Sponsored Content
Full Discussion: VSFTPD & SSL Certificates
Top Forums UNIX for Dummies Questions & Answers VSFTPD & SSL Certificates Post 302369296 by fpmurphy on Saturday 7th of November 2009 10:55:45 AM
Old 11-07-2009
This will extract the public key from your .pem to stdout:
Code:
openssl x509 -inform pem -in /path/to/your/vstftp.pem -noout -pubkey

To generate a .key and .crt, good for one year, use the following syntax
Code:
openssl req -x509 -new -out vsftpd.key -keyout vsftpd.key -days 365


Last edited by fpmurphy; 11-07-2009 at 12:01 PM..
 

10 More Discussions You Might Find Interesting

1. Red Hat

FTP problem in vsftpd & NcFTPd both

Hello Gurus, after installtion and configuration of vsftpd and NcFTPd, i could able to ftp from another Linux server but not from other windows cmd prompt. :mad: It show user/PASS need to be provided :( its not even prompting for username and password. :( Y it differs from windows and... (0 Replies)
Discussion started by: bullz26
0 Replies

2. UNIX for Dummies Questions & Answers

Setting up VSFTPD (force SSL?)

Hi all, Im having trouble setting up an FTP server and forcing SSL. At the moment i can connect to the server externally using normal FTP but when i try FTP with SSL i get STATUS:> Connected. Exchanging encryption keys... ERROR:> SSL: Error in negotiating... (5 Replies)
Discussion started by: mokachoka
5 Replies

3. UNIX for Dummies Questions & Answers

VSFTPD - User or IP based SSL encryption?

Is there a way i can only force SSL encryption if they connect from outside our network OR allow certain IP's to connect without using encryption? (0 Replies)
Discussion started by: mokachoka
0 Replies

4. Cybersecurity

expiration of SSL Certificates

Does anyone know how to extract the expiration date of a Solaris 9 certificate? I have searched over the 'net and it seems this command ssl-cert-check comes up often but this does not work on my servers. Not sure how to extraxt the expiration dates of the SSL Certs so if anyone can help that would... (2 Replies)
Discussion started by: bluridge
2 Replies

5. OS X (Apple)

Weird "security" bahavior with SSL certificates

Hello, I have been attempting to automate the addition of SSL certificates to keychains on a MAC using the "security" command. I've noticed two things, 1 of which I don't understand. 1. If I use something like "security add-trusted-cert -d -k /System/Library/Keychains/SystemRootCertificates... (1 Reply)
Discussion started by: prafulnama
1 Replies

6. Red Hat

vsftpd with ssl support on rhel5 64 bit

Hi Friends, I am trying to configure vsftpd server 2.0.5 on rhel5 64 bit installation. I am getting an error when initiating an ssl connection. I am using filezilla 3.0 ftp client. Client is specifically using passive mode connection. I can see the client is able to connect to the server,... (0 Replies)
Discussion started by: arumon
0 Replies

7. AIX

Creation of SSL certificates

Can someone guide me as to how SSL certificates are created for a new AIX box? I am a novice to system administration. Thanks in advance Gayathri (1 Reply)
Discussion started by: ggayathri
1 Replies

8. UNIX for Dummies Questions & Answers

vsftpd with SSL

Hi there. Im studying and i've got an exercise that i cannot fully understand. Im trying and testing, but it didnt works What i need to configure ftps ( vsftpd ) with openssl? (1 Reply)
Discussion started by: andriusman
1 Replies

9. UNIX for Dummies Questions & Answers

Installing SSL certificates on Ubuntu Server 12.04

Hi everyone, I am working on a Nginx + Apache installation for learning purposes, and just got to the point of installing a self-signed certificate for securing some pages that will be used to send "sensitive" information such as login credentials. So far so good. What a I want to know is how can... (2 Replies)
Discussion started by: gacanepa
2 Replies

