Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

cert8.db(5) [centos man page]

CERT8.DB(5)						     Network Security Services						       CERT8.DB(5)

NAME
cert8.db - Legacy NSS certificate database DESCRIPTION
cert8.db is an NSS certificate database. This certificate database is in the legacy database format. Consider migrating to cert9.db and key4.db which are the new sqlite-based shared database format with support for concurrent access. FILES
/etc/pki/nssdb/cert8.db SEE ALSO
cert9.db(5), key4.db(5), pkcs11.txt(5), AUTHORS
The nss libraries were written and maintained by developers with Netscape, Red Hat, Sun, Oracle, Mozilla, and Google. Authors: Elio Maldonado <emaldona@redhat.com>. LICENSE
Licensed under the Mozilla Public License, v. 2.0. If a copy of the MPL was not distributed with this file, You can obtain one at http://mozilla.org/MPL/2.0/. nss 3.15.4 17 June 2014 CERT8.DB(5)

Check Out this Related Man Page

PP(1)								NSS Security Tools							     PP(1)

NAME
pp - Prints certificates, keys, crls, and pkcs7 files SYNOPSIS
pp -t type [-a] [-i input] [-o output] STATUS
This documentation is still work in progress. Please contribute to the initial review in Mozilla NSS bug 836477[1] DESCRIPTION
pp pretty-prints private and public key, certificate, certificate-request, pkcs7 or crl files OPTIONS
-t type specify the input, one of {private-key | public-key | certificate | certificate-request | pkcs7 | crl} -a Input is in ascii encoded form (RFC1113) -i inputfile Define an input file to use (default is stdin) -u outputfile Define an output file to use (default is stdout) ADDITIONAL RESOURCES
NSS is maintained in conjunction with PKI and security-related projects through Mozilla and Fedora. The most closely-related project is Dogtag PKI, with a project wiki at PKI Wiki[2]. For information specifically about NSS, the NSS project wiki is located at Mozilla NSS site[3]. The NSS site relates directly to NSS code changes and releases. Mailing lists: pki-devel@redhat.com and pki-users@redhat.com IRC: Freenode at #dogtag-pki AUTHORS
The NSS tools were written and maintained by developers with Netscape, Red Hat, Sun, Oracle, Mozilla, and Google. Authors: Elio Maldonado <emaldona@redhat.com>, Deon Lackey <dlackey@redhat.com>. LICENSE
Licensed under the Mozilla Public License, v. 2.0. If a copy of the MPL was not distributed with this file, You can obtain one at http://mozilla.org/MPL/2.0/. NOTES
1. Mozilla NSS bug 836477 https://bugzilla.mozilla.org/show_bug.cgi?id=836477 2. PKI Wiki http://pki.fedoraproject.org/wiki/ 3. Mozilla NSS site http://www.mozilla.org/projects/security/pki/nss/ nss-tools 12 November 2013 PP(1)
Man Page

4 More Discussions You Might Find Interesting

1. HP-UX

Certificate Expiry Dates

Hi, we are having the installed cerificates in our unix server's. The certificates are in following format : cacert.pem,cert8.db,ois294.sem,CertGenCAKey.der,ss_keystore.jks So i want to know the Expiry date for these certificates. how to get the valid FROM to TO dates for these kind of... (1 Reply)
Discussion started by: srujana
1 Replies

2. Solaris

DSEE 6.3.1 with TLS:simple

Hello guys, I have been trying to set up my DSEE 6.3 on Solaris 10 using proxy with tls:simple authentication. I follow all the steps mentioned in the Installation Guide on Sun's site but there is a problem with ldapclient init when I use hostname instead of IP address in the Default Server... (12 Replies)
Discussion started by: niyazi
12 Replies

3. Cybersecurity

SSL Certificate Stores

Hey everyone, I'm trying to get a lay of the land for OS and Application Certificate Stores. Can someone confirm that I have this concept right? If the application you're using say Firefox has it's own trusted CA store, it uses that exclusively. So if you're running firefox in Windows, Firefox... (4 Replies)
Discussion started by: Lost in Cyberia
4 Replies

4. Solaris

Sudo not working on LDAP client machine

Hi, I have configured ldap manually on solaris 10/11 machine with below entries: # ldapclient list |grep sudo NS_LDAP_SERVICE_SEARCH_DESC= sudoers:ou=SUDOers,dc=exm,dc=ple,dc=com # cat /etc/nsswitch.conf |grep -i sudo sudoers: files ldap # But groups available in LDAP server... (8 Replies)
Discussion started by: Sridaran
8 Replies