{"id":106,"date":"2010-07-08T19:17:37","date_gmt":"2010-07-08T10:17:37","guid":{"rendered":"http:\/\/www.free-style.biz\/lifediary\/?p=106"},"modified":"2010-07-08T19:17:37","modified_gmt":"2010-07-08T10:17:37","slug":"%e3%81%8a%e3%82%8c%e3%81%8a%e3%82%8cca%ef%bc%88%e3%83%97%e3%83%a9%e3%82%a4%e3%83%99%e3%83%bc%e3%83%88%e8%aa%8d%e8%a8%bc%e5%b1%80%ef%bc%89%e6%a7%8b%e7%af%89%e7%b7%a8","status":"publish","type":"post","link":"https:\/\/www.free-style.biz\/lifediary\/?p=106","title":{"rendered":"\u304a\u308c\u304a\u308cCA\uff08\u30d7\u30e9\u30a4\u30d9\u30fc\u30c8\u8a8d\u8a3c\u5c40\uff09\u69cb\u7bc9\u7de8"},"content":{"rendered":"<p>CA(\u8a8d\u8a3c\u5c40)\u306e\u5b9a\u7fa9\u30d5\u30a1\u30a4\u30eb\u3060\u3051\u4f5c\u6210\u3057\u3066\u3001\u304a\u308c\u304a\u308cCA\u3092\u4f5c\u6210\u3059\u308b\u65b9\u6cd5\u3082\u3042\u308b\u3088\u3046\u3067\u3059\u304c\u3001\u4eca\u56de\u306f\u30ed\u30fc\u30ab\u30eb\u306e\u30c7\u30d5\u30a9\u30eb\u30c8CA\u3092\u5165\u308c\u66ff\u3048\u308b\u65b9\u6cd5\u3067\u4f5c\u6210\u3057\u307e\u3059\u3002<br \/>\nOS\uff1aCentOS5.3<br \/>\n1.\u30aa\u30ea\u30b8\u30ca\u30ebCA\u306e\u5b9a\u7fa9\u30d5\u30a1\u30a4\u30eb\u3092\u30d0\u30c3\u30af\u30a2\u30c3\u30d7\u3057\u307e\u3059\u3002<br \/>\n<u><strong># cd \/etc\/pki\/tls<br \/>\n# cp -a openssl.cnf openssl.cnf.org<\/strong><\/u><br \/>\n2.\u5b9a\u7fa9\u30d5\u30a1\u30a4\u30eb\u3092\u304a\u308c\u304a\u308cCA\u7528\u306b\u5909\u66f4\u3057\u307e\u3059\u3002<br \/>\n<strong><u># vi openssl.cnf<\/u><\/strong><\/p>\n<hr>\n<p>#<br \/>\n# OpenSSL example configuration file.<br \/>\n# This is mostly being used for generation of certificate requests.<br \/>\n#<br \/>\n# This definition stops the following lines choking if HOME isn&#8217;t<br \/>\n# defined.<br \/>\nHOME\t\t\t= .<br \/>\nRANDFILE\t\t= $ENV::HOME\/.rnd<br \/>\n# Uncomment out to enable OpenSSL configuration see config(3)<br \/>\n# openssl_conf = openssl_init<br \/>\n# To use this configuration file with the &#8220;-extfile&#8221; option of the<br \/>\n# &#8220;openssl x509&#8221; utility, name here the section containing the<br \/>\n# X.509v3 extensions to use:<br \/>\n# extensions\t\t=<br \/>\n# (Alternatively, use a configuration file that has only<br \/>\n# X.509v3 extensions in its main [= default] section.)<br \/>\n[openssl_init]<br \/>\n# Extra OBJECT IDENTIFIER info:<br \/>\noid_section = new_oids<br \/>\nalg_section = algs<br \/>\n[ new_oids ]<br \/>\n# We can add new OIDs in here for use by any config aware application<br \/>\n# Add a simple OID like this:<br \/>\n# shortname=Long Object Identifier Name, 1.2.3.4<br \/>\n# Or use config file substitution like this:<br \/>\n# testoid2=OID2 LONG NAME, ${testoid1}.5.6, OTHER OID<br \/>\n[ algs ]<br \/>\n# Algorithm configuration options. Currently just fips_mode<br \/>\nfips_mode = no<br \/>\n####################################################################<br \/>\n[ ca ]<br \/>\ndefault_ca\t= CA_default\t\t# The default ca section<br \/>\n####################################################################<br \/>\n[ CA_default ]<br \/>\ndir\t\t= ..\/..\/CA\t\t# Where everything is kept<br \/>\ncerts\t\t= $dir\/certs\t\t# Where the issued certs are kept<br \/>\ncrl_dir\t\t= $dir\/crl\t\t# Where the issued crl are kept<br \/>\ndatabase\t= $dir\/index.txt\t# database index file.