HomeServer14
の編集
index.php?HomeServer14
[
トップ
] [
編集
|
差分
|
履歴
|
添付
|
リロード
] [
新規
|
一覧
|
検索
|
最終更新
|
ヘルプ
]
-- 雛形とするページ --
(no template pages)
#contents *** md0 ドライブの一つが動いていなかった @2017-6-11 [#qab53402] - Ubuntu の ディスクメニューで md0 が赤色表示 → md0 が Degrade 状態となっていた。 動作確認 -- Superblock の persistency は確保されているが、1台のドライブ(/dev/sda)が切り離されていた munakata@mythen:~ (master #)$ sudo mdadm -D /dev/md0 /dev/md0: Version : 1.2 Creation Time : Sun Dec 11 23:04:19 2011 Raid Level : raid1 Array Size : 3906885632 (3725.90 GiB 4000.65 GB) Used Dev Size : 3906885632 (3725.90 GiB 4000.65 GB) Raid Devices : 2 Total Devices : 1 Persistence : Superblock Update Time : Sat Jun 10 18:28:18 2017 State : clean, degraded Active Devices : 1 Working Devices : 1 Failed Devices : 0 Spare Devices : 0 Name : mythen:0 UUID : 4cd693e9:dd3ad1a9:3a5a23a9:62ce3a05 Events : 280089 Number Major Minor RaidDevice State 0 0 0 0 removed 2 8 17 1 active sync /dev/sdb1 - /dev/sda にエラーが発生しているかを smartctrl の簡易テストで確認 munakata@mythen:~ (master #)$ sudo smartctl -t short /dev/sda smartctl 6.2 2013-07-26 r3841 [x86_64-linux-3.13.0-48-generic] (local build) Copyright (C) 2002-13, Bruce Allen, Christian Franke, www.smartmontools.org Testing has begun. Please wait 2 minutes for test to complete. Test will complete after Sat Jun 10 18:27:37 2017 Use smartctl -X to abort test. - テストの結果 /dev/sda 自体に障害が発生していないことを確認(completed without error) munakata@mythen:~ (master #)$ sudo smartctl -l selftest /dev/sda smartctl 6.2 2013-07-26 r3841 [x86_64-linux-3.13.0-48-generic] (local build) Copyright (C) 2002-13, Bruce Allen, Christian Franke, www.smartmontools.org === START OF READ SMART DATA SECTION === SMART Self-test log structure revision number 1 Num Test_Description Status Remaining LifeTime(hours) LBA_of_first_error # 1 Short offline Completed without error 00% 22649 - - md0 に /dev/sda を再アッタチ → 自動的に rebuild がスタートする(rebuild には数時間がかかる) munakata@mythen:~ (master #)$ sudo mdadm /dev/md0 --add /dev/sda1 mdadm: added /dev/sda1 - rebuild 中(4時間程度経過時点) munakata@mythen:~ (master #)$ sudo mdadm -D /dev/md0 /dev/md0: Version : 1.2munakata@mythen:~ (master #)$ sudo mdadm /dev/md0 --add /dev/sda1 mdadm: added /dev/sda1 Creation Time : Sun Dec 11 23:04:19 2011 Raid Level : raid1 Array Size : 3906885632 (3725.90 GiB 4000.65 GB) Used Dev Size : 3906885632 (3725.90 GiB 4000.65 GB) Raid Devices : 2 Total Devices : 2 Persistence : Superblock is persistent Update Time : Sat Jun 10 19:49:34 2017 State : clean, degraded, recovering Active Devices : 1 Working Devices : 2 Failed Devices : 0 Spare Devices : 1 Rebuild Status : 14% complete Name : mythen:0 UUID : 4cd693e9:dd3ad1a9:3a5a23a9:62ce3a05 Events : 282261 Number Major Minor RaidDevice State 3 8 1 0 spare rebuilding /dev/sda1 2 8 17 1 active sync /dev/sdb1 - rebuild 完了時点 munakata@mythen:~ (master #)$ sudo mdadm -D /dev/md0 /dev/md0: Version : 1.2 Creation Time : Sun Dec 11 23:04:19 2011 Raid Level : raid1 Array Size : 3906885632 (3725.90 GiB 4000.65 GB) Used Dev Size : 3906885632 (3725.90 GiB 4000.65 GB) Raid Devices : 2 Total Devices : 2 Persistence : Superblock is persistent Update Time : Sun Jun 11 07:40:39 2017 State : clean Active Devices : 2 Working Devices : 2 Failed Devices : 0 Spare Devices : 0 Name : mythen:0 UUID : 4cd693e9:dd3ad1a9:3a5a23a9:62ce3a05 Events : 296999 Number Major Minor RaidDevice State 3 8 1 0 active sync /dev/sda1 2 8 17 1 active sync /dev/sdb1 munakata@mythen:~ (master #)$ cat /proc/mdstat Personalities : [linear] [multipath] [raid0] [raid1] [raid6] [raid5] [raid4] [raid10] md0 : active raid1 sda1[3] sdb1[2] 3906885632 blocks super 1.2 [2/2] [UU] *** dtv_recipe が動作不安定 @2017-6-11 [#a0649bd9] - HDD 