CentOS6主要使用http2.2版本,CentOS7使用的是http2.4版本,两个版本之间存在这部分区别,2.2的event模块是处于测试阶段的,2.4的event模块则是可以正常投入使用的;2.2不支持动态装卸载模块,而2.4支持动态装卸载模块;
使用CentOS6.7来建立httpd服务,主要实现的功能有:
①建立两个虚拟主机www1,www2,拥有单独的错误日志和访问日志;
②通过www1的server-status能够查看状态信息,但只有link用户能够访问;
③www2设置访问范围,允许其他主机访问,但不允许192.168.1.0/24IP地址访问;
④为www2提供https服务;
首先建立两个虚拟主机,在/etc/httpd/conf.d/下创建两个片虚拟主机文件,vhosts-www1.conf与
vhosts-www2.conf
650) this.width=650;" src="https://s3.51cto.com/wyfs02/M00/9F/5E/wKioL1mb0HzRNa_NAAAjBgo6_HA767.jpg-wh_500x0-wm_3-wmp_4-s_2152980162.jpg" title="QQ截图20170822143414.jpg" alt="wKioL1mb0HzRNa_NAAAjBgo6_HA767.jpg-wh_50" />
书写片配置文件vhosts-www1.conf的主要配置
如DocmentRoot,ServerName,ErrorLog,CustomLog并设置其server-status的访问权限,只允许link用户访问,创建其根文件系统在/myweb/vhosts/www1下;
片配置文件vhosts-www1.conf
650) this.width=650;" src="https://s4.51cto.com/wyfs02/M02/00/AF/wKiom1mb1VWzmhw3AAA_G1GEB7k633.jpg-wh_500x0-wm_3-wmp_4-s_3981410801.jpg" title="QQ截图20170822145458.jpg" alt="wKiom1mb1VWzmhw3AAA_G1GEB7k633.jpg-wh_50" />
创建www1,错误日志,访问日志的对应目录路径;使用htpasswd命令创建虚拟用户密钥;
-c选项只有在第一次创建虚拟用户文件时需要,-m选项表示用md5单向加密算法加密;
650) this.width=650;" src="https://s1.51cto.com/wyfs02/M02/9F/5F/wKioL1mb1iOzjI90AABIrbLfiiA377.jpg-wh_500x0-wm_3-wmp_4-s_2127519042.jpg" title="QQ截图20170822145826.jpg" alt="wKioL1mb1iOzjI90AABIrbLfiiA377.jpg-wh_50" />
www1运行结果:
主页
650) this.width=650;" src="https://s2.51cto.com/wyfs02/M02/9F/5F/wKioL1mb1q-T1dHRAAASuRLpyNk243.jpg-wh_500x0-wm_3-wmp_4-s_921368834.jpg" title="QQ截图20170822150031.jpg" alt="wKioL1mb1q-T1dHRAAASuRLpyNk243.jpg-wh_50" />
server-status:
650) this.width=650;" src="https://s2.51cto.com/wyfs02/M01/00/AF/wKiom1mb1u7DEtsBAABBmoSvOQs731.jpg-wh_500x0-wm_3-wmp_4-s_3630513216.jpg" title="QQ截图20170822150143.jpg" alt="wKiom1mb1u7DEtsBAABBmoSvOQs731.jpg-wh_50" />
书写片配置文件vhosts-www2.conf的主要配置:
650) this.width=650;" src="https://s5.51cto.com/wyfs02/M00/00/B0/wKiom1mb4YmRe4NwAAA-i1d_cKI261.jpg-wh_500x0-wm_3-wmp_4-s_396002702.jpg" title="QQ截图20170822154700.jpg" alt="wKiom1mb4YmRe4NwAAA-i1d_cKI261.jpg-wh_50" />
设置了Order权限,使用telnet进行测试
如:
650) this.width=650;" src="https://s4.51cto.com/wyfs02/M00/9F/60/wKioL1mb4fCx7Q2rAABNxMk30FM967.jpg-wh_500x0-wm_3-wmp_4-s_862364313.jpg" title="QQ截图20170822154853.jpg" alt="wKioL1mb4fCx7Q2rAABNxMk30FM967.jpg-wh_50" />
650) this.width=650;" src="https://s4.51cto.com/wyfs02/M00/00/B0/wKiom1mb4iDQD1pZAABVv41BW4c353.jpg-wh_500x0-wm_3-wmp_4-s_2985798979.jpg" title="QQ截图20170822154924.jpg" alt="wKiom1mb4iDQD1pZAABVv41BW4c353.jpg-wh_50" />
www2运行结果:
650) this.width=650;" src="https://s4.51cto.com/wyfs02/M02/9F/61/wKioL1mb6k7xcDU1AAATDUf68x4594.jpg-wh_500x0-wm_3-wmp_4-s_1395768412.jpg" title="QQ截图20170822162409.jpg" alt="wKioL1mb6k7xcDU1AAATDUf68x4594.jpg-wh_50" />
