我知道rethinkdb指南使用了一个自签名证书作为示例。如果我想使用我购买的真正的证书,我如何将包添加到服务器conf?我将购买的证书和密钥添加到配置中:
driver-tls-key=/etc/ssl/star.cert.key
driver-tls-cert=/etc/ssl/star.cert.crtOpenssl s_client提供了以下内容
Verify return code: 21 (unable to verify the first certificate)将此作为证书链:
depth=0 OU = Domain Control Validated, OU = PositiveSSL Wildcard, CN = *.s0nr.co
verify error:num=20:unable to get local issuer certificate
verify return:1
depth=0 OU = Domain Control Validated, OU = PositiveSSL Wildcard, CN = *.s0nr.co
verify error:num=21:unable to verify the first certificate
verify return:1
---
Certificate chain
0 s:/OU=Domain Control Validated/OU=PositiveSSL Wildcard/CN=*.s0nr.co
i:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Domain Validation Secure Server CA如何正确使用此证书?
发布于 2018-09-18 00:43:56
我真傻。有--司机-tls-ca选项我错过了。我在rethinkdb手册(man rethinkdb)中找到的。
TLS options:
--http-tls-key key_filename private key to use for web
administration console TLS
--http-tls-cert cert_filename certificate to use for web
administration console TLS
--driver-tls-key key_filename private key to use for client driver
connection TLS
--driver-tls-cert cert_filename certificate to use for client driver
connection TLS
--driver-tls-ca ca_filename CA certificate bundle used to verify
client certificates; TLS client
authentication disabled if omitted
--cluster-tls-key key_filename private key to use for intra-cluster
connection TLS
--cluster-tls-cert cert_filename certificate to use for intra-cluster
connection TLS
--cluster-tls-ca ca_filename CA certificate bundle used to verify
cluster peer certificates我在rethinkdb实例conf文件中设置了它:
# TLS stuff
driver-tls-key=/etc/ssl/star.cert.key
driver-tls-cert=/etc/ssl/star.cert.crt
driver-tls-ca=/etc/ssl/star.cert.ca-bundle一切都如期而至。openssl s_client返回正确的0 (ok)代码。
编辑注意:尽管使用rethinkdb转储实用程序,它似乎没有ca选项,所以无论如何我不能使用真正的cert。
https://dba.stackexchange.com/questions/217802
复制相似问题