<br \/>\n#unique_subject\t= no\t\t\t# Set to &#8216;no&#8217; to allow creation of<br \/>\n# several ctificates with same subject.<br \/>\nnew_certs_dir\t= $dir\/newcerts\t\t# default place for new certs.<br \/>\ncertificate\t= $dir\/cacert.pem \t# The CA certificate<br \/>\nserial\t\t= $dir\/serial \t\t# The current serial number<br \/>\ncrlnumber\t= $dir\/crlnumber\t# the current crl number<br \/>\n# must be commented out to leave a V1 CRL<br \/>\ncrl\t\t= $dir\/crl.pem \t\t# The current CRL<br \/>\nprivate_key\t= $dir\/private\/cakey.pem# The private key<br \/>\nRANDFILE\t= $dir\/private\/.rand\t# private random number file<br \/>\nx509_extensions\t= usr_cert\t\t# The extentions to add to the cert<br \/>\n# Comment out the following two lines for the &#8220;traditional&#8221;<br \/>\n# (and highly broken) format.<br \/>\nname_opt \t= ca_default\t\t# Subject Name options<br \/>\ncert_opt \t= ca_default\t\t# Certificate field options<br \/>\n# Extension copying option: use with caution.<br \/>\n# copy_extensions = copy<br \/>\n# Extensions to add to a CRL. Note: Netscape communicator chokes on V2 CRLs<br \/>\n# so this is commented out by default to leave a V1 CRL.<br \/>\n# crlnumber must also be commented out to leave a V1 CRL.<br \/>\n# crl_extensions\t= crl_ext<br \/>\n<strong><u>default_days\t= 365\t\t\t# how long to certify for<\/u><\/strong><br \/>\n<font color=\"red\">\u2192\u30af\u30e9\u30a4\u30a2\u30f3\u30c8\u8a3c\u660e\u66f8\u306e\u6a19\u6e96\u306e\u6709\u52b9\u671f\u9593\u3092\u300c3652\u300d\u65e5(10\u5e74)\u306b\u5909\u66f4\u3057\u307e\u3059\u3002<\/font><br \/>\ndefault_crl_days= 30\t\t\t# how long before next CRL<br \/>\ndefault_md\t= sha1\t\t\t# which md to use.<br \/>\npreserve\t= no\t\t\t# keep passed DN ordering<br \/>\n# A few difference way of specifying how similar the request should look<br \/>\n# For type CA, the listed attributes must be the same, and the optional<br \/>\n# and supplied fields are just that \ud83d\ude42<br \/>\npolicy\t\t= policy_match<br \/>\n# For the CA policy<br \/>\n[ policy_match ]<br \/>\ncountryName\t\t= match<br \/>\nstateOrProvinceName\t= match<br \/>\norganizationName\t= match<br \/>\norganizationalUnitName\t= optional<br \/>\ncommonName\t\t= supplied<br \/>\nemailAddress\t\t= optional<br \/>\n# For the &#8216;anything&#8217; policy<br \/>\n# At this point in time, you must list all acceptable &#8216;object&#8217;<br \/>\n# types.<br \/>\n[ policy_anything ]<br \/>\ncountryName\t\t= optional<br \/>\nstateOrProvinceName\t= optional<br \/>\nlocalityName\t\t= optional<br \/>\norganizationName\t= optional<br \/>\norganizationalUnitName\t= optional<br \/>\ncommonName\t\t= supplied<br \/>\nemailAddress\t\t= optional<br \/>\n####################################################################<br \/>\n[ req ]<br \/>\n<strong><u>default_bits\t\t= 1024<\/u><\/strong><br \/>\n<font color=\"red\">\u2192\u6a19\u6e96\u306e\u516c\u958b\u9375\u9577\u3092\u300c2048\u300dbit\u306b\u5909\u66f4\u3057\u307e\u3059\u3002<\/font><br \/>\ndefault_md\t\t= sha1<br \/>\ndefault_keyfile \t= privkey.pem<br \/>\ndistinguished_name\t= req_distinguished_name<br \/>\nattributes\t\t= req_attributes<br \/>\nx509_extensions\t= v3_ca\t# The extentions to add to the self signed cert<br \/>\n# Passwords for private keys if not present they will be prompted for<br \/>\n# input_password = secret<br \/>\n# output_password = secret<br \/>\n# This sets a mask for permitted string types. There are several options.