便宜SSL证书申请 发布的文章

Sectigo and Comodo CA are closely related, with Sectigo being the rebranded version of Comodo CA. Here are the key differences and points of comparison between the two:

  1. Rebranding: Sectigo was originally known as Comodo CA. The rebranding took place to emphasize the company's expansion beyond SSL certificates to web security solutions and to demonstrate a renewed commitment to innovation and service .
  2. Product Continuity: Despite the name change, the products and services offered by Sectigo remain the same as those offered by Comodo CA. The rebranding does not affect the functionality or the trustworthiness of the certificates .
  3. Market Position: Sectigo (formerly Comodo CA) is recognized as the largest commercial Certificate Authority in the world, having issued over 100 million digital certificates and working with more than 700,000 businesses globally .
  4. Product Range: Sectigo continues to offer a wide range of SSL/TLS certificates, including domain-validated (DV), organization-validated (OV), and extended-validation (EV) certificates, as well as multi-domain and wildcard certificates .
  5. Pricing: Sectigo maintains competitive pricing, which was a hallmark of Comodo CA. They offer multiple levels of security, price points, and packages suitable for businesses of all sizes .
  6. Trust and Compatibility: Sectigo certificates are trusted by all major browsers, ensuring compatibility and a seamless user experience across different platforms .
  7. Customer Support: Sectigo continues to provide the same level of support and service that customers received from Comodo CA, with no changes in account manager phone numbers and a commitment to minimal disruption during the transition .
  8. Global Presence: Sectigo has a global presence, with a mission to be the world’s most trusted, innovative, and customer-centric partner for protecting organizations’ identities, web presence, and connected devices .

In summary, Sectigo and Comodo CA are essentially the same entity, with the only significant change being the brand name and the potential for expanded services under the Sectigo brand. The transition from Comodo CA to Sectigo is intended to be seamless for customers, with no changes to existing certificates, pricing, or the level of support .

To check if your SSL certificate is properly installed after restarting Apache, you can follow these steps:

  1. Browser Test: Visit your website using the secure HTTPS URL (e.g., https://www.yourdomain.com). If your browser shows a padlock icon in the address bar and does not display any security warnings, this is a good indication that your SSL certificate is working correctly.
  2. Certificate Details: You can view the certificate details directly in your browser. Most browsers allow you to click on the padlock icon and view the certificate details to ensure it's the certificate you expect, checking the Subject, Issuer, and Valid To fields.
  3. Command Line Tools: Use OpenSSL to connect to your server and verify the certificate. Run the following command in your terminal:

    openssl s_client -connect yourdomain.com:443

    This command will show you the connection details and the certificate information. Look for the certificate part in the output to ensure it matches your installed certificate.

  4. Apache Configuration Test: Before restarting Apache, it's a best practice to test your Apache configuration file for any errors. You can do this by running:

    apachectl configtest

    If the command responds with “Syntax OK,” then your configuration file is correct.

  5. SSL Certificate Checker Tools: Use online SSL checkers like the one provided by SSLTrust to verify your SSL Certificate on your web server. These tools will display the Common Name, server type, issuer, validity, certificate chaining, and more certificate details.
  6. Server Logs: Check your Apache server logs for any SSL-related errors. The logs are typically located in /var/log/apache2/ or /var/log/httpd/, depending on your system configuration.
  7. Reloading Apache: If you made changes to the SSL configuration, ensure you reload Apache to apply those changes. You can do this by running:

    sudo systemctl reload apache2

    On systems using a different init system, you might use:

    sudo service apache2 reload

    This ensures that your changes are applied without needing a full restart.

By following these steps, you can verify that your SSL certificate is properly installed and functioning after restarting Apache.

Restarting Apache after installing an SSL certificate is a straightforward process. Here’s how you can do it:

For Linux Systems Using Systemd (e.g., Ubuntu 16.04 and later, CentOS 7 and later)

  1. Open Terminal: You can do this by searching for "Terminal" in your system's application launcher or by using the keyboard shortcut Ctrl + Alt + T.
  2. Gain Superuser Privileges: You might need superuser (root) privileges to restart the Apache service. You can gain these privileges by using the sudo command.
  3. Restart Apache:

    sudo systemctl restart apache2

    This command will restart the Apache service, applying any changes you've made, including the installation of new SSL certificates.