10. UNIX for Dummies Questions & Answers

Cannot run git nor brew: 'SSL: can't load CA certificate file ~/Documents/Certificates.pem'

Hello All, 0. Firstly, I am not very Unix savvy. For instance, I don't know what the purpose of certificates are, and I don't know if this is the right forum for this question. 1. The problem: I can't use homebrew or use git. Running git pull, for instance, gives the following error: ... (2 Replies)
Discussion started by: isaac_caswell
2 Replies
CURLOPT_PROXY_PINNEDPUBLICKEY(3)			     curl_easy_setopt options				  CURLOPT_PROXY_PINNEDPUBLICKEY(3)

NAME
CURLOPT_PROXY_PINNEDPUBLICKEY - set pinned public key for https proxy SYNOPSIS
#include <curl/curl.h> CURLcode curl_easy_setopt(CURL *handle, CURLOPT_PROXY_PINNEDPUBLICKEY, char *pinnedpubkey); DESCRIPTION
Pass a pointer to a zero terminated string as parameter. The string can be the file name of your pinned public key. The file format expected is "PEM" or "DER". The string can also be any number of base64 encoded sha256 hashes preceded by "sha256//" and separated by ";" When negotiating a TLS or SSL connection, the https proxy sends a certificate indicating its identity. A public key is extracted from this certificate and if it does not exactly match the public key provided to this option, curl will abort the connection before sending or receiving any data. On mismatch, CURLE_SSL_PINNEDPUBKEYNOTMATCH is returned. The application does not have to keep the string around after setting this option. DEFAULT
NULL PROTOCOLS
All TLS based protocols: HTTPS, FTPS, IMAPS, POP3S, SMTPS etc. EXAMPLE
TODO PUBLIC KEY EXTRACTION
If you do not have the https proxy server's public key file you can extract it from the https proxy server's certificate. # retrieve the server's certificate if you don't already have it # # be sure to examine the certificate to see if it is what you expected # # Windows-specific: # - Use NUL instead of /dev/null. # - OpenSSL may wait for input instead of disconnecting. Hit enter. # - If you don't have sed, then just copy the certificate into a file: # Lines from -----BEGIN CERTIFICATE----- to -----END CERTIFICATE-----. # openssl s_client -servername www.example.com -connect www.example.com:443 < /dev/null | sed -n "/-----BEGIN/,/-----END/p" > www.example.com.pem # extract public key in pem format from certificate openssl x509 -in www.example.com.pem -pubkey -noout > www.example.com.pubkey.pem # convert public key from pem to der openssl asn1parse -noout -inform pem -in www.example.com.pubkey.pem -out www.example.com.pubkey.der # sha256 hash and base64 encode der to string for use openssl dgst -sha256 -binary www.example.com.pubkey.der | openssl base64 The public key in PEM format contains a header, base64 data and a footer: -----BEGIN PUBLIC KEY----- [BASE 64 DATA] -----END PUBLIC KEY----- AVAILABILITY
PEM/DER support: 7.52.0: GSKit, GnuTLS, NSS, OpenSSL, PolarSSL, mbedtls, wolfSSL/CyaSSL sha256 support: 7.52.0: GnuTLS, NSS, OpenSSL, PolarSSL, mbedtls, wolfSSL/CyaSSL Other SSL backends not supported. RETURN VALUE
Returns CURLE_OK if TLS enabled, CURLE_UNKNOWN_OPTION if not, or CURLE_OUT_OF_MEMORY if there was insufficient heap space. SEE ALSO
CURLOPT_PROXY_SSL_VERIFYPEER(3), CURLOPT_PROXY_SSL_VERIFYHOST(3), CURLOPT_PROXY_CAINFO(3), CURLOPT_PROXY_CAPATH(3), libcurl 7.54.0 December 21, 2016 CURLOPT_PROXY_PINNEDPUBLICKEY(3)
All times are GMT -4. The time now is 11:15 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy