Jump to content

guysalias

Members
  • Posts

    5
  • Joined

  • Last visited

guysalias's Achievements

Newbie

Newbie (1/14)

1

Reputation

  1. guysalias

    Johnny Ssl

    Hello, I did not buy an SSL account. However cPanel has issued certificates. Is this a configuration snafu, or may I publish HTTPS URIs? Thank you. $ curl -ILv https://guysalias.tk/ https://xnews-icon-patchers.tk/ * Trying 64.62.211.131... * TCP_NODELAY set * Connected to guysalias.tk (64.62.211.131) port 443 (#0) * ALPN, offering h2 * ALPN, offering http/1.1 * Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH * successfully set certificate verify locations: * CAfile: \bin\ca-bundle.crt CApath: \bin\capath\ * TLSv1.2 (OUT), TLS handshake, Client hello (1): * TLSv1.2 (IN), TLS handshake, Server hello (2): * TLSv1.2 (IN), TLS handshake, Certificate (11): * TLSv1.2 (IN), TLS handshake, Server key exchange (12): * TLSv1.2 (IN), TLS handshake, Server finished (14): * TLSv1.2 (OUT), TLS handshake, Client key exchange (16): * TLSv1.2 (OUT), TLS change cipher, Client hello (1): * TLSv1.2 (OUT), TLS handshake, Finished (20): * TLSv1.2 (IN), TLS handshake, Finished (20): * SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384 * ALPN, server did not agree to a protocol * Server certificate: * subject: CN=guysalias.tk * start date: Dec 9 00:00:00 2016 GMT * expire date: Mar 9 23:59:59 2017 GMT * subjectAltName: host "guysalias.tk" matched cert's "guysalias.tk" * issuer: C=US; ST=TX; L=Houston; O=cPanel, Inc.; CN=cPanel, Inc. Certification Authority * SSL certificate verify ok. > HEAD / HTTP/1.1 > Host: guysalias.tk > User-Agent: curl > Accept: */* > < HTTP/1.1 200 OK HTTP/1.1 200 OK < Date: Mon, 12 Dec 2016 15:11:12 GMT Date: Mon, 12 Dec 2016 15:11:12 GMT < Server: Apache Server: Apache < Last-Modified: Fri, 09 Dec 2016 05:02:24 GMT Last-Modified: Fri, 09 Dec 2016 05:02:24 GMT < Accept-Ranges: bytes Accept-Ranges: bytes < Content-Length: 2394 Content-Length: 2394 < Content-Type: text/html Content-Type: text/html < * Curl_http_done: called premature == 0 * Connection #0 to host guysalias.tk left intact * Trying 64.62.211.131... * TCP_NODELAY set * Connected to xnews-icon-patchers.tk (64.62.211.131) port 443 (#1) * ALPN, offering h2 * ALPN, offering http/1.1 * Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH * successfully set certificate verify locations: * CAfile: \bin\ca-bundle.crt CApath: \bin\capath\ * TLSv1.2 (OUT), TLS handshake, Client hello (1): * TLSv1.2 (IN), TLS handshake, Server hello (2): * TLSv1.2 (IN), TLS handshake, Certificate (11): * TLSv1.2 (IN), TLS handshake, Server key exchange (12): * TLSv1.2 (IN), TLS handshake, Server finished (14): * TLSv1.2 (OUT), TLS handshake, Client key exchange (16): * TLSv1.2 (OUT), TLS change cipher, Client hello (1): * TLSv1.2 (OUT), TLS handshake, Finished (20): * TLSv1.2 (IN), TLS handshake, Finished (20): * SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384 * ALPN, server did not agree to a protocol * Server certificate: * subject: CN=xnews-icon-patchers.guysalias.tk * start date: Dec 11 00:00:00 2016 GMT * expire date: Mar 11 23:59:59 2017 GMT * subjectAltName: host "xnews-icon-patchers.tk" matched cert's "xnews-icon-patchers.tk" * issuer: C=US; ST=TX; L=Houston; O=cPanel, Inc.; CN=cPanel, Inc. Certification Authority * SSL certificate verify ok. > HEAD / HTTP/1.1 > Host: xnews-icon-patchers.tk > User-Agent: curl > Accept: */* > < HTTP/1.1 200 OK HTTP/1.1 200 OK < Date: Mon, 12 Dec 2016 15:11:13 GMT Date: Mon, 12 Dec 2016 15:11:13 GMT < Server: Apache Server: Apache < Last-Modified: Fri, 09 Dec 2016 17:37:28 GMT Last-Modified: Fri, 09 Dec 2016 17:37:28 GMT < Accept-Ranges: bytes Accept-Ranges: bytes < Content-Length: 3745 Content-Length: 3745 < Content-Type: text/html Content-Type: text/html < * Curl_http_done: called premature == 0 * Connection #1 to host xnews-icon-patchers.tk left intact $
  2. Thank you! $ dig xnews-icon-patchers.tk @NS2.HELIOHOST.ORG ;; Got answer: ;; ->>HEADER<<- opcode: QUERY, status: REFUSED, id: 17300 ;; flags: qr rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1 ;; WARNING: recursion requested but not available ;; OPT PSEUDOSECTION: ; EDNS: version: 0, flags:; udp: 4096 ;; QUESTION SECTION: ;xnews-icon-patchers.tk. IN A ;; Query time: 78 msec ;; SERVER: 64.62.211.133#53(64.62.211.133) ;; WHEN: Fri Dec 09 10:54:30 Central Standard Time 2016 ;; MSG SIZE rcvd: 51 $
  3. Hello, I have(had) an account on stevie. I created a new acount on johnny with the same credentials. I have an an Addon Domain that I would want to place on johnny but... A DNS entry for "xnews-icon-patchers.tk" already exists. You must remove this DNS entry from all servers in the DNS cluster to proceed. Can you remove that DNS entry so that I can create it anew? Thank you. Account: guysalia Domain: guysalias.tk Addon Domain: xnews-icon-patchers.tk <- please remove this DNS entry
  4. Hello, Still 'serving-up' an expired certificate. $ openssl s_client -showcerts -starttls ftp -connect ftp.guysalias.tk:21 | \ openssl x509 -dates -subject -noout -fingerprint -md5 -nameopt multiline Loading 'screen' into random state - done depth=0 C = US, ST = Unknown, L = Unknown, O = Unknown, OU = Unknown, \ CN = johnny.heliohost.org, emailAddress = ssl@johnny.heliohost.org verify error:num=18:self signed certificate verify return:1 depth=0 C = US, ST = Unknown, L = Unknown, O = Unknown, OU = Unknown, \ CN = johnny.heliohost.org, emailAddress = ssl@johnny.heliohost.org verify error:num=10:certificate has expired notAfter=May 5 16:56:13 2013 GMT verify return:1 depth=0 C = US, ST = Unknown, L = Unknown, O = Unknown, OU = Unknown, \ CN = johnny.heliohost.org, emailAddress = ssl@johnny.heliohost.org notAfter=May 5 16:56:13 2013 GMT verify return:1 220 You will be disconnected after 2 minutes of inactivity. notBefore=May 5 16:56:13 2012 GMT notAfter=May 5 16:56:13 2013 GMT subject= countryName = US stateOrProvinceName = Unknown localityName = Unknown organizationName = Unknown organizationalUnitName = Unknown commonName = johnny.heliohost.org emailAddress = ssl@johnny.heliohost.org MD5 Fingerprint=5E:06:7B:DC:86:6D:4E:3A:D2:47:E5:C0:8E:A7:BF:2F quit $ now Wed Jun 12 13:12:11 2013 $
  5. Hello, SSL certificate of FTP is expired: * Server certificate: * subject: C=US; ST=Unknown; L=Unknown; O=Unknown; OU=Unknown; CN=johnny.heliohost.org; emailAddress=ssl@johnny.heliohost.org * start date: 2012-05-05 16:56:13 GMT * expire date: 2013-05-05 16:56:13 GMT * issuer: C=US; ST=Unknown; L=Unknown; O=Unknown; OU=Unknown; CN=johnny.heliohost.org; emailAddress=ssl@johnny.heliohost.org * SSL certificate verify result: self signed certificate (18), continuing anyway.
×
×
  • Create New...