録画したファイルの中で特定のファイルがリードエラー(再生中に停止)する状況になった - SMART のログを確認 -- 重要なのは &color(red){Current_Pending_Sector = 4}; となっている点、正常な状態ではない munakata@mythen:~ (master #)$ sudo smartctl -a /dev/sdf smartctl 6.2 2013-07-26 r3841 [x86_64-linux-3.13.0-48-generic] (local build) Copyright (C) 2002-13, Bruce Allen, Christian Franke, www.smartmontools.org === START OF INFORMATION SECTION === Device Model: WDC WD40EZRZ-00WN9B0 Serial Number: WD-WCC4E3JH7YV9 LU WWN Device Id: 5 0014ee 261da88a0 Firmware Version: 80.00A80 User Capacity: 4,000,787,030,016 bytes [4.00 TB] Sector Sizes: 512 bytes logical, 4096 bytes physical Rotation Rate: 5400 rpm Device is: Not in smartctl database [for details use: -P showall] ATA Version is: ACS-2 (minor revision not indicated) SATA Version is: SATA 3.0, 6.0 Gb/s (current: 6.0 Gb/s) Local Time is: Sun Jun 11 08:07:16 2017 JST SMART support is: Available - device has SMART capability. SMART support is: Enabled === START OF READ SMART DATA SECTION === SMART overall-health self-assessment test result: PASSED General SMART Values: Offline data collection status: (0x82) Offline data collection activity was completed without error. Auto Offline Data Collection: Enabled. Self-test execution status: ( 121) The previous self-test completed having the read element of the test failed. Total time to complete Offline data collection: (53760) seconds. Offline data collection capabilities: (0x7b) SMART execute Offline immediate. Auto Offline data collection on/off support. Suspend Offline collection upon new command. Offline surface scan supported. Self-test supported. Conveyance Self-test supported. Selective Self-test supported. SMART capabilities: (0x0003) Saves SMART data before entering power-saving mode. Supports SMART auto save timer. Error logging capability: (0x01) Error logging supported. General Purpose Logging supported. Short self-test routine recommended polling time: ( 2) minutes. Extended self-test routine recommended polling time: ( 537) minutes. Conveyance self-test routine recommended polling time: ( 5) minutes. SCT capabilities: (0x7035) SCT Status supported. SCT Feature Control supported. SCT Data Table supported. SMART Attributes Data Structure revision number: 16 Vendor Specific SMART Attributes with Thresholds: ID# ATTRIBUTE_NAME FLAG VALUE WORST THRESH TYPE UPDATED WHEN_FAILED RAW_VALUE 1 Raw_Read_Error_Rate 0x002f 200 200 051 Pre-fail Always - 912 3 Spin_Up_Time 0x0027 185 179 021 Pre-fail Always - 7741 4 Start_Stop_Count 0x0032 100 100 000 Old_age Always - 16 5 Reallocated_Sector_Ct 0x0033 200 200 140 Pre-fail Always - 0 7 Seek_Error_Rate 0x002e 200 200 000 Old_age Always - 0 9 Power_On_Hours 0x0032 081 081 000 Old_age Always - 14096 10 Spin_Retry_Count 0x0032 100 253 000 Old_age Always - 0 11 Calibration_Retry_Count 0x0032 100 253 000 Old_age Always - 0 12 Power_Cycle_Count 0x0032 100 100 000 Old_age Always - 10 192 Power-Off_Retract_Count 0x0032 200 200 000 Old_age Always - 2 193 Load_Cycle_Count 0x0032 025 025 000 Old_age Always - 527334 194 Temperature_Celsius 0x0022 110 104 000 Old_age Always - 42 196 Reallocated_Event_Count 0x0032 200 200 000 Old_age Always - 0 197 Current_Pending_Sector 0x0032 200 200 000 Old_age Always - 4 <------- ここ 198 Offline_Uncorrectable 0x0030 200 200 000 Old_age Offline - 3 199 UDMA_CRC_Error_Count 0x0032 200 200 000 Old_age Always - 0 200 Multi_Zone_Error_Rate 0x0008 200 200 000 Old_age Offline - 208 SMART Error Log Version: 1 No Errors Logged -- dtv_recipe (/dev/sdf) をテストする munakata@mythen:~ (master #)$ sudo smartctl -t short /dev/sdf smartctl 6.2 2013-07-26 r3841 [x86_64-linux-3.13.0-48-generic] (local build) Copyright (C) 2002-13, Bruce Allen, Christian