<br \/>\n# default: PrintableString, T61String, BMPString.<br \/>\n# pkix\t : PrintableString, BMPString.<br \/>\n# utf8only: only UTF8Strings.<br \/>\n# nombstr : PrintableString, T61String (no BMPStrings or UTF8Strings).<br \/>\n# MASK:XXXX a literal mask value.<br \/>\n# WARNING: current versions of Netscape crash on BMPStrings or UTF8Strings<br \/>\n# so use this option with caution!<br \/>\n# we use PrintableString+UTF8String mask so if pure ASCII texts are used<br \/>\n# the resulting certificates are compatible with Netscape<br \/>\nstring_mask = MASK:0x2002<br \/>\n# req_extensions = v3_req # The extensions to add to a certificate request<br \/>\n[ req_distinguished_name ]<br \/>\ncountryName\t\t\t= Country Name (2 letter code)<br \/>\n<strong><u>countryName_default\t\t= GB<\/u><\/strong><br \/>\n<font color=\"red\">\u2192\u6a19\u6e96\u306e\u56fd\u540d\u3092\u300cJP\u300d\u306b\u5909\u66f4\u3057\u307e\u3059\u3002<\/font><br \/>\ncountryName_min\t\t\t= 2<br \/>\ncountryName_max\t\t\t= 2<br \/>\nstateOrProvinceName\t\t= State or Province Name (full name)<br \/>\n<strong><u>stateOrProvinceName_default\t= Berkshire<\/u><\/strong><br \/>\n<font color=\"red\">\u2192\u6a19\u6e96\u306e\u90fd\u9053\u5e9c\u770c\u540d\u3092\u300cTokyo\u300d\u306b\u5909\u66f4\u3057\u307e\u3059\u3002(\u5404\u81ea\u304a\u597d\u307f\u3067)<\/font><br \/>\nlocalityName\t\t\t= Locality Name (eg, city)<br \/>\n<strong><u>localityName_default\t\t= Newbury\t<\/u><\/strong><br \/>\n<font color=\"red\">\u2192\u6a19\u6e96\u306e\u90fd\u5e02\u540d\u3092\u300cShinagawa-ku\u300d\u306b\u5909\u66f4\u3057\u307e\u3059\u3002(\u5404\u81ea\u304a\u597d\u307f\u3067)<\/font><br \/>\n0.organizationName\t\t= Organization Name (eg, company)<br \/>\n<u><strong>0.organizationName_default\t= My Company Ltd<\/strong><\/u><br \/>\n<font color=\"red\">\u2192\u6a19\u6e96\u306e\u7d44\u7e54\u540d\u3092\u300cFs DataCenter CA\u300d\u306b\u5909\u66f4\u3057\u307e\u3059\u3002(\u5404\u81ea\u304a\u597d\u307f\u3067)<\/font><br \/>\n# we can do this but it is not needed normally \ud83d\ude42<br \/>\n#1.organizationName\t\t= Second Organization Name (eg, company)<br \/>\n#1.organizationName_default\t= World Wide Web Pty Ltd<br \/>\norganizationalUnitName\t\t= Organizational Unit Name (eg, section)<br \/>\n#organizationalUnitName_default\t=<br \/>\ncommonName\t\t\t= Common Name (eg, your name or your server\\&#8217;s hostname)<br \/>\ncommonName_max\t\t\t= 64<br \/>\nemailAddress\t\t\t= Email Address<br \/>\nemailAddress_max\t\t= 64<br \/>\n# SET-ex3\t\t\t= SET extension number 3<br \/>\n[ req_attributes ]<br \/>\nchallengePassword\t\t= A challenge password<br \/>\nchallengePassword_min\t\t= 4<br \/>\nchallengePassword_max\t\t= 20<br \/>\nunstructuredName\t\t= An optional company name<br \/>\n[ usr_cert ]<br \/>\n# These extensions are added when &#8216;ca&#8217; signs a request.<br \/>\n# This goes against PKIX guidelines but some CAs do it and some software<br \/>\n# requires this to avoid interpreting an end user certificate as a CA.