[Eisfair] Aw?==?utf-8?Q?: Re: Aw: Re: Aw: Re: ssl ?==?utf-8?Q?Zertifikat
Lutz Spindler
fraenzi2000 at web.de
Sa Aug 23 16:02:29 CEST 2014
Hallo Marcus,
sorry wenn ich noch einmal nerve.
ich kann sagen es läuft soweit alles.
jetzt bekomme ich aber folgende Mails
Please check these certificates it will become invalid:
Current date : Aug 23 15:30:02 2014 CEST
Certificate : /usr/local/ssl/certs/1bc668cc.pem
Subject : /C=US/postalCode=38477/ST=Florida/L=English/street=Sea
Vill ...
: age 10/O=Google Ltd./OU=Tech Dept./OU=Hosted by GTI Group
C ...
: orporation/OU=PlatinumSSL/CN=addons.mozilla.org
Valid from : Mar 15 00:00:00 2011 GMT
Valid until: Mar 14 23:59:59 2014 GMT
Certificate : /usr/local/ssl/certs/476182b1.pem
Subject : /C=US/postalCode=38477/ST=Florida/L=English/street=Sea
Vill ...
: age 10/O=Google Ltd./OU=Tech Dept./OU=Hosted by GTI Group
C ...
: orporation/OU=PlatinumSSL/CN=www.google.com
Valid from : Mar 15 00:00:00 2011 GMT
Valid until: Mar 14 23:59:59 2014 GMT
Certificate : /usr/local/ssl/certs/48ef30f1.pem
Subject : /C=DE/ST=Hamburg/L=Hamburg/O=TC TrustCenter for Security
in ...
: Data Networks GmbH/OU=TC TrustCenter Class 2
CA/emailAddres ...
: s=mailto:certificate at trustcenter.de
Valid from : Mar 9 11:59:59 1998 GMT
Valid until: Jan 1 11:59:59 2011 GMT
Certificate : /usr/local/ssl/certs/6a680ea5.pem
Subject : /C=US/postalCode=38477/ST=Florida/L=English/street=Sea
Vill ...
: age 10/O=Google Ltd./OU=Tech Dept./OU=Hosted by GTI Group
C ...
: orporation/OU=PlatinumSSL/CN=mail.google.com
Valid from : Mar 15 00:00:00 2011 GMT
Valid until: Mar 14 23:59:59 2014 GMT
Certificate : /usr/local/ssl/certs/72de6920.pem
Subject : /C=US/postalCode=38477/ST=Florida/L=Tampa/street=Sea
Villag ...
: e 10/O=Global Trustee/OU=Global Trustee/OU=Hosted by GTI
Gr ...
: oup Corporation/OU=PlatinumSSL/CN=global trustee
Valid from : Mar 15 00:00:00 2011 GMT
Valid until: Mar 14 23:59:59 2014 GMT
Certificate : /usr/local/ssl/certs/804c2a3a.pem
Subject : /C=US/postalCode=38477/ST=Florida/L=English/street=Sea
Vill ...
: age 10/O=Google Ltd./OU=Tech Dept./OU=Hosted by GTI Group
C ...
: orporation/OU=PlatinumSSL/CN=login.live.com
Valid from : Mar 15 00:00:00 2011 GMT
Valid until: Mar 14 23:59:59 2014 GMT
Certificate : /usr/local/ssl/certs/972672fc.pem
Subject : /C=DE/ST=Hamburg/L=Hamburg/O=TC TrustCenter for Security
in ...
: Data Networks GmbH/OU=TC TrustCenter Class 3
CA/emailAddres ...
: s=mailto:certificate at trustcenter.de
Valid from : Mar 9 11:59:59 1998 GMT
Valid until: Jan 1 11:59:59 2011 GMT
Certificate : /usr/local/ssl/certs/ad6c2ff9.pem
Subject : /C=DE/postalCode=12345/ST=Test State/L=Test
City/street=Tes ...
: t Street/O=Kai Engert/OU=For Testing Purposes
Only/OU=TEST ...
: USE ONLY - NO WARRANTY ATTACHED/OU=Comodo Trial
SSL/CN=kuix.de
Valid from : Mar 17 00:00:00 2011 GMT
Valid until: Apr 16 23:59:59 2011 GMT
Certificate : /usr/local/ssl/certs/c75dd286.pem
Subject : /C=US/postalCode=38477/ST=Florida/L=English/street=Sea
Vill ...
: age 10/O=Google Ltd./OU=Tech Dept./OU=Hosted by GTI Group
C ...
: orporation/OU=PlatinumSSL/CN=login.yahoo.com
Valid from : Mar 15 00:00:00 2011 GMT
Valid until: Mar 14 23:59:59 2014 GMT
Certificate : /usr/local/ssl/certs/ce026bf8.pem
Subject : /C=ES/L=C/ Muntaner 244 Barcelona/CN=Autoridad de
Certifica ...