For Older Linux Systems Using SysVinit (e.g., Ubuntu 14.04, CentOS 6)

If you're using an older Linux distribution that doesn't use systemd, you can restart Apache with the following command:

  1. Open Terminal.
  2. Gain Superuser Privileges.
  3. Restart Apache:

    sudo service apache2 restart

    This command will restart the Apache server.

For Windows Systems

If you're running Apache on a Windows system, you can restart the service through the Services management console or the command line.

  1. Open Command Prompt as Administrator:

    • Search for "cmd" in the Start menu.
    • Right-click on "Command Prompt" and select "Run as administrator".
  2. Restart Apache Service:

    net stop apache2
    net start apache2

    These commands will stop and then start the Apache service, respectively.

Verification

After restarting Apache, it's a good practice to check the service status to ensure it's running properly:

  • On Linux Systems:

    sudo systemctl status apache2

    or for older systems:

    sudo service apache2 status
  • On Windows Systems:
    You can check the status through the Services management console or by running:

    net status apache2

These commands will provide you with the current status of the Apache service. If Apache is running without issues, you should see an output indicating that the service is active (running).

By following these steps, you can ensure that your Apache server is properly restarted after installing SSL certificates, allowing your website to serve content over HTTPS.

Installing an SSL certificate on an Apache web server involves a few steps. Below is a general guide on how to install an SSL certificate that you've obtained, for example, using Let's Encrypt with Certbot:

Prerequisites:

  • You have Apache installed on your server.
  • You have obtained an SSL certificate, for instance, from Let's Encrypt using Certbot.

Step 1: Stop Apache Service (if running)
Before making changes, it's a good idea to stop the Apache service to avoid any conflicts:

sudo systemctl stop apache2

Or, if you're using a different init system:

sudo service apache2 stop

Step 2: Install the Certificate
If you haven't already obtained the SSL certificate using Certbot, you can do so by running:

sudo certbot certonly --standalone -d yourdomain.com

This command will automatically create the necessary certificate files and place them in the Certbot directory, typically /etc/letsencrypt/live/yourdomain.com/.

Step 3: Configure Apache to Use SSL
You need to configure Apache to use the SSL certificate. This involves creating or editing a virtual host configuration file for HTTPS.

Create a new SSL configuration file or edit an existing one in /etc/apache2/sites-available/. You can name it something like yourdomain-le-ssl.conf:

sudo nano /etc/apache2/sites-available/yourdomain-le-ssl.conf

Add the following content, replacing yourdomain.com with your domain name:

<VirtualHost *:443>
    ServerAdmin webmaster@localhost
    ServerName yourdomain.com
    ServerAlias www.yourdomain.com

    DocumentRoot /var/www/html

    ErrorLog ${APACHE_LOG_DIR}/error.log
    CustomLog ${APACHE_LOG_DIR}/access.log combined

    SSLEngine on
    SSLCertificateFile /etc/letsencrypt/live/yourdomain.com/cert.pem
    SSLCertificateKeyFile /etc/letsencrypt/live/yourdomain.com/privkey.pem
    SSLCertificateChainFile /etc/letsencrypt/live/yourdomain.com/chain.pem

    <Directory /var/www/html>
        Options Indexes FollowSymLinks
        AllowOverride All
        Require all granted
    </Directory>

    # Redirect HTTP to HTTPS
    RewriteEngine on
    RewriteCond %{HTTPS} off
    RewriteRule ^(.*)$ https://%{HTTP_HOST}%{REQUEST_URI} [L,R=301]
</VirtualHost>

This configuration does several things:

  • Activates SSL on the virtual host.
  • Specifies the paths to the certificate, key, and chain files.
  • Sets up a directory for your website's content.
  • Adds a rewrite rule to redirect HTTP traffic to HTTPS.