<br \/>\n<strong><u>basicConstraints=CA:FALSE<\/u><\/strong><br \/>\n<font color=\"red\">\u2192\u30b5\u30fc\u30d0\u8a3c\u660e\u3092\u300cCA:TRUE\u300d\u306b\u5909\u66f4\u3057\u307e\u3059\u3002<\/font><br \/>\n# Here are some examples of the usage of nsCertType. If it is omitted<br \/>\n# the certificate can be used for anything *except* object signing.<br \/>\n# This is OK for an SSL server.<br \/>\n# nsCertType\t\t\t= server<br \/>\n# For an object signing certificate this would be used.<br \/>\n# nsCertType = objsign<br \/>\n# For normal client use this is typical<br \/>\n# nsCertType = client, email<br \/>\n# and for everything including object signing:<br \/>\n# nsCertType = client, email, objsign<br \/>\n<u><strong>nsCertType = server, client, email, objsign<\/strong><\/u><br \/>\n<font color=\"red\">\u2192\u30b5\u30fc\u30d0\u8a3c\u660e\u306e\u7a2e\u985e\u3092\u8ffd\u52a0\u3057\u307e\u3059\u3002\u300cSSL \u30b5\u30fc\u30d0\u30fc\u8a8d\u8a3c\u300d\u300cSSL \u30af\u30e9\u30a4\u30a2\u30f3\u30c8\u8a8d\u8a3c\u300d\u300cSMIME\u300d\u300c \u7f72\u540d\u300d\u3068\u308a\u3042\u3048\u305a\u5168\u90e8\u5165\u308c\u307e\u3059\u3002<\/font><br \/>\n# This is typical in keyUsage for a client certificate.<br \/>\n# keyUsage = nonRepudiation, digitalSignature, keyEncipherment<br \/>\n# This will be displayed in Netscape&#8217;s comment listbox.<br \/>\n<strong><u>#nsComment\t\t\t= &#8220;OpenSSL Generated Certificate&#8221;<\/u><\/strong><br \/>\n<font color=\"red\">\u2192\u30b3\u30e1\u30f3\u30c8\u30a2\u30a6\u30c8\u3057\u307e\u3059\u3002<\/font><br \/>\n# PKIX recommendations harmless if included in all certificates.<br \/>\nsubjectKeyIdentifier=hash<br \/>\nauthorityKeyIdentifier=keyid,issuer<br \/>\n# This stuff is for subjectAltName and issuerAltname.<br \/>\n# Import the email address.<br \/>\n# subjectAltName=email:copy<br \/>\n# An alternative to produce certificates that aren&#8217;t<br \/>\n# deprecated according to PKIX.<br \/>\n# subjectAltName=email:move<br \/>\n# Copy subject details<br \/>\n# issuerAltName=issuer:copy<br \/>\n#nsCaRevocationUrl\t\t= http:\/\/www.domain.dom\/ca-crl.pem<br \/>\n#nsBaseUrl<br \/>\n#nsRevocationUrl<br \/>\n#nsRenewalUrl<br \/>\n#nsCaPolicyUrl<br \/>\n#nsSslServerName<br \/>\n[ v3_req ]<br \/>\n# Extensions to add to a certificate request<br \/>\nbasicConstraints = CA:FALSE<br \/>\nkeyUsage = nonRepudiation, digitalSignature, keyEncipherment<br \/>\n[ v3_ca ]<br \/>\n# Extensions for a typical CA<br \/>\n# PKIX recommendation.<br \/>\nsubjectKeyIdentifier=hash<br \/>\nauthorityKeyIdentifier=keyid:always,issuer:always<br \/>\n# This is what PKIX recommends but some broken software chokes on critical<br \/>\n# extensions.<br \/>\n#basicConstraints = critical,CA:true<br \/>\n# So we do this instead.<br \/>\nbasicConstraints = CA:true<br \/>\n# Key usage: this is typical for a CA certificate. However since it will<br \/>\n# prevent it being used as an test self-signed certificate it is best<br \/>\n# left out by default.<br \/>\n# keyUsage = cRLSign, keyCertSign<br \/>\n# Some might want this also<br \/>\n<strong><u>nsCertType = sslCA, emailCA<\/u><\/strong><br \/>\n<font color=\"red\">\u2192\u30b3\u30e1\u30f3\u30c8\u30a2\u30a6\u30c8\u3092\u5916\u3057\u307e\u3059\u3002<\/font><br \/>\n# Include email address in subject alt name: another PKIX recommendation<br \/>\n# subjectAltName=email:copy<br \/>\n# Copy issuer details<br \/>\n# issuerAltName=issuer:copy<br \/>\n# DER hex encoding of an extension: beware experts only!