便宜SSL证书申请 发布的文章

When comparing Sectigo and DigiCert SSL certificates, there are several key differences to consider:

  1. Brand History and Reputation:

    • Sectigo (formerly Comodo CA) is known for its high market share in SSL certificates and is considered a mid-range brand offering cost-effective solutions.
    • DigiCert is an established American CA that has been providing SSL certificates and management tools for over a decade, positioning itself as a high-trust digital certificate provider, especially favored by large enterprises and organizations.
  2. Types of SSL Certificates Offered:

    • Sectigo offers a variety of SSL certificates, including DV, OV, EV, and code signing certificates, catering to different user needs.
    • DigiCert focuses on SSL innovation and provides a full range of SSL certificates, tools, and management platforms. It does not offer entry-level DV certificates, focusing instead on OV and EV certificates.
  3. Pricing:

    • Sectigo is considered a budget-friendly brand, with certificates available for as low as around a hundred dollars, making it an ideal choice for individuals and small to medium-sized enterprises.
    • DigiCert is positioned as a premium brand with prices starting in the thousands of dollars, suitable for large corporations, financial institutions, government websites, and other entities that require high levels of security and trust.
  4. Application Process:

    • The process for obtaining SSL certificates from both Sectigo and DigiCert is similar, involving domain verification and, for OV and EV certificates, organizational validation.
  5. Encryption Strength:

    • Both Sectigo and DigiCert offer SSL certificates that provide strong encryption, with most certificates providing 256-bit encryption strength, which is considered sufficient to deter hacking attempts.
  6. Validation Levels:

    • Sectigo and DigiCert both offer DV, OV, and EV certificates, with each level providing a different depth of validation and assurance to users.
  7. Customer Support and Warranties:

    • Sectigo offers SSL warranties ranging from $10,000 to up to $1,750,000, depending on the certificate type and brand image.
    • DigiCert, as a premium brand, offers higher warranty amounts, typically in the range of $1.5 million to $2 million.

In conclusion, the choice between Sectigo and DigiCert depends on your specific needs and budget. If you are cost-conscious and need a reliable SSL certificate, Sectigo might be the better option. However, if you prioritize security, encryption strength, and compatibility with browsers and devices, DigiCert could be more suitable. Both are authoritative CA institutions capable of providing sufficient security for websites, and the choice can be based on the website's requirements and budget.

Sectigo and Comodo CA are closely related, with Sectigo being the rebranded version of Comodo CA. Here are the key differences and points of comparison between the two:

  1. Rebranding: Sectigo was originally known as Comodo CA. The rebranding took place to emphasize the company's expansion beyond SSL certificates to web security solutions and to demonstrate a renewed commitment to innovation and service .
  2. Product Continuity: Despite the name change, the products and services offered by Sectigo remain the same as those offered by Comodo CA. The rebranding does not affect the functionality or the trustworthiness of the certificates .
  3. Market Position: Sectigo (formerly Comodo CA) is recognized as the largest commercial Certificate Authority in the world, having issued over 100 million digital certificates and working with more than 700,000 businesses globally .
  4. Product Range: Sectigo continues to offer a wide range of SSL/TLS certificates, including domain-validated (DV), organization-validated (OV), and extended-validation (EV) certificates, as well as multi-domain and wildcard certificates .
  5. Pricing: Sectigo maintains competitive pricing, which was a hallmark of Comodo CA. They offer multiple levels of security, price points, and packages suitable for businesses of all sizes .
  6. Trust and Compatibility: Sectigo certificates are trusted by all major browsers, ensuring compatibility and a seamless user experience across different platforms .
  7. Customer Support: Sectigo continues to provide the same level of support and service that customers received from Comodo CA, with no changes in account manager phone numbers and a commitment to minimal disruption during the transition .
  8. Global Presence: Sectigo has a global presence, with a mission to be the world’s most trusted, innovative, and customer-centric partner for protecting organizations’ identities, web presence, and connected devices .

In summary, Sectigo and Comodo CA are essentially the same entity, with the only significant change being the brand name and the potential for expanded services under the Sectigo brand. The transition from Comodo CA to Sectigo is intended to be seamless for customers, with no changes to existing certificates, pricing, or the level of support .

To check if your SSL certificate is properly installed after restarting Apache, you can follow these steps:

  1. Browser Test: Visit your website using the secure HTTPS URL (e.g., https://www.yourdomain.com). If your browser shows a padlock icon in the address bar and does not display any security warnings, this is a good indication that your SSL certificate is working correctly.
  2. Certificate Details: You can view the certificate details directly in your browser. Most browsers allow you to click on the padlock icon and view the certificate details to ensure it's the certificate you expect, checking the Subject, Issuer, and Valid To fields.
  3. Command Line Tools: Use OpenSSL to connect to your server and verify the certificate. Run the following command in your terminal:

    openssl s_client -connect yourdomain.com:443

    This command will show you the connection details and the certificate information. Look for the certificate part in the output to ensure it matches your installed certificate.

  4. Apache Configuration Test: Before restarting Apache, it's a best practice to test your Apache configuration file for any errors. You can do this by running:

    apachectl configtest

    If the command responds with “Syntax OK,” then your configuration file is correct.

  5. SSL Certificate Checker Tools: Use online SSL checkers like the one provided by SSLTrust to verify your SSL Certificate on your web server. These tools will display the Common Name, server type, issuer, validity, certificate chaining, and more certificate details.
  6. Server Logs: Check your Apache server logs for any SSL-related errors. The logs are typically located in /var/log/apache2/ or /var/log/httpd/, depending on your system configuration.
  7. Reloading Apache: If you made changes to the SSL configuration, ensure you reload Apache to apply those changes. You can do this by running:

    sudo systemctl reload apache2

    On systems using a different init system, you might use:

    sudo service apache2 reload

    This ensures that your changes are applied without needing a full restart.

