内容字号:默认大号超大号

段落设置:段首缩进取消段首缩进

字体设置:切换到微软雅黑切换到宋体

Let’s Encrypt通配符证书之教程二(自动签发)

2018-03-18 17:06 出处:清屏网 人气: 评论(0

又坑我了。

生成证书时报错了:

[Sun Mar 18 10:19:22 CST 2018] Create new order error. Le_OrderFinalize not found. {"type":"urn:ietf:params:acme:error:malformed","detail":"No Key ID in JWS header","status": 400}
[Sun Mar 18 10:19:22 CST 2018] Please check log file for more details: /root/.acme.sh/acme.sh.log

然后,解决方案终于找到:

https://github.com/Neilpang/acme.sh/issues/1372

执行以下命令,再重新签发即可:

export BRANCH=dev
acme.sh --upgrade

1.首先安装 acme:

https://github.com/Neilpang/acme.sh
curl https://get.acme.sh | sh
source ~/.bashrc

2.绑定阿里云密钥(如果以后要添加的域名也在阿里,这种方式挺方便的):

阿里云(Access Key管理)地址: https://ak-console.aliyun.com/?spm=5176.2020520130.0.0.kqpL4n#/accesskey

export Ali_Key="AAAAAAAAAAAAA"
export Ali_Secret="BBBBBBBBBBBBBB"

3.签发证书:

acme.sh --issue -d ocms.cc -d *.ocms.cc --dns dns_ali --keylength ec-256 --ecc --log --force

4.签发成功(120秒后):

5.再配置到 nginx 下,重启 nginx 即可:

listen 443 ssl http2;
 #https
 ssl_certificate conf/ssl/TrustAsia/skiy.net.pem;
 ssl_certificate_key conf/ssl/TrustAsia/skiy.net.key;
 
 ssl_prefer_server_ciphers on;
   #ssl_dhparam conf/ssl/dhparam.pem;
 
 ssl_protocols              TLSv1 TLSv1.1 TLSv1.2;
 ssl_ciphers                TLS13-AES-256-GCM-SHA384:TLS13-CHACHA20-POLY1305-SHA256:TLS13-AES-128-GCM-SHA256:TLS13-AES-128-CCM-8-SHA256:TLS13-AES-128-CCM-SHA256:EECDH+CHACHA20:EECDH+CHACHA20-draft:EECDH+ECDSA+AES128:EECDH+aRSA+AES128:RSA+AES128:EECDH+ECDSA+AES256:EECDH+aRSA+AES256:RSA+AES256:EECDH+ECDSA+3DES:EECDH+aRSA+3DES:RSA+3DES:!MD5;
 
 #ssl_session_cache shared:SSL:10m;
        ssl_session_timeout 5m;
分享给小伙伴们:
本文标签: Encrypt通配符

相关文章

发表评论愿您的每句评论,都能给大家的生活添色彩,带来共鸣,带来思索,带来快乐。

CopyRight © 2015-2016 QingPingShan.com , All Rights Reserved.

清屏网 版权所有 豫ICP备15026204号