: cion Firmaprofesional CIF
A62634068/emailAddress=ca at firmapr ...
: ofesional.com
Valid from : Oct 24 22:00:00 2001 GMT
Valid until: Oct 24 22:00:00 2013 GMT
Certificate : /usr/local/ssl/certs/deutsche_telekom_root_ca_2 .pem
Valid from :
Valid until:
Certificate : /usr/local/ssl/certs/eeaa6d5c.pem
Subject : /C=US/postalCode=38477/ST=Florida/L=English/street=Sea
Vill ...
: age 10/O=Google Ltd./OU=Tech Dept./OU=Hosted by GTI Group
C ...
: orporation/OU=PlatinumSSL/CN=login.skype.com
Valid from : Mar 15 00:00:00 2011 GMT
Valid until: Mar 14 23:59:59 2014 GMT
Certificate : /usr/local/ssl/certs/exim.pem
Subject : /C=DE/ST=Nordrhein
Westfalen/L=Koeln/O=privat/OU=eisfair/CN ...
: =eis/emailAddress=mailto:eis at eis.de
Valid from : Sep 3 09:36:18 2006 GMT
Valid until: Sep 3 09:36:18 2007 GMT
Certificate : /usr/local/ssl/certs/mini_httpd.pem
Valid from :
Valid until:
Certificate : /usr/local/ssl/certs/pure-ftpd.pem
Subject : /C=DE/ST=Nordrhein
Westfalen/L=Koeln/O=privat/OU=eisfair/CN ...
: =eis/emailAddress=mailto:eis at eis.de
Valid from : Sep 3 09:36:18 2006 GMT
Valid until: Sep 3 09:36:18 2007 GMT
diese sind wohl abgelaufen und werden wohl auch nicht automatisch
aktualisiert.
soll oder kann ich die entfernen und wie am besten gleich alle??
dann kommt noch eine weiter Mail
fcron <root at eis> /var/install/config.d/mail.sh sendcertwarning
unknown option .pem
usage: x509 args
-inform arg - input format - default PEM (one of DER, NET or PEM)
-outform arg - output format - default PEM (one of DER, NET or PEM)
-keyform arg - private key format - default PEM
-CAform arg - CA format - default PEM
-CAkeyform arg - CA key format - default PEM
-in arg - input file - default stdin
-out arg - output file - default stdout
-passin arg - private key password source
-serial - print serial number value
-subject_hash - print subject hash value
-subject_hash_old - print old-style (MD5) subject hash value
-issuer_hash - print issuer hash value
-issuer_hash_old - print old-style (MD5) issuer hash value
-hash - synonym for -subject_hash
-subject - print subject DN
-issuer - print issuer DN
-email - print email address(es)
-startdate - notBefore field
-enddate - notAfter field
-purpose - print out certificate purposes
-dates - both Before and After dates
-modulus - print the RSA key modulus
-pubkey - output the public key
-fingerprint - print the certificate fingerprint
-alias - output certificate alias
-noout - no certificate output
-ocspid - print OCSP hash values for the subject name and
public key
-ocsp_uri - print OCSP Responder URL(s)
-trustout - output a "trusted" certificate
-clrtrust - clear all trusted purposes
-clrreject - clear all rejected purposes
-addtrust arg - trust certificate for a given purpose
-addreject arg - reject certificate for a given purpose
-setalias arg - set certificate alias
-days arg - How long till expiry of a signed certificate - def 30
days
-checkend arg - check whether the cert expires in the next arg
seconds
exit 1 if so, 0 if not
-signkey arg - self sign cert with arg
-x509toreq - output a certification request object
-req - input is a certificate request, sign and output.
-CA arg - set the CA certificate, must be PEM format.
-CAkey arg - set the CA key, must be PEM format
missing, it is assumed to be in the CA file.
-CAcreateserial - create serial number file if it does not exist
-CAserial arg - serial file
-set_serial - serial number to use
-text - print the certificate in text form
-C - print out C code forms
-md2/-md5/-sha1/-mdc2 - digest to use
-extfile - configuration file with X509V3 extensions to add
-extensions - section from config file with X509V3 extensions to
add
-clrext - delete extensions before signing and input
certificate
-nameopt arg - various certificate name options
-engine e - use engine e, possibly a hardware device.
