Jump to content

guysalias

Members
  • Posts

    5
  • Joined

  • Last visited

Posts posted by guysalias

  1. Hello,

    I did not buy an SSL account. However cPanel has issued certificates.
    Is this a configuration snafu, or may I publish HTTPS URIs?

    Thank you.

    $ curl -ILv https://guysalias.tk/ https://xnews-icon-patchers.tk/
    *   Trying 64.62.211.131...
    * TCP_NODELAY set
    * Connected to guysalias.tk (64.62.211.131) port 443 (#0)
    * ALPN, offering h2
    * ALPN, offering http/1.1
    * Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH
    * successfully set certificate verify locations:
    *   CAfile: \bin\ca-bundle.crt
      CApath: \bin\capath\
    * TLSv1.2 (OUT), TLS handshake, Client hello (1):
    * TLSv1.2 (IN), TLS handshake, Server hello (2):
    * TLSv1.2 (IN), TLS handshake, Certificate (11):
    * TLSv1.2 (IN), TLS handshake, Server key exchange (12):
    * TLSv1.2 (IN), TLS handshake, Server finished (14):
    * TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
    * TLSv1.2 (OUT), TLS change cipher, Client hello (1):
    * TLSv1.2 (OUT), TLS handshake, Finished (20):
    * TLSv1.2 (IN), TLS handshake, Finished (20):
    * SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384
    * ALPN, server did not agree to a protocol
    * Server certificate:
    *  subject: CN=guysalias.tk
    *  start date: Dec  9 00:00:00 2016 GMT
    *  expire date: Mar  9 23:59:59 2017 GMT
    *  subjectAltName: host "guysalias.tk" matched cert's "guysalias.tk"
    *  issuer: C=US; ST=TX; L=Houston; O=cPanel, Inc.; CN=cPanel, Inc. Certification Authority
    *  SSL certificate verify ok.
    > HEAD / HTTP/1.1
    > Host: guysalias.tk
    > User-Agent: curl
    > Accept: */*
    >
    < HTTP/1.1 200 OK
    HTTP/1.1 200 OK
    < Date: Mon, 12 Dec 2016 15:11:12 GMT
    Date: Mon, 12 Dec 2016 15:11:12 GMT
    < Server: Apache
    Server: Apache
    < Last-Modified: Fri, 09 Dec 2016 05:02:24 GMT
    Last-Modified: Fri, 09 Dec 2016 05:02:24 GMT
    < Accept-Ranges: bytes
    Accept-Ranges: bytes
    < Content-Length: 2394
    Content-Length: 2394
    < Content-Type: text/html
    Content-Type: text/html
    
    <
    * Curl_http_done: called premature == 0
    * Connection #0 to host guysalias.tk left intact
    *   Trying 64.62.211.131...
    * TCP_NODELAY set
    * Connected to xnews-icon-patchers.tk (64.62.211.131) port 443 (#1)
    * ALPN, offering h2
    * ALPN, offering http/1.1
    * Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH
    * successfully set certificate verify locations:
    *   CAfile: \bin\ca-bundle.crt
      CApath: \bin\capath\
    * TLSv1.2 (OUT), TLS handshake, Client hello (1):
    * TLSv1.2 (IN), TLS handshake, Server hello (2):
    * TLSv1.2 (IN), TLS handshake, Certificate (11):
    * TLSv1.2 (IN), TLS handshake, Server key exchange (12):
    * TLSv1.2 (IN), TLS handshake, Server finished (14):
    * TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
    * TLSv1.2 (OUT), TLS change cipher, Client hello (1):
    * TLSv1.2 (OUT), TLS handshake, Finished (20):
    * TLSv1.2 (IN), TLS handshake, Finished (20):
    * SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384
    * ALPN, server did not agree to a protocol
    * Server certificate:
    *  subject: CN=xnews-icon-patchers.guysalias.tk
    *  start date: Dec 11 00:00:00 2016 GMT
    *  expire date: Mar 11 23:59:59 2017 GMT
    *  subjectAltName: host "xnews-icon-patchers.tk" matched cert's "xnews-icon-patchers.tk"
    *  issuer: C=US; ST=TX; L=Houston; O=cPanel, Inc.; CN=cPanel, Inc. Certification Authority
    *  SSL certificate verify ok.
    > HEAD / HTTP/1.1
    > Host: xnews-icon-patchers.tk
    > User-Agent: curl
    > Accept: */*
    >
    < HTTP/1.1 200 OK
    HTTP/1.1 200 OK
    < Date: Mon, 12 Dec 2016 15:11:13 GMT
    Date: Mon, 12 Dec 2016 15:11:13 GMT
    < Server: Apache
    Server: Apache
    < Last-Modified: Fri, 09 Dec 2016 17:37:28 GMT
    Last-Modified: Fri, 09 Dec 2016 17:37:28 GMT
    < Accept-Ranges: bytes
    Accept-Ranges: bytes
    < Content-Length: 3745
    Content-Length: 3745
    < Content-Type: text/html
    Content-Type: text/html
    
    <
    * Curl_http_done: called premature == 0
    * Connection #1 to host xnews-icon-patchers.tk left intact
    
    $
  2. Thank you!

