kernel=vmlinux cobd0="c:\coLinux\Ubuntu-9.04.ext3.1gb.fs" cobd1="c:\coLinux\fs_768Mb" cofs0="c:\colinux_winshare" root=/dev/cobd0 ro #initrd=initrd.gz mem=512 cocon=120x38 # Slirp for internet connection (outgoing) # Inside running coLinux configure eth0 with this static settings: # ipaddress 10.0.2.15 broadcast 10.0.2.255 netmask 255.255.255.0 # gateway 10.0.2.2 nameserver 10.0.2.3 eth0=slirp # Tuntap as private network between guest and host on second linux device eth1=tuntap # Setup for serial device #ttys0=COM1,"BAUD=115200 PARITY=n DATA=8 STOP=1 dtr=on rts=on" # Run an application on colinux start (Sample Xming, a Xserver) #exec0=C:\Programs\Xming\Xming.exe,":0 -clipboard -multiwindow -ac"
root@colinuc:~# echo "export proxy='http://(proxy server):(port)'" > .bash_prifile root@colinuc:~# source .bash_profile
root@colinuc:~# ln -sf /usr/share/zoneinfo/Japan /etc/localtime
root@colinuc:~# apt-get console-data
ー 辞書ビューワーには Ubuntu のパッケージとして提供される EBView というアプリを利用した
root@spirit:/root# sudo -s root@spirit:/root# cd /etc/ssl/CA root@spirit:/etc/ssl/CA# cat /dev/null > index.txt root@spirit:/etc/ssl/CA# echo '01' > serial root@spirit:/etc/ssl/CA# echo '01' > crlnumber
root@spirit:/etc/ssl/CA# openssl genrsa -out private/cakey.pem 1024 Generating RSA private key, 1024 bit long modulus ......................................................................................................................... ++++++ ...............++++++ e is 65537 (0x10001) root@spirit:/etc/ssl/CA# ls -l private/ 合計 4 -rw-r--r-- 1 root root 887 2010-03-21 10:59 cakey.pem
root@spirit:/etc/ssl/CA# openssl req -new -x509 -days 3560 -key private/cakey.pem -out cacert.pem You are about to be asked to enter information that will be incorporated into your certificate request. What you are about to enter is what is called a Distinguished Name or a DN. There are quite a few fields but you can leave some blank For some fields there will be a default value, If you enter '.', the field will be left blank. ----- Country Name (2 letter code) [JP]:JP State or Province Name (full name) [Kanagawa]:Kanagawa Locality Name (eg, city) []:Yokohama Organization Name (eg, company) [IT admin]:hmuna Organizational Unit Name (eg, section) [IT]: Common Name (eg, YOUR name) []:mail.hmuna.com Email Address []:server-admin@hmuna.com
root@spirit:/etc/ssl/Servr# openssl genrsa -out private.pem 1024 Generating RSA private key, 1024 bit long modulus ........................++++++ .......++++++ e is 65537 (0x10001)
ーー 認証局に署名してもらう為リクエストを作成
root@spirit:/etc/ssl/Servr# openssl req -new -key private.pem -out request.pem You are about to be asked to enter information that will be incorporated into your certificate request. What you are about to enter is what is called a Distinguished Name or a DN. There are quite a few fields but you can leave some blank For some fields there will be a default value, If you enter '.', the field will be left blank. ----- Country Name (2 letter code) [JP]:JP State or Province Name (full name) [Kanagawa]:Kanagawa Locality Name (eg, city) []:Yokohama Organization Name (eg, company) [IT admin]: Organizational Unit Name (eg, section) [IT]: Common Name (eg, YOUR name) []:mail.hmuna.com Email Address []:server-admin@hmuna.com Please enter the following 'extra' attributes to be sent with your certificate request A challenge password []: <-------- 空でエンター An optional company name []: <-------- 空でエンター
ーー CAで署名
root@spirit:/etc/ssl/Servr# cp /etc/ssl/openssl.cnf ./.