Franke, www.smartmontools.org === START OF OFFLINE IMMEDIATE AND SELF-TEST SECTION === Sending command: "Execute SMART Short self-test routine immediately in off-line mode". Drive command "Execute SMART Short self-test routine immediately in off-line mode" successful. Testing has begun. Please wait 2 minutes for test to complete. Test will complete after Sun Jun 11 08:06:42 2017 Use smartctl -X to abort test. - テスト結果を見る -- 上から最新のテスト結果 -- read_failure で終了していて、エラーが出た LBA の先頭の番地が記録されている SMART Self-test log structure revision number 1 Num Test_Description Status Remaining LifeTime(hours) LBA_of_first_error # 1 Short offline Completed: read failure 90% 14096 140218489 # 2 Extended offline Completed: read failure 90% 14082 140218489munakata@mythen:~ (master #)$ sudo # 3 Conveyance offline Completed: read failure 90% 14082 140218488 # 4 Short offline Completed: read failure 90% 14082 140218488 - 今回はディスクを交換することにした。 - 暫定的に不良ブロックを使わない [[設定の紹介:http://nyacom.net/?p=78]] もあった(が、不良ブロックが1つとは限らないだろう) *** One Time Password (OTP) を利用してサーバーを外部公開 [#i0937aa3] - Apache への OTP 認証の追加 <Directory /raid_vol/www/pukiwiki> Options +Indexes +FollowSymLinks +MultiViews AllowOverride None # ローカルネットからはパスワードなしでアクセスを許可 Satisfy any Order allow,deny Allow from 127.0.0.1 Allow from 192.168.1 # それ以外からのアクセスにはワンタイムパスワードを要求 AuthType Basic AuthName "OTP Authentication (Enter OTP as password)" AuthBasicProvider OTP Require valid-user OTPAuthUsersFile /raid_vol/www/otp/users OTPAuthMaxLinger 3600 OTPAuthLogoutOnIPChange On #AuthType Basic #AuthName "KGB 奈々子" ## nanamochahiko #AuthUserFile "/raid_vol/home/munakata/.htpasswd" #Require user munakata </Directory> - ユーザー登録用スクリプト ( munakata のホームディレクトリーに配置) ---- &ref(otp_user_entry.sh); #!/bin/bash -e user=${1:?Usage: $0 username} issuer=${2:-KGB} secret=$(cat /dev/urandom | tr -dc 'a-z0-9' | fold -w 15 | head -n 1) secret_base16=$(python -c "import base64; print base64.b16encode('${secret}')") secret_base32=$(python -c "import base64; print base64.b32encode('${secret}')") otpauth_uri="otpauth://totp/${issuer}:${user}?secret=${secret_base32}&issuer=${issuer}" otpauth_uri=$(python -c "import urllib; print urllib.quote('${otpauth_uri}')") qrcode_url="https://chart.googleapis.com/chart?chs=300x300&cht=qr&chl=${otpauth_uri}" file="/raid_vol/www/otp/users" if [ ! -f "${file}" ]; then [ -d $(dirname "$file") ] || mkdir -p $(dirname "$file") touch ${file} chown -R www-data:www-data $(dirname "$file") fi [ -w "${file}" ] || (echo "${file}: Permission denied" && exit 1) count=$(awk "\$2 ~ /^$user}\$/" ${file} | wc -l) if [ $count -le 0 ]; then echo "HOTP/T30 $(printf '%-12s' $user) - ${secret_base16}" >> ${file} echo "$qrcode_url" else echo "User '$user' already exists" fi -- [[munakata 用の QR コード:https://chart.googleapis.com/chart?chs=300x300&cht=qr&chl=otpauth%3A//totp/KGB%3Amunakata%3Fsecret%3DOQ2HQ5DIPFXG65TPPJ3W243Z%26issuer%3DKGB]] -- &ref(muna_otp.jpg); - 参考 URL -- [[Apacheへのアクセスに二要素認証を適用する:http://qiita.com/kz-takahashi/items/af8ea7d9894f26a65068]] *** kgb.hmuna.com の証明書検証 [#zfcf4aae] - サーバー証明書関連のエラー(ブラウザーで証明書が失効と言われる、 Kaspersky で中間証明書の一つに問題があると言われる 等)があり、証明書の状況を再確認した。 - 現在の証明書の場所は /etc/ssl/official2munakata@mythen:/etc/ssl/official2 (master *) $ ls -l 合計 68 -rw-r--r-- 1 root root 1521 9月 28 2014 AddTrustExternalCARoot.crt -rw-r--r-- 1 root root 1952 9月 28 2014 COMODORSAAddTrustCA.crt -rw-r--r-- 1 root root 2151 9月 28 2014 COMODORSADomainValidationSecureServerCA.crt -rw-r--r-- 1 root root 1391 7月 6 2014 GeoTrust_intermediate_Certificate.pem -rw-r--r-- 1 root root 1679 9月 28 2014 kgb.hmuna.com.privatekey -rw-r--r-- 1 root root 1751 9月 24 2014 kgb.hmuna.com.privatekey-orig -rw-r--r-- 1 root root 1895 9月 28 2014 