要使用域名的方式访问时,需要在windows下的hosts配置文件中加一条关于该域名的记录,
如:
172.16.72.4 www.wujunqi2.com
为www2虚拟主机设置https服务:
首先在客户端处生成私钥,及其请求证书:
650) this.width=650;" src="https://s3.51cto.com/wyfs02/M02/00/B4/wKiom1mb_0SCKcEGAACG5tz94hg361.jpg-wh_500x0-wm_3-wmp_4-s_2709827161.jpg" title="QQ截图20170822175346.jpg" alt="wKiom1mb_0SCKcEGAACG5tz94hg361.jpg-wh_50" />
650) this.width=650;" src="https://s2.51cto.com/wyfs02/M02/9F/64/wKioL1mb_5nSh6PpAABj0b9AxYc796.jpg-wh_500x0-wm_3-wmp_4-s_3226994824.jpg" title="QQ截图20170822175524.jpg" alt="wKioL1mb_5nSh6PpAABj0b9AxYc796.jpg-wh_50" />
使用scp将客户端请求证书发往私人CA处:
650) this.width=650;" src="https://s2.51cto.com/wyfs02/M01/9F/64/wKioL1mb_9KA2xHrAAAfcwtsvBQ167.jpg-wh_500x0-wm_3-wmp_4-s_2182214352.jpg" title="QQ截图20170822175611.jpg" alt="wKioL1mb_9KA2xHrAAAfcwtsvBQ167.jpg-wh_50" />
安装mod_ssl,使用yum install mod_ssl
mod_ssl是https使用的前提
构建私人CA:
将私钥以及公钥放在指定路径下
私钥:/etc/pki/CA/private/cakey.pem
公钥:/etc/pki/CA/cacert.pem
创建两个私人CA需要的配置文件在/etc/pki/CA下
echo 01 > serial
touch index.txt
650) this.width=650;" src="https://s4.51cto.com/wyfs02/M00/9F/64/wKioL1mcAaSzsB62AAA0ncXptZY732.jpg-wh_500x0-wm_3-wmp_4-s_3089699713.jpg" title="QQ截图20170822180351.jpg" alt="wKioL1mcAaSzsB62AAA0ncXptZY732.jpg-wh_50" />
650) this.width=650;" src="https://s4.51cto.com/wyfs02/M00/9F/64/wKioL1mcAi2gSDUHAABov5VOHUo312.jpg-wh_500x0-wm_3-wmp_4-s_2430241693.jpg" title="QQ截图20170822180558.jpg" alt="wKioL1mcAi2gSDUHAABov5VOHUo312.jpg-wh_50" />
使用scp将生成的客户端证书发送给客户端
650) this.width=650;" src="https://s4.51cto.com/wyfs02/M01/9F/64/wKioL1mcAorBmyGzAAAtNbZcSI8284.jpg-wh_500x0-wm_3-wmp_4-s_1335798757.jpg" title="QQ截图20170822180750.jpg" alt="wKioL1mcAorBmyGzAAAtNbZcSI8284.jpg-wh_50" />
客户端:
650) this.width=650;" src="https://s3.51cto.com/wyfs02/M02/05/B9/wKiom1mqk7eRmPXCAAAbScc_-qQ363.jpg-wh_500x0-wm_3-wmp_4-s_2803277552.jpg" title="QQ截图20170902191832.jpg" alt="wKiom1mqk7eRmPXCAAAbScc_-qQ363.jpg-wh_50" />
将服务器端私人CA的公钥到处到本地windows下,并将其导入到浏览器中的证书文件中
如:谷歌
650) this.width=650;" src="https://s5.51cto.com/wyfs02/M01/A4/6A/wKioL1mqlD6DPx01AADZ8-BkoX8201.jpg-wh_500x0-wm_3-wmp_4-s_595276395.jpg" title="QQ截图20170902192125.jpg" alt="wKioL1mqlD6DPx01AADZ8-BkoX8201.jpg-wh_50" />
客户端下/etc/httpd/conf.d/ssl.conf
650) this.width=650;" src="https://s4.51cto.com/wyfs02/M01/05/B9/wKiom1mqlKOzT5LnAABeTe7d0EM982.jpg-wh_500x0-wm_3-wmp_4-s_2855975810.jpg" title="QQ截图20170902192243.jpg" alt="wKiom1mqlKOzT5LnAABeTe7d0EM982.jpg-wh_50" />
设置客户端的私钥以及认证完后的证书存放路径,分别用指令SSLCertificateKeyFile和
SSLCertificateFile;
https设置结果:
