* 第一種方式:
可以從瀏覽器窗口打開證書彈窗,然后拖動下面的大一點的證書圖標到任意文件夾即可,然后再key access管理里信任該證書即可;
Reference: https://www.wyr.me/post/618
* 第二種方式:
一、
❯ echo -n | openssl s_client -connect 192.168.8.28:3080 \ | sed -ne '/-BEGIN CERTIFICATE-/,/-END CERTIFICATE-/p' Can't use SSL_get_servername depth=0 C = US, O = localhost, CN = localhost verify error:num=18:self signed certificate verify return:1 depth=0 C = US, O = localhost, CN = localhost verify return:1
-----BEGIN CERTIFICATE----- MIIDnTCCAoWgAwIBAgIRALVj0f0qDJ8dSdW4b7O5+VcwDQYJKoZIhvcNAQELBQAw NTELMAkGA1UEBhMCVVwwwWN3gDBiBgNVHREEWzBZghF0ZWxlcG9ydC1u b2RlLWRldoIJbG9jwwww7hXFv8L5n/XXqvAMmlY5Drd7Bl0M BwDvkTnd8ucsssn8IU+A49nVhx5kaiilstM83x1D4dLexIuYbpE8dVNVKtblJbQ GC5ZhiLtezVkubW/Ggl3cD5g0ThOBh6/MBPhA2m7YhnyS3zCV66Jq1EhOvnvmc9Y CcGG4DO4xxAnNE7fDHqten4= -----END CERTIFICATE-----
二、
由於直接請求本地teleport服務報錯,可以直接粘貼證書
❯ cat teleportTest.crt -----BEGIN CERTIFICATE----- MIIDnTCCAoWgAwIBAgIRALVj0f0qDJ8dSdW4b7O5+VcwDQYJKoZIhvcNAQELBQAw NTELMAkGA1UEBhMCVVwwwWN3gDBiBgNVHREEWzBZghF0ZWxlcG9ydC1u b2RlLWRldoIJbG9jwwww7hXFv8L5n/XXqvAMmlY5Drd7Bl0M BwDvkTnd8ucsssn8IU+A49nVhx5kaiilstM83x1D4dLexIuYbpE8dVNVKtblJbQ GC5ZhiLtezVkubW/Ggl3cD5g0ThOBh6/MBPhA2m7YhnyS3zCV66Jq1EhOvnvmc9Y CcGG4DO4xxAnNE7fDHqten4= -----END CERTIFICATE-----
三、導入
導入后設置為總Trust,然后提示輸入密碼,證書的狀態就會由x變成+號了
四、再次請求,並輸入"thisisunsafe"即可