10 More Discussions You Might Find Interesting
1. HP-UX
Hi Guys,
I am new to HP-UX and want to find expiration date of particular user please also note i don't have root access on that server.
for e.g.
i have user abc on my HP box and want to know when its password going to expire and also when its password changed last time.
I also try to... (7 Replies)
Discussion started by: Yasin Rakhangi
7 Replies
2. Solaris
Friends,
I'm in search of a keytool command which pulls the expiration dates of certificates in keystore. I have around 200 certs in my keystore, so would like to know if we have any script/command which can pull expiration dates of certificates at one run. (3 Replies)
Discussion started by: fop4658
3 Replies
3. AIX
Hi Admins,
AIX 5.3
I know maxage value tells the system about password expiration policy.
One of the user's maxage is 5 weeks.But he changed the password long backup at 2008 according to lastupdate value.
Since maxage is 5, the password should expire every 5 weeks.But how come... (4 Replies)
Discussion started by: newaix
4 Replies
4. Shell Programming and Scripting
Hi All,
Warm New Year Wishes to every one
I am New to UNIX and i don't have much Experience on UNIX Scripting, so can someone help me out on below Request
I have Digital certificates that are being used in My current project. All these Certificates are of Extensions (.cert and .pfx)... (1 Reply)
Discussion started by: manukonda0102
1 Replies
5. Shell Programming and Scripting
I need to create a script that will generate a bunch of OpenSSL Certificates signed by my own CA. The certificates being generated are for testing purposes only. But what I need is the following
Root CA
512
768
1024
1280
1536
1792
2048
4096
I need basically 64 combinations. Each... (4 Replies)
Discussion started by: krisarmstrong
4 Replies
6. Shell Programming and Scripting
Hi,
I am a unix newbie. I need to write a script to check wheteher another script is still running. If it is, then sleep for 30m and then check again if the script is running. If the script has stopped running then, I need to come out of the loop.
I am using RHEL 5.2 (2 Replies)
Discussion started by: mathews
2 Replies
7. Cybersecurity
Does anyone know how to extract the expiration date of a Solaris 9 certificate? I have searched over the 'net and it seems this command ssl-cert-check comes up often but this does not work on my servers. Not sure how to extraxt the expiration dates of the SSL Certs so if anyone can help that would... (2 Replies)
Discussion started by: bluridge
2 Replies
8. Linux
Hi All,
I have this user on my /etc/shadow:
mysql:$1$vmw4r078$4.lp6z2s0KJYHKXTuPG2x0:13556:0::12:::
The 5 column is blank. Does it mean the user has no password expiration.
Thanks in advance for any idea. (1 Reply)
Discussion started by: itik
1 Replies
9. Solaris
Hello
can anyone explain where can be found logic for user password expiration on solaris as well as on reliant UNIX??
there is not much help of /etc/security directory..does not exist!
any help? (3 Replies)
Discussion started by: abdulaziz
3 Replies
10. UNIX for Dummies Questions & Answers
I wish to seach a Dir for a specific file, once the file is found i will perform additional logic. If the file is not found within two hours, i would like to exit.
Logically, I'm looking for the best way to approach this
Thanks for any assistance in advance.
Note: I'm using a C shell and... (2 Replies)
Discussion started by: mmarsh
2 Replies
LPRNG_CERTS(1) General Commands Manual LPRNG_CERTS(1)
NAME
lprng_certs - lprng SSL certificate management
SYNOPSIS
lprng_certs option
Options:
init - make directory structure
newca - make new root CA
defaults - set new default values for certs
gen - generate user, server, or signing cert
index [dir] - index cert files
verify [cert] - verify cert file
encrypt keyfile
- set or change keyfile password
DESCRIPTION
The lprng_certs program is used to manage SSL certificates for the LPRng software. There SSL certificate structure consists of a hierarchy
of certificates. The LPRng software assumes that the following types of certificates will be used:
CA or root
A top level or self-signed certificate.
signing
A certificate that can be used to sign other certificates. This is signed by the root CA or another signing certificate.
user A certificate used by a user to identify themselves to the lpd server.
server A certificate used by the lpd server to identify themselves to the user or other lpd servers.