kgb_hmuna_com.crt -rw-r--r-- 1 root root 1005 9月 24 2014 kgbhmunaCSR.csr -rw-r--r-- 1 root root 1743 7月 6 2014 mail.hmuna.com.privatekey -rw-r--r-- 1 root root 1675 7月 6 2014 mail.hmuna.com.privatekey_withoutpass -rw-r--r-- 1 root root 1009 7月 6 2014 mailhmunaCSR.csr -rw-r--r-- 1 root root 1842 7月 6 2014 mailhmunaSSLCertificateFile2.pem -rw-r--r-- 1 root root 3233 7月 6 2014 mailhmuna_combined.pem -rw-r--r-- 1 root root 1751 7月 6 2014 wiki.hmuna.com.privatekey -rw-r--r-- 1 root root 1679 7月 6 2014 wiki.hmuna.com.privatekey_passphraseless -rw-r--r-- 1 root root 1009 7月 6 2014 wikihmunaCSR.csr -rw-r--r-- 1 root root 1842 7月 6 2014 wikihmunaSSLCertificateFile2.pem -- &color(red){kgb の証明書は 2014年9月24日に CSR を作成したものに見えるが、何処で購入したのか不明(namecheap dashboard には出てこない)}; - Apache での証明書、秘密鍵、CSR ファイルの内容を確認する -- 証明書ファイルの内容チェック --- Comodo が 2014年9月に発行したもので、2019年まで有効な証明書に見える(正常、上のファイルとも整合する) munakata@mythen:/etc/ssl/official2 (master *)$ openssl x509 -text -noout -in kgb_hmuna_com.crt Certificate: Data: Version: 3 (0x2) Serial Number: 71:82:44:f4:5b:6f:b9:65:dd:15:b8:e2:04:68:a7:64 Signature Algorithm: sha256WithRSAEncryption Issuer: C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Domain Validation Secure Server CA Validity Not Before: Sep 28 00:00:00 2014 GMT Not After : Sep 27 23:59:59 2019 GMT Subject: OU=Domain Control Validated, OU=PositiveSSL, CN=kgb.hmuna.com Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (2048 bit) Modulus: 00:b7:d8:37:66:40:96:9f:9c:f0:96:e6:fd:9a:25: d7:89:6b:6a:9e:44:67:22:24:0d:09:ad:03:36:e7: 65:9d:82:ed:c5:60:be:4c:a0:7c:7e:52:54:c8:84: f2:9f:6d:19:d4:f4:9e:ed:9f:73:d0:a5:df:83:1f: 44:99:26:ab:e7:d0:ff:05:48:1e:f3:9e:2b:bd:2a: ac:4a:bd:25:cb:48:d7:c0:6d:20:a0:ab:62:f8:82: d7:c4:ea:5c:1c:7d:ac:19:cc:60:6a:b2:9e:e0:3b: 1f:cd:36:be:35:3e:27:a4:0e:cd:07:1b:1b:bc:d4: 5d:57:63:f5:0d:ba:bf:a9:c1:3e:f7:7c:13:6a:b7: 8e:14:3f:5e:43:7a:87:c4:03:68:52:73:6e:c7:d9: c0:8d:8f:24:07:ce:7a:cb:b5:5f:fb:bd:47:80:08: 28:08:67:4e:dd:93:2e:37:16:e6:0e:f3:28:ad:0c: 36:11:51:b0:d3:dd:cc:9d:8b:a1:58:c6:af:64:78: 44:7d:42:cc:d2:40:42:c0:cb:96:11:a9:f8:50:ed: 89:98:de:28:3f:a5:1a:41:ad:b1:b1:88:a9:5b:90: 15:06:31:dc:0b:e1:24:eb:99:2f:1f:09:48:c0:f1: 09:9c:e5:de:cd:d5:ce:e0:b2:81:b4:61:fb:0f:61: 00:e5 Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Authority Key Identifier: keyid:90:AF:6A:3A:94:5A:0B:D8:90:EA:12:56:73:DF:43:B4:3A:28:DA:E7 X509v3 Subject Key Identifier: 68:03:77:22:D5:A3:CD:B6:A0:10:CF:A8:23:F4:46:63:B2:33:22:FB X509v3 Key Usage: critical Digital Signature, Key Encipherment X509v3 Basic Constraints: critical CA:FALSE X509v3 Extended Key Usage: TLS Web Server Authentication, TLS Web Client Authentication X509v3 Certificate Policies: Policy: 1.3.6.1.4.1.6449.1.2.2.7 CPS: https://secure.comodo.com/CPS Policy: 2.23.140.1.2.1 X509v3 CRL Distribution Points: Full Name: URI:http://crl.comodoca.com/COMODORSADomainValidationSecureServerCA.crl Authority Information Access: CA Issuers - URI:http://crt.comodoca.com/COMODORSADomainValidationSecureServerCA.crt OCSP - URI:http://ocsp.comodoca.com X509v3 Subject Alternative Name: DNS:kgb.hmuna.com, DNS:www.kgb.hmuna.com Signature Algorithm: sha256WithRSAEncryption 46:e6:63:54:c9:5b:e3:fb:d2:5d:8e:12:4d:68:64:ee:0d:54: 94:e2:e7:36:12:54:4c:e0:8a:17:d6:77:85:40:b1:d1:2e:e8: 61:94:80:15:7c:bd:90:43:51:57:68:34:5a:8c:8e:86:1a:d7: d8:b1:b1:46:ff:1b:91:ca:77:83:c8:0a:1d:7e:aa:58:fe:6b: a3:38:79:9f:75:b3:e4:04:1a:c7:06:1e:95:84:24:57:34:32: 8d:f3:3d:af:ca:be:25:68:90:c3:da:7b:63:e8:91:85:86:3c: 1a:4a:d7:73:c6:16:60:a2:82:c7:9e:9c:7a:68:b2:9b:b5:26: f7:bc:31:cf:f1:33:b4:49:1b:93:c6:a1:67:47:0b:7f:87:41: dd:da:d3:1d:d9:92:2e:53:d0:60:99:0c:50:a3:51:81:55:2e: 