BL🅾G News


« octobre 2018
1234567
891011121314
15161718192021
22232425262728
293031

Actu G33k & Admin stuff. Powered by 🅴🆁🆁🅴🆄🆁32

Aucun commentaire

Letsencrypt c'est bien, mais savoir quand refaire les certifs de ses sites à temps c'est mieux :P
(oui letsencrypt enfin cerbot ne me met pas à jour automatiquement mes certificats... bug ?)

Donc voici un premier script pour savoir la validité du cetificat du domaine.

SSL Domaine Name Validity script BASH

- Create a file : ssl-cert-info
- Move this script in /bin of your server.

-----

nano ssl-cert-info


#!/bin/bash
 
usage()
{
cat <<EOF
Usage: $(basename $0) [options]
 
This shell script is a simple wrapper around the openssl binary. It uses
s_client to get certificate information from remote hosts, or x509 for local
certificate files. It can parse out some of the openssl output or just dump all
of it as text.
 
Options:
 
  --all-info   Print all output, including boring things like Modulus and 
               Exponent.
 
  --alt        Print Subject Alternative Names. These will be typically be 
               additional hostnames that the certificate is valid for.
 
  --cn         Print commonName from Subject. This is typically the host for 
               which the certificate was issued.
 
  --debug      Print additional info that might be helpful when debugging this
               script.
 
  --end        Print certificate expiration date. For additional functionality
               related to certificate expiration, take a look at this script:
               "http://prefetch.net/code/ssl-cert-check".
 
  --dates      Print start and end dates of when the certificate is valid.
 
  --file       Use a local certificate file for input.
 
  --help       Print this help message.
 
  --host       Fetch the certificate from this remote host.
 
  --name       Specify a specific domain name (Virtual Host) along with the
               request. This value will be used as the '-servername' in the 
               s_client command. This is for TLS SNI (Server Name Indication).
 
  --issuer     Print the certificate issuer.
 
  --most-info  Print almost everything. Skip boring things like Modulus and
               Exponent.
 
  --option     Pass any openssl option through to openssl to get its raw
               output.
 
  --port       Use this port when conneting to remote host. If ommitted, port
               defaults to 443.
 
  --subject    Print the certificate Subject -- typically address and org name.
 
Examples:
 
  1. Print a list of all hostnames that the certificate used by amazon.com 
     is valid for.
 
     $(basename $0) --host amazon.com --alt
     DNS:uedata.amazon.com
     DNS:amazon.com
     DNS:amzn.com
     DNS:www.amzn.com
     DNS:www.amazon.com
 
  2. Print issuer of certificate used by smtp.gmail.com. Fetch certficate info
     over port 465.
 
     $(basename $0) --host smtp.gmail.com --port 465 --issuer
     issuer= 
         countryName               = US
         organizationName          = Google Inc
         commonName                = Google Internet Authority G2
 
  3. Print valid dates for the certificate, using a local file as the source of 
     certificate data. Dates are formatted using the date command and display
     time in your local timezone instead of GMT.
 
     $(basename $0) --file /path/to/file.crt --dates
     valid from: 2014-02-04 16:00:00 PST
     valid till: 2017-02-04 15:59:59 PST
 
 
  4. Print certificate serial number. This script doesn't have a special option
     to parse out the serial number, so will use the generic --option flag to
     pass '-serial' through to openssl.
 
     $(basename $0) --host gmail.com --option -serial
     serial=4BF004B4DDC9C2F8
 
EOF
}
 
if ! [ -x "$(type -P openssl)" ]; then
  echo "ERROR: script requires openssl"
  echo "For Debian and friends, get it with 'apt-get install openssl'"
  exit 1
fi
 
while [ "$1" ]; do
  case "$1" in
        --file)
            shift
            crt="$1"
            source="local"
            ;;
        --host)
            shift
            host="$1"
            source="remote"
            ;;
        --port)
            shift
            port="$1"
            ;;
        --name)
            shift
            servername="-servername $1"
            ;;
        --all-info)
            opt="-text"
            ;;
        --alt)
            FormatOutput() { 
              grep -A1 "Subject Alternative Name:" | tail -n1 |
              tr -d ' ' | tr ',' '\n'
              }
            ;;
        --cn)
            opt="-subject -nameopt multiline"
            FormatOutput() { 
              awk '/commonName/ {print$NF}'
              }
            ;;
        --dates)
            opt="-dates"
            FormatOutput() { 
              dates=$(cat -)
              start=$(grep Before <<<"$dates" | cut -d= -f2-)
              end=$(grep After <<<"$dates" | cut -d= -f2-)
              echo valid from: $(date -d "$start" '+%F %T %Z')
              echo valid till: $(date -d "$end" '+%F %T %Z')
              }
            ;;
        --end)
            opt="-enddate"
            FormatOutput() { 
              read end
              end=$(cut -d= -f2- <<<"$end")
              date -d "$end" '+%F %T %Z'
              }
            ;;
        --issuer)
            opt="-issuer -nameopt multiline"
            ;;
        --most-info)
            opt="-text -certopt no_header,no_version,no_serial,no_signame,no_pubkey,no_sigdump,no_aux"
            ;;
        --option)
            shift
            opt="$1"
            ;;
        --subject)
            opt="-subject -nameopt multiline"
            ;;
        --help)
            usage
            exit 0
            ;;
        --debug)
            DEBUG="yes"
            ;;
        *)
            echo "$(basename $0): invalid option $1" >&2
            echo "see --help for usage"
            exit 1
                  ;;
  esac
  shift
done
 