root@spirit:/etc/ssl/Servr# openssl ca -config openssl.cnf -policy policy_anything -out ./cert-ca.pem -infiles request.pem
Using configuration from openssl.cnf
Check that the request matches the signature
Signature ok
Certificate Details:
Serial Number: 1 (0x1)
Validity
Not Before: Mar 21 02:03:39 2010 GMT
Not After : Mar 18 02:03:39 2020 GMT
Subject:
countryName = JP
stateOrProvinceName = Kanagawa
localityName = Yokohama
organizationName = IT admin
organizationalUnitName = IT
commonName = mail.hmuna.com
emailAddress = server-admin@hmuna.com
X509v3 extensions:
X509v3 Basic Constraints:
CA:FALSE
Netscape Cert Type:
SSL Server
Netscape Comment:
OpenSSL Generated Certificate
X509v3 Subject Key Identifier:
BF:B1:75:09:3E:34:61:DF:40:BC:CE:1B:A9:92:48:9A:C9:17:89:F7
X509v3 Authority Key Identifier:
keyid:98:A8:56:F1:51:52:00:91:29:4B:CA:FA:62:BF:4B:BB:ED:15:A7:11
Certificate is to be certified until Mar 18 02:03:39 2020 GMT (3650 days)
Sign the certificate? [y/n]:y
1 out of 1 certificate requests certified, commit? [y/n]y
Write out database with 1 new entries
Data Base Updated
root@spirit:/etc/ssl/Servr# openssl x509 -in cert-ca.pem -out cert.pem
root@spirit:/etc/ssl/Servr# cat private.pem cert.pem > mail.pem
root@spirit:/etc/ssl/Servr# openssl verify -CAfile /etc/ssl/CA/cacert.pem cert-ca.pem cert-ca.pem: OK root@spirit:/etc/ssl/Servr# openssl verify -CAfile /etc/ssl/CA/cacert.pem cert.pem cert.pem: OK
root@spirit:/etc/ssl/Servr# cd /etc/ssl/CA root@spirit:/etc/ssl/CA# openssl x509 -inform pem -in cacert.pem -out ca.der -outform der
root@spirit:/etc/ssl/tlskey# openssl req -new -x509 -days 3650 -nodes -out shoumei.pem -keyout himitsu.key Generating a 1024 bit RSA private key ..++++++ ...........++++++ writing new private key to 'himitsu.key' ----- You are about to be asked to enter information that will be incorporated into your certificate request. What you are about to enter is what is called a Distinguished Name or a DN. There are quite a few fields but you can leave some blank For some fields there will be a default value, If you enter '.', the field will be left blank. ----- Country Name (2 letter code) [JP]:JP State or Province Name (full name) [Kanagawa]:Kanagawa Locality Name (eg, city) []:Yokohama Organization Name (eg, company) [IT admin]:IT admin Organizational Unit Name (eg, section) [IT]:IT Common Name (eg, YOUR name) []:mail.hmuna.com Email Address []:server-admin@hmuna.com
root@spirit:/etc/ssl/tlskey# ls -l 合計 8 -rw-r--r-- 1 root root 887 2010-05-03 14:39 himitsu.key -rw-r--r-- 1 root root 1350 2010-05-03 14:39 shoumei.pem
root@spirit:/etc/ssl/tlskey# openssl x509 -inform pem -outform der -in shoumei.pem -out shoumei.der root@spirit:/etc/ssl/tlskey# ls -l 合計 12 -rw-r--r-- 1 root root 887 2010-05-03 14:39 himitsu.key -rw-r--r-- 1 root root 955 2010-05-03 14:42 shoumei.der -rw-r--r-- 1 root root 1350 2010-05-03 14:39 shoumei.pem
root@spirit:/etc/ssl/tlskey# cat shoumei.pem himitsu.key > courier.pem