[Eisfair] Aw?==?utf-8?Q?: Re: Aw: Re: Aw: Re: ssl ?==?utf-8?Q?Zertifikat

Lutz Spindler fraenzi2000 at web.de
Sa Aug 23 16:02:29 CEST 2014


Hallo Marcus,
sorry wenn ich noch einmal nerve.

ich kann sagen es läuft soweit alles.
jetzt bekomme ich aber folgende Mails


Please check these certificates it will become invalid:

Current date : Aug 23 15:30:02 2014 CEST

Certificate  : /usr/local/ssl/certs/1bc668cc.pem
  Subject    : /C=US/postalCode=38477/ST=Florida/L=English/street=Sea
Vill ...
             : age 10/O=Google Ltd./OU=Tech Dept./OU=Hosted by GTI Group
C ...
             : orporation/OU=PlatinumSSL/CN=addons.mozilla.org
  Valid from : Mar 15 00:00:00 2011 GMT
  Valid until: Mar 14 23:59:59 2014 GMT

Certificate  : /usr/local/ssl/certs/476182b1.pem
  Subject    : /C=US/postalCode=38477/ST=Florida/L=English/street=Sea
Vill ...
             : age 10/O=Google Ltd./OU=Tech Dept./OU=Hosted by GTI Group
C ...
             : orporation/OU=PlatinumSSL/CN=www.google.com
  Valid from : Mar 15 00:00:00 2011 GMT
  Valid until: Mar 14 23:59:59 2014 GMT

Certificate  : /usr/local/ssl/certs/48ef30f1.pem
  Subject    : /C=DE/ST=Hamburg/L=Hamburg/O=TC TrustCenter for Security
in ...
             : Data Networks GmbH/OU=TC TrustCenter Class 2
CA/emailAddres ...
             : s=mailto:certificate at trustcenter.de
  Valid from : Mar  9 11:59:59 1998 GMT
  Valid until: Jan  1 11:59:59 2011 GMT

Certificate  : /usr/local/ssl/certs/6a680ea5.pem
  Subject    : /C=US/postalCode=38477/ST=Florida/L=English/street=Sea
Vill ...
             : age 10/O=Google Ltd./OU=Tech Dept./OU=Hosted by GTI Group
C ...
             : orporation/OU=PlatinumSSL/CN=mail.google.com
  Valid from : Mar 15 00:00:00 2011 GMT
  Valid until: Mar 14 23:59:59 2014 GMT

Certificate  : /usr/local/ssl/certs/72de6920.pem
  Subject    : /C=US/postalCode=38477/ST=Florida/L=Tampa/street=Sea
Villag ...
             : e 10/O=Global Trustee/OU=Global Trustee/OU=Hosted by GTI
Gr ...
             : oup Corporation/OU=PlatinumSSL/CN=global trustee
  Valid from : Mar 15 00:00:00 2011 GMT
  Valid until: Mar 14 23:59:59 2014 GMT

Certificate  : /usr/local/ssl/certs/804c2a3a.pem
  Subject    : /C=US/postalCode=38477/ST=Florida/L=English/street=Sea
Vill ...
             : age 10/O=Google Ltd./OU=Tech Dept./OU=Hosted by GTI Group
C ...
             : orporation/OU=PlatinumSSL/CN=login.live.com
  Valid from : Mar 15 00:00:00 2011 GMT
  Valid until: Mar 14 23:59:59 2014 GMT

Certificate  : /usr/local/ssl/certs/972672fc.pem
  Subject    : /C=DE/ST=Hamburg/L=Hamburg/O=TC TrustCenter for Security
in ...
             : Data Networks GmbH/OU=TC TrustCenter Class 3
CA/emailAddres ...
             : s=mailto:certificate at trustcenter.de
  Valid from : Mar  9 11:59:59 1998 GMT
  Valid until: Jan  1 11:59:59 2011 GMT