By following these steps, you can verify that your SSL certificate is properly installed and functioning after restarting Apache.

Restarting Apache after installing an SSL certificate is a straightforward process. Here’s how you can do it:

For Linux Systems Using Systemd (e.g., Ubuntu 16.04 and later, CentOS 7 and later)

  1. Open Terminal: You can do this by searching for "Terminal" in your system's application launcher or by using the keyboard shortcut Ctrl + Alt + T.
  2. Gain Superuser Privileges: You might need superuser (root) privileges to restart the Apache service. You can gain these privileges by using the sudo command.
  3. Restart Apache:

    sudo systemctl restart apache2

    This command will restart the Apache service, applying any changes you've made, including the installation of new SSL certificates.

For Older Linux Systems Using SysVinit (e.g., Ubuntu 14.04, CentOS 6)

If you're using an older Linux distribution that doesn't use systemd, you can restart Apache with the following command:

  1. Open Terminal.
  2. Gain Superuser Privileges.
  3. Restart Apache:

    sudo service apache2 restart

    This command will restart the Apache server.

For Windows Systems

If you're running Apache on a Windows system, you can restart the service through the Services management console or the command line.

  1. Open Command Prompt as Administrator:

    • Search for "cmd" in the Start menu.
    • Right-click on "Command Prompt" and select "Run as administrator".
  2. Restart Apache Service:

    net stop apache2
    net start apache2

    These commands will stop and then start the Apache service, respectively.

Verification

After restarting Apache, it's a good practice to check the service status to ensure it's running properly:

  • On Linux Systems:

    sudo systemctl status apache2

    or for older systems:

    sudo service apache2 status
  • On Windows Systems:
    You can check the status through the Services management console or by running:

    net status apache2

These commands will provide you with the current status of the Apache service. If Apache is running without issues, you should see an output indicating that the service is active (running).

By following these steps, you can ensure that your Apache server is properly restarted after installing SSL certificates, allowing your website to serve content over HTTPS.

Installing an SSL certificate on an Apache web server involves a few steps. Below is a general guide on how to install an SSL certificate that you've obtained, for example, using Let's Encrypt with Certbot:

Prerequisites:

  • You have Apache installed on your server.
  • You have obtained an SSL certificate, for instance, from Let's Encrypt using Certbot.

Step 1: Stop Apache Service (if running)
Before making changes, it's a good idea to stop the Apache service to avoid any conflicts:

sudo systemctl stop apache2

Or, if you're using a different init system:

sudo service apache2 stop

Step 2: Install the Certificate
If you haven't already obtained the SSL certificate using Certbot, you can do so by running:

sudo certbot certonly --standalone -d yourdomain.com

This command will automatically create the necessary certificate files and place them in the Certbot directory, typically /etc/letsencrypt/live/yourdomain.com/.

Step 3: Configure Apache to Use SSL
You need to configure Apache to use the SSL certificate. This involves creating or editing a virtual host configuration file for HTTPS.

Create a new SSL configuration file or edit an existing one in /etc/apache2/sites-available/. You can name it something like yourdomain-le-ssl.conf:

sudo nano /etc/apache2/sites-available/yourdomain-le-ssl.conf

Add the following content, replacing yourdomain.com with your domain name:

<VirtualHost *:443>
    ServerAdmin webmaster@localhost
    ServerName yourdomain.com
    ServerAlias www.yourdomain.com

    DocumentRoot /var/www/html

    ErrorLog ${APACHE_LOG_DIR}/error.log
    CustomLog ${APACHE_LOG_DIR}/access.log combined

    SSLEngine on
    SSLCertificateFile /etc/letsencrypt/live/yourdomain.com/cert.pem
    SSLCertificateKeyFile /etc/letsencrypt/live/yourdomain.com/privkey.pem
    SSLCertificateChainFile /etc/letsencrypt/live/yourdomain.com/chain.pem

    <Directory /var/www/html>
        Options Indexes FollowSymLinks
        AllowOverride All
        Require all granted
    </Directory>

    # Redirect HTTP to HTTPS
    RewriteEngine on
    RewriteCond %{HTTPS} off
    RewriteRule ^(.*)$ https://%{HTTP_HOST}%{REQUEST_URI} [L,R=301]
</VirtualHost>

This configuration does several things:

  • Activates SSL on the virtual host.
  • Specifies the paths to the certificate, key, and chain files.
  • Sets up a directory for your website's content.
  • Adds a rewrite rule to redirect HTTP traffic to HTTPS.

Step 4: Enable the Site and Disable the Default Site (if necessary)
Enable the new site configuration:

sudo a2ensite yourdomain-le-ssl.conf

Disable the default site to avoid conflicts:

sudo a2dissite 000-default.conf

Step 5: Reload Apache
Reload Apache to apply the changes:

sudo systemctl reload apache2

Or, if you're using a different init system:

sudo service apache2 reload

Step 6: Test Your Configuration
It's important to test your Apache configuration for any syntax errors:

sudo apache2ctl configtest

If there are no errors, your SSL setup should be ready.

Step 7: Set Up Automatic Renewal (for Let's Encrypt)
Since Let's Encrypt certificates are only valid for 90 days, you need to set up automatic renewals:

sudo certbot renew --dry-run

This command will test your renewal setup. To automate this process, you can add a cron job:

sudo crontab -e

Add the following line to run the renewal process weekly:

0 0 * * 1 certbot renew --quiet

This will ensure your certificates are automatically renewed before they expire.

That's it! You've successfully installed an SSL certificate on your Apache server. Remember to replace yourdomain.com with your actual domain name and ensure the paths to your certificate files are correct.