Security/Certificate: Difference between revisions
Jump to navigation
Jump to search
| Line 259: | Line 259: | ||
* [https://ssl-config.mozilla.org/ Security » Certificate » TLS » Configuration Generator] | * [https://ssl-config.mozilla.org/ Security » Certificate » TLS » Configuration Generator] | ||
* [[SSH/Public Key Authentication|Security » SSH » Public Key Authentication]] | * [[SSH/Public Key Authentication|Security » SSH » Public Key Authentication]] | ||
* [[Security/Container/Snyk|Security » Container » Snyk]] | |||
* [[Security/Container/Trivy|Security » Container » Trivy]] | |||
* [[Security/Certificate/TLS|Security » Certificate » TLS]] | * [[Security/Certificate/TLS|Security » Certificate » TLS]] | ||
Revision as of 06:38, 3 June 2025
Certificate » Password
makepasswd --chars 16 --count 10 --crypt-md5
:'
wTwezXF4sNLoWBsI $1$OCSDx0zn$U9WW0udI8pYfIrCCuz2Md1
pfHyhrtvHC4p3oW5 $1$6b/SQRXF$UwLDhHZMyWfsw/S0g6GgZ1
WLNv9CD8XcR3poHp $1$oVsmVh6Q$Vq4amLARt2iMezos.pT1N.
cCJvJU8rFeHbu4Ix $1$qlaCpIFj$jWqjkdALO535Ww58k3KE2/
7WeBH8nwMXR78Gdd $1$afyCWr0p$6bMRrvCnrBeo/BdVJi70E1
IxGjQAogqv3e18rj $1$60UWcAxR$bFfRlXHzVvZkjTripK9v..
JXveCv0LjsAix5cp $1$FANZ3WNf$hq2BPd1SXdL.2yvKf0/.7/
eoFqedaFpKKDqVCw $1$4TCNgJCv$v1z4Y8IR5a4Nan5VkAAe8/
9npSy42dxUH2w15y $1$APixN7OV$XIe.K3qPi/aezzWyhf7F./
SuwCWQ39RNKUcKAM $1$qnnfDUE1$ucuWcIpNBuCvCBjCiHaoG/
'
Certificate » RootCA
ROOTCA_CNF="$(mktemp -u)"
cat <<'CNF'|tee ${ROOTCA_CNF} >/dev/null
[ req ]
prompt = no
distinguished_name = dn
[ dn ]
C = MY
ST = WP Kuala Lumpur
L = Kuala Lumpur
O = Chorke, Inc.
OU = Chorke
CN = chorke.org
emailAddress = info@chorke.org
CNF
echo -n 'Password: ';read -s ROOTCA_PASS_PHRASE;export ROOTCA_PASS_PHRASE;echo
# Password: wTwezXF4sNLoWBsI
Certificate » RootCA » RSA
openssl genpkey -algorithm RSA -out rootCA.key -aes256 -pass file:<(echo "${ROOTCA_PASS_PHRASE}")
openssl req -x509 -new -nodes -key rootCA.key -sha256 -days 1024 -out rootCA.pem -config ${ROOTCA_CNF} -passin file:<(echo "${ROOTCA_PASS_PHRASE}")
Certificate » RootCA » EC » 256
openssl genpkey -algorithm EC -out rootCA.key -pkeyopt ec_paramgen_curve:P-256 -pass file:<(echo "${ROOTCA_PASS_PHRASE}")
openssl req -x509 -new -nodes -key rootCA.key -sha256 -days 1024 -out rootCA.pem -config ${ROOTCA_CNF} -passin file:<(echo "${ROOTCA_PASS_PHRASE}")
Certificate » RootCA » EC » 384
openssl genpkey -algorithm EC -out rootCA.key -pkeyopt ec_paramgen_curve:P-384 -pass file:<(echo "${ROOTCA_PASS_PHRASE}")
openssl req -x509 -new -nodes -key rootCA.key -sha384 -days 1024 -out rootCA.pem -config ${ROOTCA_CNF} -passin file:<(echo "${ROOTCA_PASS_PHRASE}")
Certificate » RootCA » SubCA
SUBCA_CNF="$(mktemp -u)"
cat <<'CNF'|tee ${SUBCA_CNF} >/dev/null
[ req ]
prompt = no
distinguished_name = dn
attributes = req_attrs
[ dn ]
C = MY
ST = WP Kuala Lumpur
L = Kuala Lumpur
O = Chorke, Inc.
OU = Academia
CN = chorke.org
emailAddress = info@chorke.org
[ req_attrs ]
challengePassword = changeit
unstructuredName = Chorke Academia, Inc.