Certificate  : /usr/local/ssl/certs/ad6c2ff9.pem
  Subject    : /C=DE/postalCode=12345/ST=Test State/L=Test
City/street=Tes ...
             : t Street/O=Kai Engert/OU=For Testing Purposes
Only/OU=TEST  ...
             : USE ONLY - NO WARRANTY ATTACHED/OU=Comodo Trial
SSL/CN=kuix.de
  Valid from : Mar 17 00:00:00 2011 GMT
  Valid until: Apr 16 23:59:59 2011 GMT

Certificate  : /usr/local/ssl/certs/c75dd286.pem
  Subject    : /C=US/postalCode=38477/ST=Florida/L=English/street=Sea
Vill ...
             : age 10/O=Google Ltd./OU=Tech Dept./OU=Hosted by GTI Group
C ...
             : orporation/OU=PlatinumSSL/CN=login.yahoo.com
  Valid from : Mar 15 00:00:00 2011 GMT
  Valid until: Mar 14 23:59:59 2014 GMT

Certificate  : /usr/local/ssl/certs/ce026bf8.pem
  Subject    : /C=ES/L=C/ Muntaner 244 Barcelona/CN=Autoridad de
Certifica ...
             : cion Firmaprofesional CIF
A62634068/emailAddress=ca at firmapr ...
             : ofesional.com
  Valid from : Oct 24 22:00:00 2001 GMT
  Valid until: Oct 24 22:00:00 2013 GMT

Certificate  : /usr/local/ssl/certs/deutsche_telekom_root_ca_2 .pem
  Valid from : 
  Valid until: 

Certificate  : /usr/local/ssl/certs/eeaa6d5c.pem
  Subject    : /C=US/postalCode=38477/ST=Florida/L=English/street=Sea
Vill ...
             : age 10/O=Google Ltd./OU=Tech Dept./OU=Hosted by GTI Group
C ...
             : orporation/OU=PlatinumSSL/CN=login.skype.com
  Valid from : Mar 15 00:00:00 2011 GMT
  Valid until: Mar 14 23:59:59 2014 GMT

Certificate  : /usr/local/ssl/certs/exim.pem
  Subject    : /C=DE/ST=Nordrhein
Westfalen/L=Koeln/O=privat/OU=eisfair/CN ...
             : =eis/emailAddress=mailto:eis at eis.de
  Valid from : Sep  3 09:36:18 2006 GMT
  Valid until: Sep  3 09:36:18 2007 GMT

Certificate  : /usr/local/ssl/certs/mini_httpd.pem
  Valid from : 
  Valid until: 

Certificate  : /usr/local/ssl/certs/pure-ftpd.pem
  Subject    : /C=DE/ST=Nordrhein
Westfalen/L=Koeln/O=privat/OU=eisfair/CN ...
             : =eis/emailAddress=mailto:eis at eis.de
  Valid from : Sep  3 09:36:18 2006 GMT
  Valid until: Sep  3 09:36:18 2007 GMT

diese sind wohl abgelaufen und werden wohl auch nicht automatisch
aktualisiert.
soll oder kann ich die entfernen und wie am besten gleich alle??