Step 4: Enable the Site and Disable the Default Site (if necessary)
Enable the new site configuration:

sudo a2ensite yourdomain-le-ssl.conf

Disable the default site to avoid conflicts:

sudo a2dissite 000-default.conf

Step 5: Reload Apache
Reload Apache to apply the changes:

sudo systemctl reload apache2

Or, if you're using a different init system:

sudo service apache2 reload

Step 6: Test Your Configuration
It's important to test your Apache configuration for any syntax errors:

sudo apache2ctl configtest

If there are no errors, your SSL setup should be ready.

Step 7: Set Up Automatic Renewal (for Let's Encrypt)
Since Let's Encrypt certificates are only valid for 90 days, you need to set up automatic renewals:

sudo certbot renew --dry-run

This command will test your renewal setup. To automate this process, you can add a cron job:

sudo crontab -e

Add the following line to run the renewal process weekly:

0 0 * * 1 certbot renew --quiet

This will ensure your certificates are automatically renewed before they expire.

That's it! You've successfully installed an SSL certificate on your Apache server. Remember to replace yourdomain.com with your actual domain name and ensure the paths to your certificate files are correct.

Certainly! Here's a concise guide on how to obtain a free SSL certificate in English:


How to Get a Free SSL Certificate

Securing your website with HTTPS is essential for protecting your users' data and ensuring their privacy. SSL (Secure Sockets Layer) certificates are what enable HTTPS, and fortunately, you can get them for free. Here's a step-by-step guide on how to obtain a free SSL certificate.

1. Let's Encrypt and Certbot

Let's Encrypt is a free, automated, and open Certificate Authority (CA) that provides SSL certificates. Certbot is a tool that automates the process of obtaining and renewing Let's Encrypt certificates.

  • Step 1: Install Certbot
    If you're using a Unix-based system, you can install Certbot with the following command:

    sudo apt-get update && sudo apt-get install certbot
  • Step 2: Obtain the Certificate
    Use Certbot to get a certificate for your domain:

    sudo certbot certonly --standalone -d yourdomain.com

    This command will automatically validate your domain and obtain a certificate.

  • Step 3: Configure Your Web Server
    Configure your web server to use the newly issued certificate. Certbot provides instructions for various web servers like Apache and Nginx.

2. ZeroSSL

ZeroSSL offers both free and paid SSL certificates and uses the ACME protocol for certificate issuance.

  • Step 1: Create an Account
    Sign up for a free account on the ZeroSSL website.
  • Step 2: Request a Certificate
    Initiate a new certificate request and follow the prompts to validate your domain.
  • Step 3: Validate Your Domain
    Choose your preferred validation method and complete the domain validation process.
  • Step 4: Download and Install
    Once validated, download the certificate files and install them on your server.

3. Cloudflare

Cloudflare provides free SSL/TLS certificates along with CDN and security services.

  • Step 1: Sign Up and Add Your Site
    Create a Cloudflare account and add your website.
  • Step 2: Update DNS Settings
    Change your DNS settings to use Cloudflare's nameservers.
  • Step 3: Enable HTTPS
    In the Cloudflare dashboard, enable "Always Use HTTPS" and "Automatic HTTPS Rewrites" to secure your site.

4. AWS Certificate Manager

AWS Certificate Manager (ACM) offers free public certificate services for AWS resources.

  • Step 1: Request a Certificate
    Navigate to the ACM console and request a public certificate.
  • Step 2: Add Domain Names
    Add the domain names for which you want the certificate.
  • Step 3: Choose Validation Method
    AWS will guide you through the domain validation process.
  • Step 4: Use the Certificate
    After the certificate is issued, you can use it with AWS services like Elastic Load Balancing or CloudFront.

By following these steps, you can secure your website with a free SSL certificate. Remember, the process may vary slightly depending on your specific server setup and the service you choose. Always refer to the most recent documentation provided by the service for the most accurate and up-to-date instructions.


This guide provides a general overview of how to get a free SSL certificate. Each service has its own detailed documentation that you should consult for specific instructions tailored to your setup.