/p>\n “`<\/p>\n sudo certbot certonly –standalone -d example.com -d www.example.com<\/p>\n “`<\/p>\n \u5176\u4e2d\uff0cexample.com\u548cwww.example.com\u5206\u522b\u662f\u4f60\u7684\u57df\u540d\u3002Certbot\u4f1a\u542f\u52a8\u4e00\u4e2aWeb\u670d\u52a1\u5668\uff0c\u5411Let’s Encrypt\u670d\u52a1\u5668\u7533\u8bf7SSL\u8bc1\u4e66\u3002\u7533\u8bf7\u6210\u529f\u540e\uff0cSSL\u8bc1\u4e66\u4f1a\u88ab\u5b58\u50a8\u5728\u672c\u5730\u6587\u4ef6\u7cfb\u7edf\u4e2d\u3002<\/p>\n 3. \u5b89\u88c5SSL\u8bc1\u4e66<\/p>\n \u5728\u7533\u8bf7SSL\u8bc1\u4e66\u6210\u529f\u4e4b\u540e\uff0c\u9700\u8981\u5c06SSL\u8bc1\u4e66\u5b89\u88c5\u5230Web\u670d\u52a1\u5668\u4e2d\u3002\u5177\u4f53\u65b9\u6cd5\u53d6\u51b3\u4e8e\u4f60\u4f7f\u7528\u7684Web\u670d\u52a1\u5668\u3002\u4f8b\u5982\uff0c\u5728\u4f7f\u7528Nginx\u670d\u52a1\u5668\u7684\u60c5\u51b5\u4e0b\uff0c\u53ef\u4ee5\u5c06SSL\u8bc1\u4e66\u914d\u7f6e\u6587\u4ef6\u5b58\u50a8\u5728\/etc\/nginx\/conf.d\u76ee\u5f55\u4e0b\uff0c\u7136\u540e\u91cd\u65b0\u52a0\u8f7dNginx\u914d\u7f6e\u6587\u4ef6\u5373\u53ef\u3002<\/p>\n 4. \u914d\u7f6eHTTPS\u8bbf\u95ee<\/p>\n \u5728\u5b89\u88c5SSL\u8bc1\u4e66\u4e4b\u540e\uff0c\u9700\u8981\u5c06\u7f51\u7ad9\u7684\u8bbf\u95ee\u65b9\u5f0f\u4eceHTTP\u534f\u8bae\u5207\u6362\u5230HTTPS\u534f\u8bae\u3002\u5177\u4f53\u65b9\u6cd5\u4e5f\u53d6\u51b3\u4e8e\u4f60\u4f7f\u7528\u7684Web\u670d\u52a1\u5668\u3002\u4f8b\u5982\uff0c\u5728\u4f7f\u7528Nginx\u670d\u52a1\u5668\u7684\u60c5\u51b5\u4e0b\uff0c\u53ef\u4ee5\u5728Nginx\u914d\u7f6e\u6587\u4ef6\u4e2d\u6dfb\u52a0\u4ee5\u4e0b\u5185\u5bb9\uff1a<\/p>\n “`<\/p>\n server {<\/p>\n listen 80;<\/p>\n server_name example.com www.example.com;<\/p>\n return 301 https:\/\/$host$request_uri;<\/p>\n }<\/p>\n server {<\/p>\n listen 443 ssl;<\/p>\n server_name example.com www.example.com;<\/p>\n ssl_certificate \/path\/to\/fullchain.pem;<\/p>\n ssl_certificate_key \/path\/to\/privkey.pem;<\/p>\n # other SSL configuration<\/p>\n }<\/p>\n “`<\/p>\n<\/figure>\n<\/p>\n