Skip to main content

CHUYỂN SSL SANG LEGACY SSL

 CHUYỂN SSL SANG LEGACY SSL

Một số server hoặc application cũ không hỗ trợ SSL cipher mới, buộc phải "convert" về định dạng legacy. Cách thực hiện là dùng OpenSSL

1. Tải và cài đặt OpenSSL

2. Cấu hình lại file config để load Legacy module

- Mở CMD, 

- Kiểm tra file config OpenSSL: 

openssl version -d

- Kiểm provider:

openssl list -providers


3. Sửa cấu hình file openssl.cnf

- Mở file openssl.cnf (thường ở thư mục Program Files\Common Files)

- Thêm dòng 

legacy = legacy_sect

- Xóa dấu # trước [Default sect]

- Thêm dòng:

[legacy_sect]

activate = 1

4. Kiểm tra lại provider:



5. Chỉnh lại đường dẫn môi trường dll.

Trong 1 số trường hợp OpenSSL bị sai đường dẫn thư viện, cần tìm đường dẫn và chỉnh lại cho chính xác:

setx OPENSSL_MODULES "C:\Program Files\OpenSSL-Win64\bin"


6. Chạy lệnh convert SSL:

openssl pkcs12 -in new.pfx -out temp.pem -provider legacy -nodes

(*) "new.pfx" là file ssl hiện tại, "temp.pem" là file xuất tạm

openssl pkcs12 -export -in temp.pem -out legacy.pfx -legacy

(*) "legacy.pfx" là file đã convert qua legacy


Comments

Popular posts from this blog

[RAID] SWITCH FROM AHCI TO RAID WITH INTEL C600 CONTROLLER

I personally have used other ways to do this. Manipulating some registry settings in combination with a safe boot before booting normally does the trick as well. This works with both SATA SSD and M.2 NVMe drives and it enables relatively fast switching between back and forth between AHCI and RAID. I have described this method below.  I have also tried the same process used to switch from RAD to AHCI and that works as well. Switch to safe boot Reboot into BIOS Change from AHCI to RAID in the BIOS Boot into safe mode Turn off safe mode and reboot normally again Nothing else and that also did the trick, just like with moving from RAID to AHCI.  So the link above and my step by step below is here for completeness. You have options in case one of them doesn’t work! Step by step AHCI to RAID registry method This procedure I describe below works on Windows 10 1803/1809 and has been tested on Dell Latitude E6220 an XPS 13 9360. Editing the registry is...

TẠO DKIM RECORD CHO EXCHANGE SERVER

  Source: https://www.linkedin.com/pulse/how-configure-dkim-exchange-2019-simple-way-seyed-abdollahi Installation In Exchange Online DKIM is a built-in service, but on an on-prem Exchange 2019 deployment we need a 3rd party application to add this functionality to our Exchange infrastructure. In this guide we use Stefan Profanter's excellent dkim-exchange application for this purpose, which is available here:  https://github.com/Pro/dkim-exchange/releases/latest After installing the program, we open  Configuration.DkimSigner.exe and click on the "Install" button, or download the installer straight from https://codeload.github.com/Pro/dkim-exchange/legacy.zip/v*** Configuration After installation finished, open the configurator. C:\Program Files\Exchange DkimSigner\Configuration.DkimSigner.exe Click on the "Configure" button and move the DkimSigner agent to the very bottom of the list. Under the DKIM settings tab select relaxed canonicalization as Exchange t...

GIA HẠN SSL CHO EXCHANGE SERVER 2019

LINK: https://www.alitajran.com/create-certificate-exchange-server/#h-step-2-generate-exchange-certificate-request  ==Create request SSL New-ExchangeCertificate -Server "EXIDC1" -GenerateRequest -FriendlyName "EXCERT2025" -PrivateKeyExportable $true -SubjectName "c=VN, s=HCM, l=HCM, o=TTT, ou=IT, cn=mail.ttt.vn" -DomainName mail.ttt.vn,autodiscover.ttt.vn,autodiscover.saigonxanh.com,autodiscover.mpu.edu.vn ==Complete SSL Import-ExchangeCertificate -FileData ([System.IO.File]::ReadAllBytes('\\exidc1\Cert$\2378696128.crt')) -PrivateKeyExportable:$true -Password (ConvertTo-SecureString -String 'tttcompany' -AsPlainText -Force)