Skip to main content

Macam2 cerita pasal OPENSSL

USEFUL OPENSSL ONE-LINERS
As a follow up for the certificate authority posting, here are some (hopefully) useful openssl one-liners:

# creating a key
openssl genrsa -aes256 -out user.key 4096

# creating a certificate signing request
openssl req -sha256 -new -key user.key -out user.csr
# signing the certificate signing request with a certificate authority
openssl ca -config ca.config -out user.crt -infiles user.csr
# creating a self sigend certificate
openssl req -sha256 -new -x509 -key user.key -out user.crt
# verify if the ca.crt has really signed user.crt
openssl verify -CAfile ca.crt user.crt
# decrypting the key
openssl rsa -in user.key -out user.key.decrypted
# creating a pkcs#7 format certificate in DER format
openssl crl2pkcs7 -nocrl -certfile user.crt -certfile ca.crt -outform DER -out user.p7c
# creating a pkcs#12 format certificate (IIS)
openssl pkcs12 -export -in user.crt -inkey user.key -out server.pkcs12

# checking the data of a key
openssl rsa -noout -text -in user.key
# checking the data of the certificate request
openssl req -text -noout -in user.csr
# checking the data of a certificate
openssl x509 -noout -text -in user.crt
# checking the data of a pcks#7 certificate
openssl pkcs7 -inform DER -text -print_certs -in user.p7c
# checking the data of a pkcs#12 certificate
openssl pkcs12 -noout -info -in user.pkcs12

# showing the MD5 fingerprint of a certificate
openssl x509 -noout -fingerprint -in user.crt
# showing the SHA1 fingerprint of a certificate
openssl x509 -noout -fingerprint -sha1 -in user.crt
# converting a key from PEM to DER format
openssl rsa -inform PEM -outform DER -in user.key.decrypted -out user.der
# converting a certificate from PEM to DER format
openssl x509 -inform PEM -outform DER -in user.crt -out user.der
# check, if the certificate installation was successful
openssl s_client -connect FQDN:443 -CAfile /usr/local/lib/openssl/certs/ca-bundle.crt | openssl x509 -text | less

# provide an ssl server to test against
openssl s_server -accept 9000 -cert user.crt -key user.key
# verify a s/mime signature
openssl smime -CAfile /usr/local/lib/openssl/certs/ca-bundle.crt -verify -in messagefile >/dev/null

# extract the s/mime Certificate to something usable :-)
openssl smime -pk7out -in messagefile | openssl pkcs7 -print_certs

# show subject, startdate, enddate (validy-time / expire-date)
openssl x509 -noout -subject -startdate -enddate -in user.crt

Credit to: https://hexeract.wordpress.com/2009/04/17/useful-openssl-one-liners/

Comments

Popular posts from this blog

IUSR vs IUSR_MachineName vs IIS_WPG

ni satu lagi hal yang memeningkan aku 2 3 hari. apalah IIS ni, len kali habaq la hangpa dah tukar pasal IIS_IUSR. jenuh aku mencari solution sebab2 application tak mo jalan. apa raa. secara ringkasnya IIS kata: In earlier versions of IIS, a local account called IUSR_MachineName is created during installation. IIS used the IUSR_MachineName account by default whenever anonymous authentication was enabled. This was used by both the FTP and HTTP services. lepas tu dia kata lagi: In summary, IIS 7 and above offer the following: The IUSR built-in account replaces the IUSR_MachineName account. The IIS_IUSRS built-in group replaces the IIS_WPG group. alhamdulillah boleh jalan :D source: https://www.iis.net/learn/get-started/planning-for-security/understanding-built-in-user-and-group-accounts-in-iis

MYSQL TO MSSQL

Aduss berpeluh2 hampir 3 minggu cari solution utk convert db mysql to mssql. mula2 aku pakai phpmyadmin untuk generate sqldump. then aku terai import masuk ke mssql gunakan new query. rupa2nya phpmyadmin ni pon bengong. dia tak create ikut mssql punya format syntac, dia generate ikut kepala dia saja walaupun aku dah klik checkbox pada OPTION MSSQL format. patut le mssql tak mau terima, even barus yg paling mudah skali iaitu komen pon phpmyadmin tak tukar!!! ade ke format komen mssql si phpmyadmin masih pakai "--" (dash dash). mssql pakai syntax "/*" utk buka blok komen dan "*/" utk tutup blok komen. adusss.  banyak plak tu dalam sqldump aku nak kena tukar.. lemau aku. 160MB punya textfile. gilo apo nak ubah satu persatu baris.. berjuta baris woo.. 8 tahun pon tak siap nak ubah. tapi ada satu software boleh buat semua tu secara auto. SQL2MSS. aku cuma pakai demo set je. dia boleh sedut semua structure, tapi rekod cuma dapat 5 per table. jadi la 5 re...

Internet Hotspot dah "Licin", Tiba2 boleh "Hidup" kembali.

 Aduhai, lama tak bersembang2 ye. Aku termenung bila hotspot 12GB Yes 5G aku abes. Rasa quota aku disedut laju je. Tiba2 aku cari solution dalam Google, terjumpa seorang brader kongsikan cara2 nak bypass hotspot yang mana pakai pc/laptop dan hotspot melalui fon lah. Kalau lain dari cara sambungan tu, jangan ditanya ler, aku pun tak tau. ni aku sharekan juga petua dari dia. Hangpa semua boleh je baca kat web blog dia. Give a credit to him. taip di command promt (administrator level) seperti dibawah. satu persatu, tekan enter. netsh int ipv4 set glob defaultcurhoplimit=65 netsh int ipv6 set glob defaultcurhoplimit=65 lepas dah taip 2 baris tu. try ler ping mana2 url yang korang tau. ada respon? atau buka browser. Aku berjaya dan menjadi, sebab tu aku tulis dan korang boleh baca artikel ni. hahaha. Selamat mencuba ye. berapa lama dapat bertahan? entah la bos! Sumber:    Cara Buat Unlimited Data Hotspot Pada Semua Telco Secara Percuma (blogfaiz.com)