14:80:0e:da:c1:c3:b7:e6:e0:50:8d:f0:30:2f:60:e2:d9:05: 93:e1:e2:6e:54:1e:c1:fb:e0:66:f4:e3:3b:50:c4:aa:99:1c: 39:cf:ce:04:64:18:b1:ac:28:14:32:6c:2c:48:af:34:b2:c0: 0e:dc:d0:51:80:d3:5a:a3:31:8e:f6:e7:4c:c8:ed:d4:5e:17: b8:34:ab:07:04:1e:39:af:b2:de:47:e3:eb:84:cf:7f:51:4f: 79:65:6c:cf -- CSR(証明書発行リクエスト)ファイルの内容チェック --- kgb.hmuna.com 向けの証明書発行依頼であり、正常に見える munakata@mythen:/etc/ssl/official2 (master *)$ openssl req -text -noout -in kgbhmunaCSR.csr Certificate Request: Data: Version: 0 (0x0) Subject: C=JP, ST=Kanagawa, L=Yokohama, O=Admin, OU=IT, CN=kgb.hmuna.com Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (2048 bit) Modulus: 00:b7:d8:37:66:40:96:9f:9c:f0:96:e6:fd:9a:25: d7:89:6b:6a:9e:44:67:22:24:0d:09:ad:03:36:e7: 65:9d:82:ed:c5:60:be:4c:a0:7c:7e:52:54:c8:84: f2:9f:6d:19:d4:f4:9e:ed:9f:73:d0:a5:df:83:1f: 44:99:26:ab:e7:d0:ff:05:48:1e:f3:9e:2b:bd:2a: ac:4a:bd:25:cb:48:d7:c0:6d:20:a0:ab:62:f8:82: d7:c4:ea:5c:1c:7d:ac:19:cc:60:6a:b2:9e:e0:3b: 1f:cd:36:be:35:3e:27:a4:0e:cd:07:1b:1b:bc:d4: 5d:57:63:f5:0d:ba:bf:a9:c1:3e:f7:7c:13:6a:b7: 8e:14:3f:5e:43:7a:87:c4:03:68:52:73:6e:c7:d9: c0:8d:8f:24:07:ce:7a:cb:b5:5f:fb:bd:47:80:08: 28:08:67:4e:dd:93:2e:37:16:e6:0e:f3:28:ad:0c: 36:11:51:b0:d3:dd:cc:9d:8b:a1:58:c6:af:64:78: 44:7d:42:cc:d2:40:42:c0:cb:96:11:a9:f8:50:ed: 89:98:de:28:3f:a5:1a:41:ad:b1:b1:88:a9:5b:90: 15:06:31:dc:0b:e1:24:eb:99:2f:1f:09:48:c0:f1: 09:9c:e5:de:cd:d5:ce:e0:b2:81:b4:61:fb:0f:61: 00:e5 Exponent: 65537 (0x10001) Attributes: a0:00 Signature Algorithm: sha256WithRSAEncryption 0f:54:51:bb:62:65:46:be:2a:1e:a0:f6:f9:36:97:da:b2:1a: 41:cc:43:32:ea:37:87:8d:d4:8d:dd:2e:ac:20:65:a8:6a:63: f5:d6:b7:b3:db:20:97:20:42:b9:4f:54:fa:45:c7:00:d6:48: 40:d2:88:54:f8:eb:ae:29:ac:5a:7d:29:6c:00:ce:aa:85:1a: 2e:72:91:be:c7:5a:9a:5e:02:8e:9d:43:22:d6:f0:b9:7f:9c: 46:0f:d8:1a:03:2f:e8:25:ab:56:8b:85:f2:7c:ad:ff:3e:d5: 1e:db:96:e7:e0:f5:23:7c:22:39:87:4e:bf:58:8a:84:02:b9: 00:cd:81:4c:8e:13:f9:85:1f:2b:11:b9:89:cc:a4:3f:08:4c: c2:ca:df:0f:45:d7:89:e4:96:de:d9:a6:cc:4e:b9:84:50:a5: 09:db:85:22:13:5b:02:4c:70:ab:30:a1:0c:4d:b1:3a:00:57: f3:c6:22:f0:b8:ff:89:57:e0:62:c8:6e:23:3d:94:8c:c4:2d: 19:94:2e:0e:bd:10:95:ec:6c:0c:dc:45:bf:98:b1:5c:e4:67: c1:bd:ab:f9:32:65:37:5e:b2:40:5d:5c:01:a9:14:27:87:01: 2b:ef:86:8a:e9:95:43:a7:66:4c:4a:65:ee:a4:b4:f8:c3:65: 9d:54:f4:41 - comodo による証明書発行時のガイダンス &ref{ORDER_15187565.eml}; を再確認 -- Attached to this email you should find a .zip file containing: --- Root CA Certificate - AddTrustExternalCARoot.crt --- Intermediate CA Certificate - COMODORSAAddTrustCA.crt --- Intermediate CA Certificate - COMODORSADomainValidationSecureServerCA.crt --- Your PositiveSSL Certificate - kgb_hmuna_com.crt You can also find your PositiveSSL Certificate for kgb.hmuna.com in text format at the bottom of this email. - Apache 内での証明書関連の設定(経緯込み全体) # 20101225 に公式の証明書(でも安い!)を導入しなおした。 # 20121211 に公式の証明書(でも安い!)を導入しなおした。 # 20140928 に wiki.hmuna.com --> kgb.hmuna.com 変更に伴い公式の証明書を導入しなおした。 # 導入経緯の説明は wiki に(https://kgb.hmuna.com:443/index.php?HomeServer6) # Server Certificate: #SSLCertificateFile /etc/ssl/official/wikihmunaSSLCertificateFile.pem #SSLCertificateFile /etc/ssl/official2/wikihmunaSSLCertificateFile2.pem SSLCertificateFile /etc/ssl/official2/kgb_hmuna_com.crt # Server Private Key: #SSLCertificateKeyFile /etc/ssl/official/wikihmunaPrivateKey.key #SSLCertificateKeyFile /etc/ssl/official2/wiki.hmuna.com.privatekey SSLCertificateKeyFile /etc/ssl/official2/kgb.hmuna.com.privatekey # Server Certificate Chain: #SSLCertificateChainFile /etc/ssl/official/RapidSSL_CA_bundle.pem #SSLCertificateChainFile /etc/ssl/official2/GeoTrust_intermediate_Certificate.pem SSLCertificateChainFile /etc/ssl/official2/COMODORSAAddTrustCA.crt SSLCertificateChainFile /etc/ssl/official2/COMODORSAAddTrustCA.crt - Apache 内での証明書関連の設定(kgb 関連部分) # 20140928 に wiki.hmuna.com --> kgb.hmuna.com 変更に伴い公式の証明書を導入しなおした。 # 導入経緯の説明は wiki に(https://kgb.hmuna.com:443/index.php?HomeServer6) # Server Certificate: SSLCertificateFile /etc/ssl/official2/kgb_hmuna_com.crt # Server Private Key: SSLCertificateKeyFile /etc/ssl/official2/kgb.hmuna.com.privatekey # Server Certificate Chain: SSLCertificateChainFile /etc/ssl/official2/COMODORSAAddTrustCA.crt SSLCertificateChainFile /etc/ssl/official2/COMODORSAAddTrustCA.crt -- &color(red){中間証明書(COMODORSAAddTrustCA.crt)が怪しい、2つ書いてあるのは害は無いだろうが中味が問題}; -- &color(red){良く読み直すと Comodo からは中間証明書が2つ発行されているが、上記設定では2つ目の設定をしようとして正しい2つ目を記載ミスしている?}; -- 修正して relaod SSLCertificateChainFile /etc/ssl/official2/COMODORSAAddTrustCA.crt SSLCertificateChainFile /etc/ssl/official2/COMODORSADomainValidationSecureServerCA.crt - 証明書のインストール状況を確認 munakata@muna-E450:~$ openssl s_client -connect kgb.hmuna.com:443 -showcerts CONNECTED(00000003) depth=2 C = GB, ST = Greater Manchester, L = Salford, O = COMODO CA Limited, CN = COMODO RSA Certification Authority verify return:1 depth=1 C = GB, ST = Greater Manchester, L = Salford, O = COMODO CA Limited, CN = COMODO RSA Domain Validation Secure Server CA verify return:1 depth=0 OU = Domain Control Validated, OU = PositiveSSL, CN = kgb.hmuna.com verify return:1 --- Certificate chain 0 s:/OU=Domain Control Validated/OU=PositiveSSL/CN=kgb.hmuna.com i:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Domain Validation Secure Server CA -----BEGIN CERTIFICATE----- MIIFSzCCBDOgAwIBAgIQcYJE9FtvuWXdFbjiBGinZDANBgkqhkiG9w0BAQsFADCB kDELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4G A1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxNjA0BgNV BAMTLUNPTU9ETyBSU0EgRG9tYWluIFZhbGlkYXRpb24gU2VjdXJlIFNlcnZlciBD QTAeFw0xNDA5MjgwMDAwMDBaFw0xOTA5MjcyMzU5NTlaMFExITAfBgNVBAsTGERv bWFpbiBDb250cm9sIFZhbGlkYXRlZDEUMBIGA1UECxMLUG9zaXRpdmVTU0wxFjAU BgNVBAMTDWtnYi5obXVuYS5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK AoIBAQC32DdmQJafnPCW5v2aJdeJa2qeRGciJA0JrQM252Wdgu3FYL5MoHx+UlTI hPKfbRnU9J7tn3PQpd+DH0SZJqvn0P8FSB7zniu9KqxKvSXLSNfAbSCgq2L4gtfE 6lwcfawZzGBqsp7gOx/NNr41PiekDs0HGxu81F1XY/UNur+pwT73fBNqt44UP15D eofEA2hSc27H2cCNjyQHznrLtV/7vUeACCgIZ07dky43FuYO8yitDDYRUbDT3cyd i6FYxq9keER9QszSQELAy5YRqfhQ7YmY3ig/pRpBrbGxiKlbkBUGMdwL4STrmS8f CUjA8Qmc5d7N1c7gsoG0YfsPYQDlAgMBAAGjggHdMIIB2TAfBgNVHSMEGDAWgBSQ r2o6lFoL2JDqElZz30O0Oija5zAdBgNVHQ4EFgQUaAN3ItWjzbagEM+oI/RGY7Iz IvswDgYDVR0PAQH/BAQDAgWgMAwGA1UdEwEB/wQCMAAwHQYDVR0lBBYwFAYIKwYB BQUHAwEGCCsGAQUFBwMCME8GA1UdIARIMEYwOgYLKwYBBAGyMQECAgcwKzApBggr BgEFBQcCARYdaHR0cHM6Ly9zZWN1cmUuY29tb2RvLmNvbS9DUFMwCAYGZ4EMAQIB MFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly9jcmwuY29tb2RvY2EuY29tL0NPTU9E T1JTQURvbWFpblZhbGlkYXRpb25TZWN1cmVTZXJ2ZXJDQS5jcmwwgYUGCCsGAQUF BwEBBHkwdzBPBggrBgEFBQcwAoZDaHR0cDovL2NydC5jb21vZG9jYS5jb20vQ09N T0RPUlNBRG9tYWluVmFsaWRhdGlvblNlY3VyZVNlcnZlckNBLmNydDAkBggrBgEF BQcwAYYYaHR0cDovL29jc3AuY29tb2RvY2EuY29tMCsGA1UdEQQkMCKCDWtnYi5o bXVuYS5jb22CEXd3dy5rZ2IuaG11bmEuY29tMA0GCSqGSIb3DQEBCwUAA4IBAQBG 5mNUyVvj+9JdjhJNaGTuDVSU4uc2ElRM4IoX1neFQLHRLuhhlIAVfL2QQ1FXaDRa jI6GGtfYsbFG/xuRyneDyAodfqpY/mujOHmfdbPkBBrHBh6VhCRXNDKN8z2vyr4l aJDD2ntj6JGFhjwaStdzxhZgooLHnpx6aLKbtSb3vDHP8TO0SRuTxqFnRwt/h0Hd 2tMd2ZIuU9BgmQxQo1GBVS4UgA7awcO35uBQjfAwL2Di2QWT4eJuVB7B++Bm9OM7 UMSqmRw5z84EZBixrCgUMmwsSK80ssAO3NBRgNNaozGO9udMyO3UXhe4NKsHBB45 r7LeR+PrhM9/UU95ZWzP -----END CERTIFICATE----- 1 s:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Domain Validation Secure Server CA i:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Certification