dann kommt noch eine weiter Mail

fcron <root at eis> /var/install/config.d/mail.sh sendcertwarning

unknown option .pem
usage: x509 args
 -inform arg     - input format - default PEM (one of DER, NET or PEM)
 -outform arg    - output format - default PEM (one of DER, NET or PEM)
 -keyform arg    - private key format - default PEM
 -CAform arg     - CA format - default PEM
 -CAkeyform arg  - CA key format - default PEM
 -in arg         - input file - default stdin
 -out arg        - output file - default stdout
 -passin arg     - private key password source
 -serial         - print serial number value
 -subject_hash   - print subject hash value
 -subject_hash_old   - print old-style (MD5) subject hash value
 -issuer_hash    - print issuer hash value
 -issuer_hash_old    - print old-style (MD5) issuer hash value
 -hash           - synonym for -subject_hash
 -subject        - print subject DN
 -issuer         - print issuer DN
 -email          - print email address(es)
 -startdate      - notBefore field
 -enddate        - notAfter field
 -purpose        - print out certificate purposes
 -dates          - both Before and After dates
 -modulus        - print the RSA key modulus
 -pubkey         - output the public key
 -fingerprint    - print the certificate fingerprint
 -alias          - output certificate alias
 -noout          - no certificate output
 -ocspid         - print OCSP hash values for the subject name and
public key
 -ocsp_uri       - print OCSP Responder URL(s)
 -trustout       - output a "trusted" certificate
 -clrtrust       - clear all trusted purposes
 -clrreject      - clear all rejected purposes
 -addtrust arg   - trust certificate for a given purpose
 -addreject arg  - reject certificate for a given purpose
 -setalias arg   - set certificate alias
 -days arg       - How long till expiry of a signed certificate - def 30
days
 -checkend arg   - check whether the cert expires in the next arg
seconds
                   exit 1 if so, 0 if not
 -signkey arg    - self sign cert with arg
 -x509toreq      - output a certification request object
 -req            - input is a certificate request, sign and output.
 -CA arg         - set the CA certificate, must be PEM format.
 -CAkey arg      - set the CA key, must be PEM format
                   missing, it is assumed to be in the CA file.
 -CAcreateserial - create serial number file if it does not exist
 -CAserial arg   - serial file
 -set_serial     - serial number to use
 -text           - print the certificate in text form
 -C              - print out C code forms
 -md2/-md5/-sha1/-mdc2 - digest to use
 -extfile        - configuration file with X509V3 extensions to add
 -extensions     - section from config file with X509V3 extensions to
add
 -clrext         - delete extensions before signing and input
certificate
 -nameopt arg    - various certificate name options
 -engine e       - use engine e, possibly a hardware device.
 -certopt arg    - various certificate text options
unknown option .pem
usage: x509 args
 -inform arg     - input format - default PEM (one of DER, NET or PEM)
 -outform arg    - output format - default PEM (one of DER, NET or PEM)
 -keyform arg    - private key format - default PEM
 -CAform arg     - CA format - default PEM
 -CAkeyform arg  - CA key format - default PEM
 -in arg         - input file - default stdin
 -out arg        - output file - default stdout
 -passin arg     - private key password source
 -serial         - print serial number value
 -subject_hash   - print subject hash value
 -subject_hash_old   - print old-style (MD5) subject hash value
 -issuer_hash    - print issuer hash value
 -issuer_hash_old    - print old-style (MD5) issuer hash value
 -hash           - synonym for -subject_hash
 -subject        - print subject DN
 -issuer         - print issuer DN
 -email          - print email address(es)
 -startdate      - notBefore field
 -enddate        - notAfter field
 -purpose        - print out certificate purposes
 -dates          - both Before and After dates
 -modulus        - print the RSA key modulus
 -pubkey         - output the public key
 -fingerprint    - print the certificate fingerprint
 -alias          - output certificate alias
 -noout          - no certificate output
 -ocspid         - print OCSP hash values for the subject name and
public key
 -ocsp_uri       - print OCSP Responder URL(s)
 -trustout       - output a "trusted" certificate
 -clrtrust       - clear all trusted purposes
 -clrreject      - clear all rejected purposes
 -addtrust arg   - trust certificate for a given purpose
 -addreject arg  - reject certificate for a given purpose
 -setalias arg   - set certificate alias