650) this.width=650;" src="https://s3.51cto.com/wyfs02/M00/A4/6A/wKioL1mqlYfyUWx6AAAlUu_scGA911.jpg-wh_500x0-wm_3-wmp_4-s_618176730.jpg" title="QQ截图20170902192650.jpg" alt="wKioL1mqlYfyUWx6AAAlUu_scGA911.jpg-wh_50" />
使用CentOS7.0建立httpd服务,主要实现的功能有:
①建立两个虚拟主机www1,www2,拥有单独的错误日志和访问日志;
②通过www1的server-status能够查看状态信息,但只有link用户能够访问;
③www2设置访问范围,允许其他主机访问,但不允许192.168.1.0/24IP地址访问;
④为www2提供https服务;
在centos7的/etc/httpd/conf.d下创建片配置文件vhosts-www1.conf与vhosts-www2.conf
vhosts-www1.conf:
650) this.width=650;" src="https://s1.51cto.com/wyfs02/M00/9F/66/wKioL1mcHzPDQZZ6AABRdG1qdBg611.jpg-wh_500x0-wm_3-wmp_4-s_417812908.jpg" title="QQ截图20170822201010.jpg" alt="wKioL1mcHzPDQZZ6AABRdG1qdBg611.jpg-wh_50" />
CentOS7的httpd是2.4版本的,该版本下的片配置文件的书写大致相同,不同在于,CentOS6.7对于访问范围若不指定时默认是全部,而CentOS7对于访问范围不指定时默认的就是没有,这样所有的IP都无法访问该网页;
Require all granted:全部IP都可以访问;
Require all denied:全部IP都不可以访问;
设置服务器状态的访问权限也同CentOS6一样;
创建根目录,并在根目录中加入网页文件;
650) this.width=650;" src="https://s1.51cto.com/wyfs02/M00/9F/66/wKioL1mcImqAbix7AAANR2C5v9s006.jpg-wh_500x0-wm_3-wmp_4-s_63973399.jpg" title="QQ截图20170822201819.jpg" alt="wKioL1mcImqAbix7AAANR2C5v9s006.jpg-wh_50" />
创建错误日志以及访问日志的目录:
650) this.width=650;" src="https://s4.51cto.com/wyfs02/M02/00/B6/wKiom1mcIqvhJ6GzAAATsGhJ5QM663.jpg-wh_500x0-wm_3-wmp_4-s_2724604214.jpg" title="QQ截图20170822202453.jpg" alt="wKiom1mcIqvhJ6GzAAATsGhJ5QM663.jpg-wh_50" />
重载httpd配置文件:
systemctl reload httpd.service
www1运行结果:
主页
650) this.width=650;" src="https://s4.51cto.com/wyfs02/M01/9F/66/wKioL1mcIvyhSyE8AAARujeLljg168.jpg-wh_500x0-wm_3-wmp_4-s_4136131979.jpg" title="QQ截图20170822202621.jpg" alt="wKioL1mcIvyhSyE8AAARujeLljg168.jpg-wh_50" />
server-status
650) this.width=650;" src="https://s4.51cto.com/wyfs02/M00/00/B6/wKiom1mcI3nwd6_PAABAF5H0jsA421.jpg-wh_500x0-wm_3-wmp_4-s_3661478244.jpg" title="QQ截图20170822202819.jpg" alt="wKiom1mcI3nwd6_PAABAF5H0jsA421.jpg-wh_50" />
650) this.width=650;" src="https://s4.51cto.com/wyfs02/M01/00/B6/wKiom1mcI6TDzXZvAACVgIKDOkQ282.jpg-wh_500x0-wm_3-wmp_4-s_3616857874.jpg" title="QQ截图20170822202856.jpg" alt="wKiom1mcI6TDzXZvAACVgIKDOkQ282.jpg-wh_50" />
vhosts-www2.conf:
650) this.width=650;" src="https://s2.51cto.com/wyfs02/M01/9F/67/wKioL1mcKzbg49pgAABDovXxlRI092.jpg-wh_500x0-wm_3-wmp_4-s_1318430604.jpg" title="QQ截图20170822210129.jpg" alt="wKioL1mcKzbg49pgAABDovXxlRI092.jpg-wh_50" />
同时控制主机访问以及拒绝时,需要将其放置在<RequireAll></RequireAll>中进行设置;
创建根目录以及日志目录:
650) this.width=650;" src="https://s5.51cto.com/wyfs02/M00/9F/67/wKioL1mcK77hNS4aAAAj1fz0L_0644.jpg-wh_500x0-wm_3-wmp_4-s_2424540888.jpg" title="QQ截图20170822210347.jpg" alt="wKioL1mcK77hNS4aAAAj1fz0L_0644.jpg-wh_50" />