Authority -----BEGIN CERTIFICATE----- MIIGCDCCA/CgAwIBAgIQKy5u6tl1NmwUim7bo3yMBzANBgkqhkiG9w0BAQwFADCB hTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4G A1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxKzApBgNV BAMTIkNPTU9ETyBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMTQwMjEy MDAwMDAwWhcNMjkwMjExMjM1OTU5WjCBkDELMAkGA1UEBhMCR0IxGzAZBgNVBAgT EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgGA1UEChMR Q09NT0RPIENBIExpbWl0ZWQxNjA0BgNVBAMTLUNPTU9ETyBSU0EgRG9tYWluIFZh bGlkYXRpb24gU2VjdXJlIFNlcnZlciBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEP ADCCAQoCggEBAI7CAhnhoFmk6zg1jSz9AdDTScBkxwtiBUUWOqigwAwCfx3M28Sh bXcDow+G+eMGnD4LgYqbSRutA776S9uMIO3Vzl5ljj4Nr0zCsLdFXlIvNN5IJGS0 Qa4Al/e+Z96e0HqnU4A7fK31llVvl0cKfIWLIpeNs4TgllfQcBhglo/uLQeTnaG6 ytHNe+nEKpooIZFNb5JPJaXyejXdJtxGpdCsWTWM/06RQ1A/WZMebFEh7lgUq/51 UHg+TLAchhP6a5i84DuUHoVS3AOTJBhuyydRReZw3iVDpA3hSqXttn7IzW3uLh0n c13cRTCAquOyQQuvvUSH2rnlG51/ruWFgqUCAwEAAaOCAWUwggFhMB8GA1UdIwQY MBaAFLuvfgI9+qbxPISOre44mOzZMjLUMB0GA1UdDgQWBBSQr2o6lFoL2JDqElZz 30O0Oija5zAOBgNVHQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNV HSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwGwYDVR0gBBQwEjAGBgRVHSAAMAgG BmeBDAECATBMBgNVHR8ERTBDMEGgP6A9hjtodHRwOi8vY3JsLmNvbW9kb2NhLmNv bS9DT01PRE9SU0FDZXJ0aWZpY2F0aW9uQXV0aG9yaXR5LmNybDBxBggrBgEFBQcB AQRlMGMwOwYIKwYBBQUHMAKGL2h0dHA6Ly9jcnQuY29tb2RvY2EuY29tL0NPTU9E T1JTQUFkZFRydXN0Q0EuY3J0MCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5jb21v ZG9jYS5jb20wDQYJKoZIhvcNAQEMBQADggIBAE4rdk+SHGI2ibp3wScF9BzWRJ2p mj6q1WZmAT7qSeaiNbz69t2Vjpk1mA42GHWx3d1Qcnyu3HeIzg/3kCDKo2cuH1Z/ e+FE6kKVxF0NAVBGFfKBiVlsit2M8RKhjTpCipj4SzR7JzsItG8kO3KdY3RYPBps P0/HEZrIqPW1N+8QRcZs2eBelSaz662jue5/DJpmNXMyYE7l3YphLG5SEXdoltMY dVEVABt0iN3hxzgEQyjpFv3ZBdRdRydg1vs4O2xyopT4Qhrf7W8GjEXCBgCq5Ojc 2bXhc3js9iPc0d1sjhqPpepUfJa3w/5Vjo1JXvxku88+vZbrac2/4EjxYoIQ5QxG V/Iz2tDIY+3GH5QFlkoakdH368+PUq4NCNk+qKBR6cGHdNXJ93SrLlP7u3r7l+L4 HyaPs9Kg4DdbKDsx5Q5XLVq4rXmsXiBmGqW5prU5wfWYQ//u+aen/e7KJD2AFsQX j4rBYKEMrltDR5FL1ZoXX/nUh8HCjLfn4g8wGTeGrODcQgPmlKidrv0PJFGUzpII 0fxQ8ANAe4hZ7Q7drNJ3gjTcBpUC2JD5Leo31Rpg0Gcg19hCC0Wvgmje3WYkN5Ap lBlGGSW4gNfL1IYoakRwJiNiqZ+Gb7+6kHDSVneFeO/qJakXzlByjAA6quPbYzSf +AZxAeKCINT+b72x -----END CERTIFICATE----- --- Server certificate subject=/OU=Domain Control Validated/OU=PositiveSSL/CN=kgb.hmuna.com issuer=/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Domain Validation Secure Server CA --- No client certificate CA names sent Peer signing digest: SHA512 Server Temp Key: ECDH, P-256, 256 bits --- SSL handshake has read 3601 bytes and written 431 bytes --- New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-GCM-SHA384 Server public key is 2048 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE No ALPN negotiated SSL-Session: Protocol : TLSv1.2 Cipher : ECDHE-RSA-AES256-GCM-SHA384 Session-ID: 7A9F11F070145BD4C77E8B3ABF8034697BE71B290ACB287C4ED3E8053F9223BD Session-ID-ctx: Master-Key: 528FD41DC441663C3ED83D3E9442E260F9526C5C13A699BBBE889CBF3813084E0CFC86BB688492B97915B047C76F6BC7 Key-Arg : None PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 300 (seconds) TLS session ticket: 0000 - 00 4b 4e 02 87 e4 ec 03-40 34 cd e1 2e 6d 51 33 .KN.....@4...mQ3 0010 - 08 70 b8 07 5c 9f 9c e6-76 d3 57 ed b9 03 30 c3 .p..\...v.W...0. 0020 - 3b 43 29 5c cd f8 f0 f9-fa 4e 0e 39 8e 34 21 e8 ;C)\.....N.9.4!. 0030 - 46 44 74 5a 51 98 76 81-ec 1c af b1 84 76 16 a4 FDtZQ.v......v.. 0040 - e9 09 d4 39 e3 bc f3 85-b6 01 5f 8e b1 fa 2b 2f ...9......_...+/ 0050 - c0 de 25 b9 11 cc c9 53-f5 84 4e 14 47 79 60 a5 ..%....S..N.Gy`. 0060 - f9 75 e6 9f d4 a3 62 7f-a4 ad a9 aa 40 9f 67 78 .u....b.....