CNF
SUBCA_EXT="$(mktemp -u)"
cat <<'EXT'|tee ${SUBCA_EXT} >/dev/null
basicConstraints=critical,CA:TRUE,pathlen:0
keyUsage=critical,keyCertSign,cRLSign
subjectKeyIdentifier=hash
authorityKeyIdentifier=keyid,issuer
EXT
echo -n 'Password: ';read -s SUBCA_PASS_PHRASE;export SUBCA_PASS_PHRASE;echo
# Password: pfHyhrtvHC4p3oW5
Certificate » RootCA » SubCA » RSA
openssl genpkey -algorithm RSA -out subCA.key -aes256 -pass file:<(echo "${SUBCA_PASS_PHRASE}")
openssl req -new -key subCA.key -out subCA.csr -config ${SUBCA_CNF} -passin file:<(echo "$SUBCA_PASS_PHRASE")
openssl x509 -req -in subCA.csr -CA rootCA.pem -CAkey rootCA.key -CAcreateserial -out subCA.pem -days 1024 -sha256 -passin file:<(echo "${ROOTCA_PASS_PHRASE}")
Certificate » RootCA » SubCA » EC » 256
openssl genpkey -algorithm EC -out subCA.key -pkeyopt ec_paramgen_curve:P-256 -pass file:<(echo "${SUBCA_PASS_PHRASE}")
openssl req -new -key subCA.key -out subCA.csr -config ${SUBCA_CNF} -passin file:<(echo "$SUBCA_PASS_PHRASE")
openssl x509 -req -in subCA.csr -CA rootCA.pem -CAkey rootCA.key -CAcreateserial -out subCA.pem -days 1024 -sha256 -extfile ${SUBCA_EXT} -passin file:<(echo "${ROOTCA_PASS_PHRASE}")
Certificate » RootCA » SubCA » EC » 384
openssl genpkey -algorithm EC -out subCA.key -pkeyopt ec_paramgen_curve:P-384 -pass file:<(echo "${SUBCA_PASS_PHRASE}")
openssl req -new -key subCA.key -out subCA.csr -config ${SUBCA_CNF} -passin file:<(echo "$SUBCA_PASS_PHRASE")
openssl x509 -req -in subCA.csr -CA rootCA.pem -CAkey rootCA.key -CAcreateserial -out subCA.pem -days 1024 -sha384 -extfile ${SUBCA_EXT} -passin file:<(echo "${ROOTCA_PASS_PHRASE}")
Certificate » RootCA » SubCA » Server
SERVER_CNF="$(mktemp -u)"
cat <<'CNF'|tee ${SERVER_CNF} >/dev/null
[ req ]
prompt = no
distinguished_name = dn
req_extensions = req_ext
attributes = req_attrs
[ dn ]
C = MY
ST = WP Kuala Lumpur
L = Kuala Lumpur
O = Chorke, Inc.
OU = Academia
CN = chorke.org
emailAddress = info@chorke.org
[ req_ext ]
subjectAltName = @alt_names
[ req_attrs ]
challengePassword = changeit
unstructuredName = Chorke Academia, Inc.
[ alt_names ]
DNS.1 = chorke.org
DNS.2 = www.chorke.org
IP.1 = 10.19.83.10
IP.2 = 10.19.83.100
CNF
echo -n 'Password: ';read -s SUBCA_PASS_PHRASE;export SUBCA_PASS_PHRASE;echo
# Password: pfHyhrtvHC4p3oW5
Certificate » RootCA » SubCA » Server » RSA
openssl genpkey -algorithm RSA -out server.key
openssl req -new -key server.key -out server.csr -config ${SERVER_CNF}
openssl x509 -req -in server.csr -CA subCA.pem -CAkey subCA.key -CAcreateserial -out server.crt -days 1024 -sha256 -passin file:<(echo "${SUBCA_PASS_PHRASE}")
Certificate » RootCA » SubCA » Server » EC » 256
openssl ecparam -name prime256v1 -genkey -noout -out server.key
openssl req -new -key server.key -out server.csr -config ${SERVER_CNF}
openssl x509 -req -in server.csr -CA subCA.pem -CAkey subCA.key -CAcreateserial -out server.crt -days 1024 -sha256 -passin file:<(echo "${SUBCA_PASS_PHRASE}")
Certificate » RootCA » SubCA » Server » EC » 384
openssl ecparam -name secp384r1 -genkey -noout -out server.key
openssl req -new -key server.key -out server.csr -config ${SERVER_CNF}
openssl x509 -req -in server.csr -CA subCA.pem -CAkey subCA.key -CAcreateserial -out server.crt -days 1024 -sha384 -passin file:<(echo "${SUBCA_PASS_PHRASE}")
Playground
ls -alh *.{crt,csr,key,pem,srl}
rm -rf *.{crt,csr,key,pem,srl}
|
rm -rf ${SUBCA_CNF}
rm -rf ${SERVER_CNF}
|
|
|
| ||
nmap vpn.shahed.biz --reason -Pn --top 20
nmap vpn.shahed.biz --reason -Pn -p25,465,587,993
|
sudo tail -n100 -f /var/log/auth.log
sudo tail -n100 -f /var/log/kern.log
|
sudo cat /etc/shadow|grep nobody
last
|
|
| ||
sudo apt-get install makepasswd
echo 'sadaqah!'|makepasswd --crypt-md5 --clearfrom=-
|
makepasswd --chars 12 --count 5 --crypt-md5
makepasswd --chars 12 --count 5 --crypt
|
makepasswd --chars 12 --count 5
makepasswd --chars 12
|
References
|
| ||