CheckLocalCert()
{ 
  openssl x509 -in $crt -noout $opt
}
 
CheckRemoteCert()
{
  echo |
  openssl s_client $servername -connect $host:$port 2>/dev/null |
  openssl x509 -noout $opt
}
 
if [ -z "$(type -t FormatOutput)" ]; then
  FormatOutput() { cat; }
fi
 
if [ -z "$opt" ]; then
  opt="-text -certopt no_header,no_version,no_serial,no_signame,no_pubkey,no_sigdump,no_aux"
fi
 
if [ -z "$source" ]; then
  echo "ERROR: missing certificate source."
  echo "Provide one via '--file' or '--host' arguments."
  echo "See '--help' for examples." 
  exit 1
fi
 
if [ "$source" == "local" ]; then
  [ -n "$DEBUG" ] && echo "DEBUG: certificate source is local file"
  if [ -z "$crt" ]; then
    echo "ERROR: missing certificate file"
    exit 1
  fi
  [ -n "$DEBUG" ] && echo
  CheckLocalCert | FormatOutput
fi
 
if [ "$source" == "remote" ]; then
  [ -n "$DEBUG" ] && echo "DEBUG: certificate source is remote host"
  if [ -z "$host" ]; then
    echo "ERROR: missing remote host value."
    echo "Provide one via '--host' argument"
    exit 1
  fi
  if [ -z "$port" ]; then
    [ -n "$DEBUG" ] && echo "DEBUG: defaulting to 443 for port."
    port="443"
  fi
  [ -n "$DEBUG" ] && echo
  CheckRemoteCert | FormatOutput
fi
[/quote]

[b]And try this command : [/b]

[quote]$ ssl-cert-info --host gmail.com --dates[/quote]

[size=16]How to use this script[/size]

 - Command :

[quote]  ./ssl-cert-info --host gmail.com --dates[/quote]

Or

[quote]  ./ssl-cert-info --host gmail.com --end[/quote]

[size=16]Bash Function [/size] 
 
you can put this in the[b] .bashrc[/b]

# how to used :  ./ssl-check-date32.sh YOURHOSTNAME

 
[quote]
ssl-checks(){
   d=$1
./ssl-check-date2.sh  --host  $d  --end
}

Auto renew

put in Crontab


crontab -e
@monthly  /etc/init.d/apache2 stop && ./certbot-auto renew   --force-renew &&  /etc/init.d/apache2 start

REF: http://giantdorks.org/alain/shell-script-to-check-ssl-certificate-info-like-expiration-date-and-subject/

on
🅴🅲🅷🔵🆂🆈🆂🆃🅴🅼



Aucun commentaire

letsencrypt devient certbot

alt

Site officiel : https://certbot.eff.org/

Simplement mettre à jour les paquets letsencrypt et python-letsencrypt depuis les dépôt backports de Debian.


$  apt -t jessie-backports install python-certbot certbot  python-psutil 

La commande letsencrypt sera toujours disponible mais pointera sur certbot.

source : https://blog.karolak.fr



Aucun commentaire

How to Simply renewal SSL certificate with letsencrypt

Install letsencrypt first :p


$  cd /opt
$  git clone https://github.com/certbot/certbot.git 



Before anything need to stop Apache2 service and let's make the magic...


$  /etc/init.d/apache2 stop
$ ./certbot-auto renew

-------------------------------------------------------------------------------
Processing /etc/letsencrypt/renewal/public.echosystem.fr.conf
-------------------------------------------------------------------------------
Cert is due for renewal, auto-renewing...
Starting new HTTPS connection (1): acme-staging.api.letsencrypt.org
Renewing an existing certificate
Performing the following challenges:
tls-sni-01 challenge for public.echosystem.fr
Waiting for verification...
Cleaning up challenges
Generating key (2048 bits): /etc/letsencrypt/keys/0156_key-certbot.pem
Creating CSR: /etc/letsencrypt/csr/0156_csr-certbot.pem

The following certs were successfully renewed:
  /etc/letsencrypt/live/rss.echosystem.fr/fullchain.pem (success)
  /etc/letsencrypt/live/wiki.echosystem.fr/fullchain.pem (success)
  /etc/letsencrypt/live/gitlab.echosystem.fr/fullchain.pem (success)
  /etc/letsencrypt/live/error.echosystem.fr/fullchain.pem (success)
  /etc/letsencrypt/live/tools.echosystem.fr/fullchain.pem (success)
  /etc/letsencrypt/live/pastebin.echosystem.fr/fullchain.pem (success)
  /etc/letsencrypt/live/contact.echosystem.fr/fullchain.pem (success)
  /etc/letsencrypt/live/netdata.echosystem.fr/fullchain.pem (success)
  /etc/letsencrypt/live/irc-log.echosystem.fr/fullchain.pem (success)
  /etc/letsencrypt/live/links.echosystem.fr/fullchain.pem (success)
  /etc/letsencrypt/live/gk.echosystem.fr/fullchain.pem (success)
  /etc/letsencrypt/live/fm.echosystem.fr/fullchain.pem (success)
  /etc/letsencrypt/live/blog.echosystem.fr/fullchain.pem (success)
  /etc/letsencrypt/live/snippet.echosystem.fr/fullchain.pem (success)
  /etc/letsencrypt/live/social.echosystem.fr/fullchain.pem (success)
  /etc/letsencrypt/live/echosystem.fr/fullchain.pem (success)
  /etc/letsencrypt/live/public.echosystem.fr/fullchain.pem (success)



and renable Apache
#  /etc/init.d/apache2 start



Then put in a crontab and you can forget this task  ;)

by 🅴🆁🆁🅴🆄🆁32
Hosted on
🅴🅲🅷🅾🆂🆈🆂🆃🅴🅼




Rendered in 0.012681 seconds