-certopt arg - various certificate text options
unknown option .pem
usage: x509 args
-inform arg - input format - default PEM (one of DER, NET or PEM)
-outform arg - output format - default PEM (one of DER, NET or PEM)
-keyform arg - private key format - default PEM
-CAform arg - CA format - default PEM
-CAkeyform arg - CA key format - default PEM
-in arg - input file - default stdin
-out arg - output file - default stdout
-passin arg - private key password source
-serial - print serial number value
-subject_hash - print subject hash value
-subject_hash_old - print old-style (MD5) subject hash value
-issuer_hash - print issuer hash value
-issuer_hash_old - print old-style (MD5) issuer hash value
-hash - synonym for -subject_hash
-subject - print subject DN
-issuer - print issuer DN
-email - print email address(es)
-startdate - notBefore field
-enddate - notAfter field
-purpose - print out certificate purposes
-dates - both Before and After dates
-modulus - print the RSA key modulus
-pubkey - output the public key
-fingerprint - print the certificate fingerprint
-alias - output certificate alias
-noout - no certificate output
-ocspid - print OCSP hash values for the subject name and
public key
-ocsp_uri - print OCSP Responder URL(s)
-trustout - output a "trusted" certificate
-clrtrust - clear all trusted purposes
-clrreject - clear all rejected purposes
-addtrust arg - trust certificate for a given purpose
-addreject arg - reject certificate for a given purpose
-setalias arg - set certificate alias
-days arg - How long till expiry of a signed certificate - def 30
days
-checkend arg - check whether the cert expires in the next arg
seconds
exit 1 if so, 0 if not
-signkey arg - self sign cert with arg
-x509toreq - output a certification request object
-req - input is a certificate request, sign and output.
-CA arg - set the CA certificate, must be PEM format.
-CAkey arg - set the CA key, must be PEM format
missing, it is assumed to be in the CA file.
-CAcreateserial - create serial number file if it does not exist
-CAserial arg - serial file
-set_serial - serial number to use
-text - print the certificate in text form
-C - print out C code forms
-md2/-md5/-sha1/-mdc2 - digest to use
-extfile - configuration file with X509V3 extensions to add
-extensions - section from config file with X509V3 extensions to
add
-clrext - delete extensions before signing and input
certificate
-nameopt arg - various certificate name options
-engine e - use engine e, possibly a hardware device.
-certopt arg - various certificate text options
unknown option .pem
usage: x509 args
-inform arg - input format - default PEM (one of DER, NET or PEM)
-outform arg - output format - default PEM (one of DER, NET or PEM)
-keyform arg - private key format - default PEM
-CAform arg - CA format - default PEM
-CAkeyform arg - CA key format - default PEM
-in arg - input file - default stdin
-out arg - output file - default stdout
-passin arg - private key password source
-serial - print serial number value
-subject_hash - print subject hash value
-subject_hash_old - print old-style (MD5) subject hash value
-issuer_hash - print issuer hash value
-issuer_hash_old - print old-style (MD5) issuer hash value
-hash - synonym for -subject_hash
-subject - print subject DN
-issuer - print issuer DN
-email - print email address(es)
-startdate - notBefore field
-enddate - notAfter field
-purpose - print out certificate purposes
-dates - both Before and After dates
-modulus - print the RSA key modulus
-pubkey - output the public key
-fingerprint - print the certificate fingerprint
-alias - output certificate alias
-noout - no certificate output
-ocspid - print OCSP hash values for the subject name and
public key
-ocsp_uri - print OCSP Responder URL(s)
-trustout - output a "trusted" certificate
-clrtrust - clear all trusted purposes
-clrreject - clear all rejected purposes
-addtrust arg - trust certificate for a given purpose
-addreject arg - reject certificate for a given purpose
-setalias arg - set certificate alias
-days arg - How long till expiry of a signed certificate - def 30
days
-checkend arg - check whether the cert expires in the next arg
seconds
exit 1 if so, 0 if not
-signkey arg - self sign cert with arg
-x509toreq - output a certification request object
-req - input is a certificate request, sign and output.
-CA arg - set the CA certificate, must be PEM format.
-CAkey arg - set the CA key, must be PEM format
missing, it is assumed to be in the CA file.
-CAcreateserial - create serial number file if it does not exist
-CAserial arg - serial file
-set_serial - serial number to use
-text - print the certificate in text form
-C - print out C code forms
-md2/-md5/-sha1/-mdc2 - digest to use
-extfile - configuration file with X509V3 extensions to add
-extensions - section from config file with X509V3 extensions to
add
-clrext - delete extensions before signing and input
certificate
-nameopt arg - various certificate name options
-engine e - use engine e, possibly a hardware device.
-certopt arg - various certificate text options
unable to load certificate
3074791048:error:0906D06C:PEM routines:PEM_read_bio:no start
line:pem_lib.c:703:Expecting: TRUSTED CERTIFICATE unable to load
certificate 3074963080:error:0906D06C:PEM routines:PEM_read_bio:no start
line:pem_lib.c:703:Expecting: TRUSTED CERTIFICATE unable to load
certificate 3074528904:error:0906D06C:PEM routines:PEM_read_bio:no start
line:pem_lib.c:703:Expecting: TRUSTED CERTIFICATE
was ist damit??
wie schon gesagt es geht alles, aber diese Mails sollten möglichst
nicht mehr kommen.
vielen Dank
Gruß
Lutz
Mehr Informationen über die Mailingliste Eisfair