Signing Certificates
All of the signing certificates, including the root certificate (root CA), /etc/lpd/ssl.ca/ca.crt, are in the same directory as the root CA
file. Alternately, all of the signing certs can be concatenated and put into a single file, which by convention is assumed to have the
same name as the root CA file, /etc/lpd/ssl.ca/ca.crt. The ssl_ca_file, ssl_ca_path, and ssl_ca_key printcap and configuration options can
be used to specify the locations of the root CA files, a directory containing the signing certificate files, and the private key file for
the root CA file respectively.
The root certificate (root CA file) /etc/lpd/ssl.ca/ca.crt has a private key file /etc/lpd/ssl.ca/ca.key as well. By convention, the pri-
vate keys for the other signing certificate files are stored in the certificate file.
The OpenSSL software requires that this directory also contain a set of hash files which are, in effect, links to these files.
By default, all signing certificates are assumed to be in the same directory as the root certificate.
Server Certificates
The certificate used by the lpd server are kept in another directory. These files do not need to have hash links to them. By convention,
the private keys for these certificate files are stored in the certificate file. The server certificate file is specified by the
ssl_server_cert and has the default value /etc/lpd/ssl.server/server.crt. This file contains the cert and private key. The server cer-
tificate password file is specified by the ssl_server_password option with the default value @SSL_SERVER_PASSWORD@ and contains the pass-
word used to decrypt the servers private key and use it for authentication. This key file should be read only by the lpd server.
User Certificates
The certificates used by users are kept in a separate directory in the users home directory. By convention, the private keys for these
certificate files are stored in the certificate file.
The user certificate file is specified by the LPR_SSL_FILE environment variable, otherwise the ${HOME}/.lpr/client.crt is used. The pass-
word is taken from the file specified by the LPR_SSL_PASSWORD environment variable, otherwise the ${HOME}/.lpr/client.pwd file is read.
USING LPRNG_CERTS
The organization of the SSL certificates used by LPRng is similar to that used by other programs such as the Apache mod_ssl support. The
lprng_certs program is used to create the directory structure, create certificates for the root CA, signing, user and servers. In order to
make managment simple, the following support is provided.
lprng_certs init
This command creates the directories used by the lpd server. It is useful when setting up a new lpd server.
lprng_certs newca
This command creates a self-signed certificate, suitable for use as a root CA certificate. It also sets up a set of default values for
other certificate creation.
lprng_certs defaults
This command is used to modify the set of default values.
The default values are listed and should be self-explanatory, except for the value of the signer certificate. By default, the root CA can
be used to sign certificates. However, a signing certificate can be used as well. This allows delegation of signing authority without
compromising the security of the root CA.
lprng_certs gen
This is used to generate a user, server, or signing certificate.
lprng_certs index
This is used to create the indexes for the signing certificates.
lprng_certs verify [cert]
This checks the certificate file using the Openssl openssl verify command.
lprng_certs encrypt keyfile
This removes all key information from the key file, reencrypts the key information, and the puts the encrypted key information in the file.
LPRng OPTIONS
Option Purpose
ssl_ca_path directory holding the SSL signing certs
ssl_ca_file file holding the root CA or all SSL signing certs
ssl_server_cert cert file for the server
ssl_server_password file containing password for server server
${HOME}/.lpr/client.crt client certificate file
${HOME}/.lpr/client.pwd client certificate private key password
ENVIRONMENT VARIABLES
LPR_SSL_FILE client certificate file
LPR_SSL_PASSWORD client certificate private key password
EXIT STATUS
The following exit values are returned:
zero (0) Successful completion.
non-zero (!=0) An error occurred.
SEE ALSO
lpd.conf(5), lpc(8), lpd(8), checkpc(8), lpr(1), lpq(1), lprm(1), printcap(5), lpd.conf(5), pr(1), lprng_certs(1), lprng_index_certs(1).
HISTORY
LPRng is a enhanced printer spooler system with functionality similar to the Berkeley LPR software. The LPRng mailing list is
lprng@lprng.com; subscribe by sending mail to lprng-request@lprng.com with the word subscribe in the body. The software is available from
ftp://ftp.lprng.com/pub/LPRng.
AUTHOR
Patrick Powell <papowell@lprng.com>.
LPRng LPRng-3.9.0 LPRNG_CERTS(1)