httpd -t验证语法是否正确:
650) this.width=650;" src="https://s4.51cto.com/wyfs02/M02/9F/67/wKioL1mcK--TVbnpAAAw8csHoYU624.jpg-wh_500x0-wm_3-wmp_4-s_963855226.jpg" title="QQ截图20170822210434.jpg" alt="wKioL1mcK--TVbnpAAAw8csHoYU624.jpg-wh_50" />
重载httpd配置文件:
systemctl reload httpd.service
www2运行结果:
650) this.width=650;" src="https://s1.51cto.com/wyfs02/M00/9F/67/wKioL1mcLILw17hLAAAVd2VDQog506.jpg-wh_500x0-wm_3-wmp_4-s_2208068327.jpg" title="QQ截图20170822210658.jpg" alt="wKioL1mcLILw17hLAAAVd2VDQog506.jpg-wh_50" />
www2设置https:
创建私人CA:
650) this.width=650;" src="https://s3.51cto.com/wyfs02/M00/A4/6B/wKioL1mqr9Txg2gRAABneJol_sQ577.jpg-wh_500x0-wm_3-wmp_4-s_1518612829.jpg" title="QQ截图20170902211855.jpg" alt="wKioL1mqr9Txg2gRAABneJol_sQ577.jpg-wh_50" />
650) this.width=650;" src="https://s3.51cto.com/wyfs02/M02/05/BA/wKiom1mqsBLALoyxAABzI-IRgnc206.jpg-wh_500x0-wm_3-wmp_4-s_1650353923.jpg" title="QQ截图20170902211942.jpg" alt="wKiom1mqsBLALoyxAABzI-IRgnc206.jpg-wh_50" />
客户端配置:
yum install httpd
yum install mod_ssl
vim /etc/httpd/conf.d/ssl.conf
650) this.width=650;" src="https://s5.51cto.com/wyfs02/M01/A4/6B/wKioL1mqsGaiIbjVAAA6uXZi-TQ347.jpg-wh_500x0-wm_3-wmp_4-s_3541616132.jpg" title="QQ截图20170902212135.jpg" alt="wKioL1mqsGaiIbjVAAA6uXZi-TQ347.jpg-wh_50" />
mkdir -p /myweb/vhosts/www2
在该目录下创建index.html文件;
配置该客户端的私钥,并生成证书请求文件
650) this.width=650;" src="https://s3.51cto.com/wyfs02/M01/A4/6B/wKioL1mqsO2Sx9Q6AABVjSk02vs086.jpg-wh_500x0-wm_3-wmp_4-s_442877557.jpg" title="QQ截图20170902212349.jpg" alt="wKioL1mqsO2Sx9Q6AABVjSk02vs086.jpg-wh_50" />
650) this.width=650;" src="https://s4.51cto.com/wyfs02/M02/05/BA/wKiom1mqsTvDH59LAABip6AYCSg109.jpg-wh_500x0-wm_3-wmp_4-s_3424475599.jpg" title="QQ截图20170902212435.jpg" alt="wKiom1mqsTvDH59LAABip6AYCSg109.jpg-wh_50" />
将httpd.csr文件发往服务器端,生成证书
650) this.width=650;" src="https://s1.51cto.com/wyfs02/M02/A4/6B/wKioL1mqsVTBFRxnAABDyuY6g5U863.jpg-wh_500x0-wm_3-wmp_4-s_3031184184.jpg" title="QQ截图20170902212532.jpg" alt="wKioL1mqsVTBFRxnAABDyuY6g5U863.jpg-wh_50" />
将该证书发往客户端,并将服务器端的CA公钥放在windows下,将其导入到要访问的浏览器的证书中;
客户端:
650) this.width=650;" src="https://s3.51cto.com/wyfs02/M02/05/BA/wKiom1mqscWDvmZJAAAUamSEx1s310.jpg-wh_500x0-wm_3-wmp_4-s_3369177735.jpg" title="QQ截图20170902212656.jpg" alt="wKiom1mqscWDvmZJAAAUamSEx1s310.jpg-wh_50" />
浏览器:
650) this.width=650;" src="https://s2.51cto.com/wyfs02/M01/A4/6B/wKioL1mqscWxYOg1AAArG4FSn9I286.jpg-wh_500x0-wm_3-wmp_4-s_2784645692.jpg" title="QQ截图20170902212724.jpg" alt="wKioL1mqscWxYOg1AAArG4FSn9I286.jpg-wh_50" />
http主要应用
原文地址:http://12480612.blog.51cto.com/12470612/1962192