如果推理服务选用HTTPS协议,则需要使用CA签发服务器端证书和客户端证书,建议具备条件的用户向专业的CA机构申请CA证书,推荐使用X509v3格式的证书进行认证。若选择进行自签名证书制作,为提高安全性,建议在非生产环境中进行。
根据安全要求,RSA算法密钥长度至少为3072位,建议使用3072位。请确保使用“-aes256”等命令进行密钥加密,如果输入的密码为空,产生的私钥是明文,有安全风险,同时MD5、SHA1、RSA1024用于加密有安全风险,不建议使用。请合理设置证书有效期,建议不要超过36个月。
mkdir ca && cd ca
[ req ] distinguished_name = req_distinguished_name prompt = no [ req_distinguished_name ] O = mxVision [ v3_ca ] subjectKeyIdentifier = hash authorityKeyIdentifier = keyid:always,issuer basicConstraints = critical, CA:true keyUsage = critical, digitalSignature, cRLSign, keyCertSign
openssl genrsa -aes256 -out ca.key 4096
openssl req -out ca.csr -key ca.key -new -config ./ca_cert.conf
openssl x509 -req -in ca.csr -out ca.crt -sha256 -days 1000 -extfile ./ca_cert.conf -extensions v3_ca -signkey ca.key
mkdir server && cd server
[ req ] distinguished_name = req_distinguished_name prompt = no [ req_distinguished_name ] O = mxVision CN = [ v3_ca ] authorityKeyIdentifier = keyid,issuer basicConstraints = CA:FALSE keyUsage = digitalSignature, nonRepudiation, keyEncipherment, dataEncipherment
“CN”字段需要根据需求改为服务器对应的域名、IP地址。
openssl genrsa -aes256 -out server.key 4096
openssl req -out server.csr -key server.key -new -config ./server_cert.conf
openssl x509 -req -in server.csr -out server.crt -sha256 -CAcreateserial -days 1000 -extfile ./server_cert.conf -extensions v3_ca -CA ../ca/ca.crt -CAkey ../ca/ca.key
输入ca密码。
mkdir client && cd client
[ req ] distinguished_name = req_distinguished_name prompt = no [ req_distinguished_name ] O = mxvision CN = [ v3_ca ] authorityKeyIdentifier = keyid,issuer basicConstraints = CA:FALSE keyUsage = digitalSignature, nonRepudiation, keyEncipherment, dataEncipherment
“CN”字段需要根据需求改为服务器对应的域名、IP地址。
openssl genrsa -aes256 -out client.key 4096
openssl req -out client.csr -key client.key -new -config ./client_cert.conf
openssl x509 -req -in client.csr -out client.crt -sha256 -CAcreateserial -days 1000 -extfile ./client_cert.conf -extensions v3_ca -CA ../ca/ca.crt -CAkey ../ca/ca.key
输入ca密码。