     

    $ dig xnews-icon-patchers.tk @NS2.HELIOHOST.ORG
    ;; Got answer:
    ;; ->>HEADER<<- opcode: QUERY, status: REFUSED, id: 17300
    ;; flags: qr rd; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1
    ;; WARNING: recursion requested but not available

    ;; OPT PSEUDOSECTION:
    ; EDNS: version: 0, flags:; udp: 4096
    ;; QUESTION SECTION:
    ;xnews-icon-patchers.tk. IN A

    ;; Query time: 78 msec
    ;; SERVER: 64.62.211.133#53(64.62.211.133)
    ;; WHEN: Fri Dec 09 10:54:30 Central Standard Time 2016
    ;; MSG SIZE rcvd: 51


    $

  3. Hello,

    I have(had) an account on stevie. I created a new acount on
    johnny with the same credentials. I have an an Addon Domain
    that I would want to place on johnny but...

    A DNS entry for "xnews-icon-patchers.tk"
    already exists. You must remove this DNS entry
    from all servers in the DNS cluster to proceed.

    Can you remove that DNS entry so that I can create it anew?

    Thank you.

    Account: guysalia
    Domain: guysalias.tk
    Addon Domain: xnews-icon-patchers.tk <- please remove this DNS entry

     

  4. All self-signed SSL certificates on Johnny have been recreated and won't expire until Jun 8th 2014.

     

    Hello,

     

    Still 'serving-up' an expired certificate.

     

    
    $ openssl s_client -showcerts -starttls ftp -connect ftp.guysalias.tk:21  | \
      openssl x509  -dates -subject -noout -fingerprint -md5 -nameopt multiline
    Loading 'screen' into random state - done
    depth=0 C = US, ST = Unknown, L = Unknown, O = Unknown, OU = Unknown, \
      CN = johnny.heliohost.org, emailAddress = ssl@johnny.heliohost.org
    verify error:num=18:self signed certificate
    verify return:1
    depth=0 C = US, ST = Unknown, L = Unknown, O = Unknown, OU = Unknown, \
      CN = johnny.heliohost.org, emailAddress = ssl@johnny.heliohost.org
    verify error:num=10:certificate has expired
    notAfter=May  5 16:56:13 2013 GMT
    verify return:1
    depth=0 C = US, ST = Unknown, L = Unknown, O = Unknown, OU = Unknown, \
      CN = johnny.heliohost.org, emailAddress = ssl@johnny.heliohost.org
    notAfter=May  5 16:56:13 2013 GMT
    verify return:1
    220 You will be disconnected after 2 minutes of inactivity.
    notBefore=May  5 16:56:13 2012 GMT
    notAfter=May  5 16:56:13 2013 GMT
    subject=
       countryName			   = US
       stateOrProvinceName	   = Unknown
       localityName			  = Unknown
       organizationName		  = Unknown
       organizationalUnitName    = Unknown
       commonName			    = johnny.heliohost.org
       emailAddress			  = ssl@johnny.heliohost.org
    MD5 Fingerprint=5E:06:7B:DC:86:6D:4E:3A:D2:47:E5:C0:8E:A7:BF:2F
    quit
    $ now
    
    Wed Jun 12 13:12:11 2013
    
    $
    
    

  5. Hello,

     

    SSL certificate of FTP is expired:

     

    * Server certificate:
    * subject: C=US; ST=Unknown; L=Unknown; O=Unknown;
     OU=Unknown; CN=johnny.heliohost.org;
     emailAddress=ssl@johnny.heliohost.org
    * start date: 2012-05-05 16:56:13 GMT
    * expire date: 2013-05-05 16:56:13 GMT
    * issuer: C=US; ST=Unknown; L=Unknown; O=Unknown;
     OU=Unknown; CN=johnny.heliohost.org;
     emailAddress=ssl@johnny.heliohost.org
    * SSL certificate verify result: self signed certificate (18), continuing anyway.
    

×
×
  • Create New...