<br \/>\n# obj=DER:02:03<br \/>\n# Where &#8216;obj&#8217; is a standard or added object<br \/>\n# You can even override a supported extension:<br \/>\n# basicConstraints= critical, DER:30:03:01:01:FF<br \/>\n[ crl_ext ]<br \/>\n# CRL extensions.<br \/>\n# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.<br \/>\n# issuerAltName=issuer:copy<br \/>\nauthorityKeyIdentifier=keyid:always,issuer:always<br \/>\n[ proxy_cert_ext ]<br \/>\n# These extensions should be added when creating a proxy certificate<br \/>\n# This goes against PKIX guidelines but some CAs do it and some software<br \/>\n# requires this to avoid interpreting an end user certificate as a CA.<br \/>\nbasicConstraints=CA:FALSE<br \/>\n# Here are some examples of the usage of nsCertType. If it is omitted<br \/>\n# the certificate can be used for anything *except* object signing.<br \/>\n# This is OK for an SSL server.<br \/>\n# nsCertType\t\t\t= server<br \/>\n# For an object signing certificate this would be used.<br \/>\n# nsCertType = objsign<br \/>\n# For normal client use this is typical<br \/>\n# nsCertType = client, email<br \/>\n# and for everything including object signing:<br \/>\n# nsCertType = client, email, objsign<br \/>\n# This is typical in keyUsage for a client certificate.<br \/>\n# keyUsage = nonRepudiation, digitalSignature, keyEncipherment<br \/>\n# This will be displayed in Netscape&#8217;s comment listbox.<br \/>\nnsComment\t\t\t= &#8220;OpenSSL Generated Certificate&#8221;<br \/>\n# PKIX recommendations harmless if included in all certificates.<br \/>\nsubjectKeyIdentifier=hash<br \/>\nauthorityKeyIdentifier=keyid,issuer:always<br \/>\n# This stuff is for subjectAltName and issuerAltname.<br \/>\n# Import the email address.<br \/>\n# subjectAltName=email:copy<br \/>\n# An alternative to produce certificates that aren&#8217;t<br \/>\n# deprecated according to PKIX.<br \/>\n# subjectAltName=email:move<br \/>\n# Copy subject details<br \/>\n# issuerAltName=issuer:copy<br \/>\n#nsCaRevocationUrl\t\t= http:\/\/www.domain.dom\/ca-crl.pem<br \/>\n#nsBaseUrl<br \/>\n#nsRevocationUrl<br \/>\n#nsRenewalUrl<br \/>\n#nsCaPolicyUrl<br \/>\n#nsSslServerName<br \/>\n# This really needs to be in place for it to be a proxy certificate.<br \/>\nproxyCertInfo=critical,language:id-ppl-anyLanguage,pathlen:3,policy:foo<\/p>\n<hr>\n<p>\u5b9a\u7fa9\u30d5\u30a1\u30a4\u30eb\u3092\u4fdd\u5b58\u3057\u307e\u3059\u3002<br \/>\n\u3053\u306e\u5b9a\u7fa9\u30d5\u30a1\u30a4\u30eb\u3092\u57fa\u306b\u3057\u3066\u65b0\u3057\u3044CA\u3092\u69cb\u7bc9\u3057\u307e\u3059\u3002<br \/>\n\u5ff5\u306e\u305f\u3081\u30aa\u30ea\u30b8\u30ca\u30ebCA\u3092\u30d0\u30c3\u30af\u30a2\u30c3\u30d7\u3057\u307e\u3059\u3002<br \/>\n<strong><u># cd \/etc\/pki<br \/>\n# mv CA CA.org<br \/>\n# cd \/etc\/pki\/tls\/misc\/<br \/>\n# cp -a CA CA.org<\/u><\/strong><br \/>\n\u8a2d\u5b9a\u30d5\u30a1\u30a4\u30eb\u3092\u5909\u66f4\u3057\u307e\u3059\u3002<br \/>\n<strong><u># vi CA<\/u><\/strong><\/p>\n<hr>\n<p><strong><u>DAYS=&#8221;-days 365&#8243;        # 1 year\t<\/u><\/strong><br \/>\n<font color=\"red\">\u2192\u30eb\u30fc\u30c8\u8a3c\u660e\u66f8\u306e\u6709\u52b9\u671f\u9650\u3092\u300cDAYS=&#8221;-days 3652&#8243;        # 10 years\u300d(10\u5e74)\u306b\u5909\u66f4\u3057\u307e\u3059\u3002<\/font><br \/>\n<strong><em>CADAYS=&#8221;-days 1095&#8243;     # 3 years<\/em><\/strong><br \/>\n<font color=\"red\">\u2192CA\u306e\u6709\u52b9\u671f\u9650\u3092\u300cCADAYS=&#8221;-days 3652&#8243;      # 10 years\u300d(10\u5e74)\u306b\u5909\u66f4\u3057\u307e\u3059\u3002<\/font><\/p>\n<hr>\n<p>\u65b0\u3057\u3044CA\u3092\u4f5c\u6210\u3057\u307e\u3059\u3002<br \/>\n<strong><u># .