10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
I can view the openSSL certifcate with this command
openssl x509 -text -in myCertificate.pem
I just wanted to see when the cert will expire only. The line which I want to read is,
Not After : Jul 28 14:09:57 2015 GMT
I tried using the grep command but it doesn't display anything.
grep... (1 Reply)
Discussion started by: Loc
1 Replies
2. UNIX for Advanced & Expert Users
:rolleyes:I am trying to setup all certificate based client-server environment in Linux using vsftpd and curl with openssl.
I would like to make a user access with vsftpd certificate and user own client certificate (self-signed) with private/public key.
I don't see google posts about the my plan... (4 Replies)
Discussion started by: gogogo
4 Replies
3. Cybersecurity
Hey everyone, another question on certificate chains...
When a site applies for an ssl certificate, do they have to apply to a root CA? or can they apply to a root, or one of the many smaller CA companies? Then once they obtain a cert from that smaller CA, the company gets it's cert signed by a... (1 Reply)
Discussion started by: Lost in Cyberia
1 Replies
4. Cybersecurity
Hey everyone, I'm trying to get a lay of the land for OS and Application Certificate Stores. Can someone confirm that I have this concept right?
If the application you're using say Firefox has it's own trusted CA store, it uses that exclusively. So if you're running firefox in Windows, Firefox... (4 Replies)
Discussion started by: Lost in Cyberia
4 Replies
5. Shell Programming and Scripting
Hi,
I am getting below error when I do
-------------------------------
curl: (60) SSL certificate problem, verify that the CA cert is OK. Details:
error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
More details here: cURL - Details on Server SSL Certificates... (5 Replies)
Discussion started by: Anjan1
5 Replies
6. Cybersecurity
Hi guys.
I have some questions about ssl certificates.
I looked at SSL providers and saw that they are providing 2 types of certificates: per server or per domain.
my server host name is: srv1.example.com
I have a smtp, imap, web server on this box. but all services accessed by different... (1 Reply)
Discussion started by: majid.merkava
1 Replies
7. Web Development
Dear All
Anyone know how to issue two different certification on apache virtualhost fyi i have one virtualhost eg 69.192.1.25:443 already signed with verisign how can i configure another virtualhost 69.192.1.25:443 which signing with another certificate which self signing. i search net not... (1 Reply)
Discussion started by: netxus
1 Replies
8. Windows & DOS: Issues & Discussions
Dear Expert,
i have linux box that is running in the windows domain, BUT did not being a member of the domain. as I am not the System Administrator so I have no control on the server in the network, such as modify dns entry , add the linux box in AD and domain record and so on that relevant.
... (2 Replies)
Discussion started by: regmaster
2 Replies
9. HP-UX
Hi,
we are having the installed cerificates in our unix server's.
The certificates are in following format : cacert.pem,cert8.db,ois294.sem,CertGenCAKey.der,ss_keystore.jks
So i want to know the Expiry date for these certificates. how to get the valid FROM to TO dates for these kind of... (1 Reply)
Discussion started by: srujana
1 Replies
10. Forum Support Area for Unregistered Users & Account Problems
TO WHOM IT MAY CONCERN:
I am Ayanda Fuzile, I would like to request my UNIX Certificate, I completed my course in 2000. My email adress is removed, my postal adress is also removed.
Kind Regards,
Ayanda Fuzile (1 Reply)
Discussion started by: afuzile
1 Replies
MKIMAPDCERT(8) Double Precision, Inc. MKIMAPDCERT(8)
NAME
mkimapdcert - create a test SSL certificate for IMAP over SSL
SYNOPSIS
/usr/sbin/mkimapdcert
DESCRIPTION
IMAP over SSL requires a valid, signed, X.509 certificate. The default location for the certificate file is /usr/lib/courier/imapd.pem.
mkimapdcert generates a self-signed X.509 certificate, mainly for testing. For production use the X.509 certificate must be signed by a
recognized certificate authority, in order for mail clients to accept the certificate.
/usr/lib/courier/imapd.pem must be owned by the daemon user and have no group or world permissions. The mkimapdcert command will enforce
this. To prevent an unfortunate accident, mkimapdcert will not work if /usr/lib/courier/imapd.pem already exists.
mkimapdcert requires OpenSSL to be installed.
FILES
/usr/lib/courier/imapd.pem
X.509 certificate.
/etc/courier/imapd.cnf
Parameters used by OpenSSL to create the X.509 certificate.
SEE ALSO
courier(8)[1]
AUTHOR
Sam Varshavchik
Author
NOTES
1. courier(8)
[set $man.base.url.for.relative.links]/courier.html
Courier Mail Server 04/04/2011 MKIMAPDCERT(8)