 -days arg       - How long till expiry of a signed certificate - def 30
days
 -checkend arg   - check whether the cert expires in the next arg
seconds
                   exit 1 if so, 0 if not
 -signkey arg    - self sign cert with arg
 -x509toreq      - output a certification request object
 -req            - input is a certificate request, sign and output.
 -CA arg         - set the CA certificate, must be PEM format.
 -CAkey arg      - set the CA key, must be PEM format
                   missing, it is assumed to be in the CA file.
 -CAcreateserial - create serial number file if it does not exist
 -CAserial arg   - serial file
 -set_serial     - serial number to use
 -text           - print the certificate in text form
 -C              - print out C code forms
 -md2/-md5/-sha1/-mdc2 - digest to use
 -extfile        - configuration file with X509V3 extensions to add
 -extensions     - section from config file with X509V3 extensions to
add
 -clrext         - delete extensions before signing and input
certificate
 -nameopt arg    - various certificate name options
 -engine e       - use engine e, possibly a hardware device.
 -certopt arg    - various certificate text options
unknown option .pem
usage: x509 args
 -inform arg     - input format - default PEM (one of DER, NET or PEM)
 -outform arg    - output format - default PEM (one of DER, NET or PEM)
 -keyform arg    - private key format - default PEM
 -CAform arg     - CA format - default PEM
 -CAkeyform arg  - CA key format - default PEM
 -in arg         - input file - default stdin
 -out arg        - output file - default stdout
 -passin arg     - private key password source
 -serial         - print serial number value
 -subject_hash   - print subject hash value
 -subject_hash_old   - print old-style (MD5) subject hash value
 -issuer_hash    - print issuer hash value
 -issuer_hash_old    - print old-style (MD5) issuer hash value
 -hash           - synonym for -subject_hash
 -subject        - print subject DN
 -issuer         - print issuer DN
 -email          - print email address(es)
 -startdate      - notBefore field
 -enddate        - notAfter field
 -purpose        - print out certificate purposes
 -dates          - both Before and After dates
 -modulus        - print the RSA key modulus
 -pubkey         - output the public key
 -fingerprint    - print the certificate fingerprint
 -alias          - output certificate alias
 -noout          - no certificate output
 -ocspid         - print OCSP hash values for the subject name and
public key
 -ocsp_uri       - print OCSP Responder URL(s)
 -trustout       - output a "trusted" certificate
 -clrtrust       - clear all trusted purposes
 -clrreject      - clear all rejected purposes
 -addtrust arg   - trust certificate for a given purpose
 -addreject arg  - reject certificate for a given purpose
 -setalias arg   - set certificate alias
 -days arg       - How long till expiry of a signed certificate - def 30
days
 -checkend arg   - check whether the cert expires in the next arg
seconds
                   exit 1 if so, 0 if not
 -signkey arg    - self sign cert with arg
 -x509toreq      - output a certification request object
 -req            - input is a certificate request, sign and output.
 -CA arg         - set the CA certificate, must be PEM format.
 -CAkey arg      - set the CA key, must be PEM format
                   missing, it is assumed to be in the CA file.
 -CAcreateserial - create serial number file if it does not exist
 -CAserial arg   - serial file
 -set_serial     - serial number to use
 -text           - print the certificate in text form
 -C              - print out C code forms
 -md2/-md5/-sha1/-mdc2 - digest to use
 -extfile        - configuration file with X509V3 extensions to add
 -extensions     - section from config file with X509V3 extensions to
add
 -clrext         - delete extensions before signing and input
certificate
 -nameopt arg    - various certificate name options
 -engine e       - use engine e, possibly a hardware device.
 -certopt arg    - various certificate text options
unable to load certificate
3074791048:error:0906D06C:PEM routines:PEM_read_bio:no start
line:pem_lib.c:703:Expecting: TRUSTED CERTIFICATE unable to load
certificate 3074963080:error:0906D06C:PEM routines:PEM_read_bio:no start
line:pem_lib.c:703:Expecting: TRUSTED CERTIFICATE unable to load
certificate 3074528904:error:0906D06C:PEM routines:PEM_read_bio:no start
line:pem_lib.c:703:Expecting: TRUSTED CERTIFICATE

was ist damit??

wie schon gesagt es geht alles, aber diese Mails sollten möglichst
nicht mehr kommen.

vielen Dank
Gruß

Lutz



Mehr Informationen über die Mailingliste Eisfair