01-04-2011
SSL certificate
Hi guys.
I have some questions about ssl certificates.
I looked at SSL providers and saw that they are providing 2 types of certificates: per server or per domain.
my server host name is: srv1.example.com
I have a smtp, imap, web server on this box. but all services accessed by different FQDN:
smtp.example.com
imap.example.com
webmail.example.com
1. I have a single certificate(per server). can i use that for multiple services on a single machine? for example web server and mail server.
2. when creating certificate request it asks me the host name. can i use "smtp.example.com" instead of "srv1.example.com"?
9 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
My current SSL certificate is about to expire in a couple days so I got a new one via Godaddy and need to install the new one. My server is running Centos 4.x with Blue quartz as the backend. Now BQ does have an SSL import option via the GUI but I'm not sure what route to take to import the... (1 Reply)
Discussion started by: mcraul
1 Replies
2. Web Development
Hello everybody
Hope somebody can help me
I'm trying to install SSL Certificate on Apache/mod_ssl on Linux with Zend for Oracle.
I bought and downloaded certificate from certificate from Network Solutions. Than I followed the instructions to the dot.
I created a directory for certificate... (2 Replies)
Discussion started by: Trusevich
2 Replies
3. Web Development
Dear All
Anyone know how to issue two different certification on apache virtualhost fyi i have one virtualhost eg 69.192.1.25:443 already signed with verisign how can i configure another virtualhost 69.192.1.25:443 which signing with another certificate which self signing. i search net not... (1 Reply)
Discussion started by: netxus
1 Replies
4. AIX
Hello,
I am new in UNIX, and some one asks me to install SSL certificates to allow exchange with an external system.
Can someone tell how to install certificate (ex : verisignxxx.cer) on a UNIX server?
Many thanks.
Tibo (4 Replies)
Discussion started by: tibo51
4 Replies
5. Web Development
we are doing TCP for our systems. I have a working SSL certificate on prodction webserver. Im planning to export it to our DR server for TCP purposes. However when I export based on the procedure below, it doesn't work. When I restart the DR webserver, it still says the certifcate is expired.Any... (1 Reply)
Discussion started by: lhareigh890
1 Replies
6. Red Hat
Hi,
I want to renew the ssl certificate for one of my application on tomcat without down time. I want to know what would the possible impacts for the users who currently have sessions to the app.
Regards,
Arumon (1 Reply)
Discussion started by: arumon
1 Replies
7. Red Hat
Hi guys,
I'm trying to generate a key using the genkey command in centos 6.4 and RHEL6.4, Every thing seems to go cool but I get this error message bad certificate request error -8016 and no key/cert is generated. I don't want use the many openssl(s) commands instead since genkey is a shourtcut... (4 Replies)
Discussion started by: leo_ultra_leo
4 Replies
8. Cybersecurity
Hey everyone, I'm trying to get a lay of the land for OS and Application Certificate Stores. Can someone confirm that I have this concept right?
If the application you're using say Firefox has it's own trusted CA store, it uses that exclusively. So if you're running firefox in Windows, Firefox... (4 Replies)
Discussion started by: Lost in Cyberia
4 Replies
9. Web Development
Hello!
I had a cron job running on my website, activating a php script every friday. The Php script just activated another photo to add in the gallery. It worked fine until I got an SSL certificate for my website, then everything broke.
This was the command before:
lynx -source... (0 Replies)
Discussion started by: AGDesign
0 Replies
LEARN ABOUT DEBIAN
check_ssl_cert
check_ssl_cert(1) USER COMMANDS check_ssl_cert(1)
NAME
check_ssl_cert - checks the validity of X.509 certificates
SYNOPSIS
check_ssl_cert -H host [OPTIONS]
DESCRIPTION
check_ssl_cert A Nagios plugin to check an X.509 certificate:
- checks if the server is running and delivers a valid certificate
- checks if the CA matches a given pattern
- checks the validity
ARGUMENTS
-H,--host host
server
OPTIONS
-A,--noauth
ignore authority warnings (expiration only)
--altnames
matches the pattern specified in -n with alternate names too
-C,--clientcert path
use client certificate to authenticate
--clientpass phrase
set passphrase for client certificate.
-c,--critical days
minimum number of days a certificate has to be valid to issue a critical status
-e,--email address
pattern to match the email address contained in the certificate
-f,--file file
local file path (works with -H localhost only)
-h,--help,-?
this help message
-i,--issuer issuer
pattern to match the issuer of the certificate
-n,---cn name
pattern to match the CN of the certificate
-N,--host-cn
match CN with the host name
-o,--org org
pattern to match the organization of the certificate
--openssl path
path of the openssl binary to be used
-p,--port port
TCP port
-P,--protocol protocol
use the specific protocol: http (default) or smtp,pop3,imap,ftp (switch to TLS)
-s,--selfsigned
allows self-signed certificates
-r,--rootcert cert
root certificate or directory to be used for certficate validation (passed to openssl's -CAfile or -CApath)
-t,--timeout
seconds timeout after the specified time (defaults to 15 seconds)
--temp dir
directory where to store the temporary files
-v,--verbose
verbose output
-V,--version
version
-w,--warning days
minimum number of days a certificate has to be valid to issue a warning status
DEPRECATED OPTIONS
-d,--days days
minimum number of days a certificate has to be valid (see --critical and --warning)
SEE ALSO
x509(1), openssl(1), expect(1)
EXIT STATUS
check_ssl_cert returns a zero exist status if it finds no errors, 1 for warnings, 2 for a critical errors and 3 for unknown problems
BUGS
Please report bugs to: Matteo Corti (matteo.corti (at) id.ethz.ch)
AUTHOR
Matteo Corti (matteo.corti (at) id.ethz.ch) See the AUTHORS file for the complete list of contributors
1.13.0 April, 2012 check_ssl_cert(1)