在Debian系统上使用OpenSSL时,遵循以下最佳实践可以确保系统的安全性和稳定性:
sudo apt-get update
sudo apt-get install libssl-dev
wget https://www.openssl.org/source/openssl-1.1.1.tar.gz
tar -xzvf openssl-1.1.1.tar.gz
cd openssl-1.1.1
./config --prefix=/usr/local/openssl shared zlib
make -j$(nproc)
sudo make install
sudo apt update
sudo apt upgrade openssl libssl-dev
/etc/ssl/openssl.cnf
),确保使用安全的加密算法和协议,如AES-256-GCM和TLSv1.3。[req]
distinguished_name = req_distinguished_name
req_extensions = v3_req
[v3_req]
keyUsage = keyEncipherment, dataEncipherment
extendedKeyUsage = serverAuth
subjectAltName = @alt_names
[alt_names]
DNS.1 = yourdomain.com
DNS.2 = www.yourdomain.com
[openssl_init]
openssl_conf = openssl_init
[openssl_init_section]
system_default = system_default_section
[system_default_section]
SSLEngine = on
SSLProtocol all -SSLv2 -SSLv3
SSLCipherSuite HIGH:!aNULL:!MD5
mkdir /etc/nginx/ssl
chmod 700 /etc/nginx/ssl
openssl genpkey -algorithm RSA -out /etc/nginx/ssl/nginx.key
openssl req -new -key /etc/nginx/ssl/nginx.key -out /etc/nginx/ssl/nginx.csr
openssl x509 -req -days 365 -in /etc/nginx/ssl/nginx.csr -signkey /etc/nginx/ssl/nginx.key -out /etc/nginx/ssl/nginx.crt
server {
listen 443 ssl;
server_name yourdomain.com;
ssl_certificate /etc/nginx/ssl/nginx.crt;
ssl_certificate_key /etc/nginx/ssl/nginx.key;
location / {
try_files $uri $uri/ =404;
}
}
然后重启Nginx:sudo systemctl restart nginx
通过遵循这些最佳实践,可以确保在Debian系统上安装和使用OpenSSL时的安全性、稳定性和高效性。