\/CA -newca<\/u><\/strong><\/p>\n<hr>\n<p>CA certificate filename (or enter to create)<br \/>\n<font color=\"red\">\u2192\u305d\u306e\u307e\u307eEnter\u30ad\u30fc<\/font><br \/>\nMaking CA certificate &#8230;<br \/>\nGenerating a 2048 bit RSA private key<br \/>\n&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;&#8230;+++<br \/>\n&#8230;.+++<br \/>\nwriting new private key to &#8216;..\/..\/CA\/private\/.\/cakey.pem&#8217;<br \/>\nEnter PEM pass phrase:<br \/>\n<font color=\"red\">\u2192\u79d8\u5bc6\u9375\u306e\u30d1\u30b9\u30ef\u30fc\u30c9\u3092\u5165\u529b\u3057\u307e\u3059\u3002<\/font><br \/>\nVerifying &#8211; Enter PEM pass phrase:<br \/>\n<font color=\"red\">\u2192\u79d8\u5bc6\u9375\u306e\u30d1\u30b9\u30ef\u30fc\u30c9\u3092\u518d\u5165\u529b\u3057\u307e\u3059\u3002<\/font><\/p>\n","protected":false},"excerpt":{"rendered":"<p>CA(\u8a8d\u8a3c\u5c40)\u306e\u5b9a\u7fa9\u30d5\u30a1\u30a4\u30eb\u3060\u3051\u4f5c\u6210\u3057\u3066\u3001\u304a\u308c\u304a\u308cCA\u3092\u4f5c\u6210\u3059\u308b\u65b9\u6cd5\u3082\u3042\u308b\u3088\u3046\u3067\u3059\u304c\u3001\u4eca\u56de\u306f\u30ed\u30fc\u30ab\u30eb\u306e\u30c7\u30d5\u30a9\u30eb\u30c8CA\u3092\u5165\u308c\u66ff\u3048\u308b\u65b9\u6cd5\u3067\u4f5c\u6210\u3057\u307e\u3059\u3002 OS\uff1aCentOS5.3 1.\u30aa\u30ea\u30b8\u30ca\u30ebCA\u306e\u5b9a\u7fa9\u30d5\u30a1\u30a4\u30eb\u3092\u30d0\u30c3\u30af\u30a2\u30c3\u30d7 &hellip; <a href=\"https:\/\/www.free-style.biz\/lifediary\/?p=106\" class=\"more-link\">\u7d9a\u304d\u3092\u8aad\u3080 <span class=\"screen-reader-text\">\u304a\u308c\u304a\u308cCA\uff08\u30d7\u30e9\u30a4\u30d9\u30fc\u30c8\u8a8d\u8a3c\u5c40\uff09\u69cb\u7bc9\u7de8<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16],"tags":[],"class_list":["post-106","post","type-post","status-publish","format-standard","hentry","category-ca"],"_links":{"self":[{"href":"https:\/\/www.free-style.biz\/lifediary\/index.php?rest_route=\/wp\/v2\/posts\/106","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.free-style.biz\/lifediary\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.free-style.biz\/lifediary\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.free-style.biz\/lifediary\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.free-style.biz\/lifediary\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=106"}],"version-history":[{"count":0,"href":"https:\/\/www.free-style.biz\/lifediary\/index.php?rest_route=\/wp\/v2\/posts\/106\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.free-style.biz\/lifediary\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=106"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.free-style.biz\/lifediary\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=106"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.free-style.biz\/lifediary\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=106"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}