@.gx 0070 - 7d 6c 06 ee 1b 2c 1d e3-73 71 e7 f8 de 45 89 33 }l...,..sq...E.3 0080 - 86 a6 85 92 03 21 22 f9-7c 07 4e f6 00 31 af a7 .....!".|.N..1.. 0090 - d0 34 ba 93 bc 11 93 02-cd 75 87 a6 20 a0 b9 1a .4.......u.. ... 00a0 - a4 64 6f ba e6 16 9b fb-11 3d ec ff c9 fc 60 02 .do......=....`. 00b0 - 9d 28 5f 79 85 f7 ad 43-2d aa 60 c5 83 f0 f2 23 .(_y...C-.`....# Start Time: 1501092236 Timeout : 300 (sec) Verify return code: 0 (ok) --- *** 証明書の更新 [#ga366933] &color(red){いくつかの PC で kgb.hmuna.com の証明書が失効しているとエラーになる(ならないPCもあるには不思議だが)ので、証明書を新規に1年購入して更新してみる}; - CSR の作成 -- サーバ用秘密鍵 = kgb201707.key -- pass phrase = nanamochahiko - 注文記録 ---- &ref(Namecheap.com Order Summary.eml); - 発行された証明書(以前より中間証明所がシンプルになっている) ---- &ref(kgb_hmuna_com.zip);
タイムスタンプを変更しない
#contents *** md0 ドライブの一つが動いていなかった @2017-6-11 [#qab53402] - Ubuntu の ディスクメニューで md0 が赤色表示 → md0 が Degrade 状態となっていた。 動作確認 -- Superblock の persistency は確保されているが、1台のドライブ(/dev/sda)が切り離されていた munakata@mythen:~ (master #)$ sudo mdadm -D /dev/md0 /dev/md0: Version : 1.2 Creation Time : Sun Dec 11 23:04:19 2011 Raid Level : raid1 Array Size : 3906885632 (3725.90 GiB 4000.65 GB) Used Dev Size : 3906885632 (3725.90 GiB 4000.65 GB) Raid Devices : 2 Total Devices : 1 Persistence : Superblock Update Time : Sat Jun 10 18:28:18 2017 State : clean, degraded Active Devices : 1 Working Devices : 1 Failed Devices : 0 Spare Devices : 0 Name : mythen:0 UUID : 4cd693e9:dd3ad1a9:3a5a23a9:62ce3a05 Events : 280089 Number Major Minor RaidDevice State 0 0 0 0 removed 2 8 17 1 active sync /dev/sdb1 - /dev/sda にエラーが発生しているかを smartctrl の簡易テストで確認 munakata@mythen:~ (master #)$ sudo smartctl -t short /dev/sda smartctl 6.2 2013-07-26 r3841 [x86_64-linux-3.13.0-48-generic] (local build) Copyright (C) 2002-13, Bruce Allen, Christian Franke, www.smartmontools.org Testing has begun. Please wait 2 minutes for test to complete. Test will complete after Sat Jun 10 18:27:37 2017 Use smartctl -X to abort test. - テストの結果 /dev/sda 自体に障害が発生していないことを確認(completed without error) munakata@mythen:~ (master #)$ sudo smartctl -l selftest /dev/sda smartctl 6.2 2013-07-26 r3841 [x86_64-linux-3.13.0-48-generic] (local build) Copyright (C) 2002-13, Bruce Allen, Christian Franke, www.smartmontools.org === START OF READ SMART DATA SECTION === SMART Self-test log structure revision number 1 Num Test_Description Status Remaining LifeTime(hours) LBA_of_first_error # 1 Short offline Completed without error 00% 22649 - - md0 に /dev/sda を再アッタチ → 自動的に rebuild がスタートする(rebuild には数時間がかかる) munakata@mythen:~ (master #)$ sudo mdadm /dev/md0 --add /dev/sda1 mdadm: added /dev/sda1 - rebuild 中(4時間程度経過時点) munakata@mythen:~ (master #)$ sudo mdadm -D /dev/md0 /dev/md0: Version : 1.2munakata@mythen:~ (master #)$ sudo mdadm /dev/md0 --add /dev/sda1 mdadm: added /dev/sda1 Creation Time : Sun Dec 11 23:04:19 2011 Raid Level : raid1 Array Size : 3906885632 (3725.90 GiB 4000.65 GB) Used Dev Size : 3906885632 (3725.90 GiB 4000.65 GB) Raid Devices : 2 Total Devices : 2 Persistence : Superblock is persistent Update Time : Sat Jun 10 19:49:34 2017 State : clean, degraded, recovering Active Devices : 1 Working Devices : 2 Failed Devices : 0 Spare Devices : 1 Rebuild Status : 14% complete Name : mythen:0 UUID : 4cd693e9:dd3ad1a9:3a5a23a9:62ce3a05 Events : 282261 Number Major Minor RaidDevice State 3 8 1 0 spare rebuilding /dev/sda1 2 8 17 1 active sync /dev/sdb1 - rebuild 完了時点 munakata@mythen:~ (master #)$ sudo mdadm -D /dev/md0 /dev/md0: Version : 1.2 Creation Time : Sun Dec 11 23:04:19 2011 Raid Level : raid1 Array Size : 3906885632 (3725.90 GiB 4000.65 GB) Used Dev Size : 3906885632 (3725.90 GiB 4000.65 GB) Raid Devices : 2 Total Devices : 2 Persistence : Superblock is persistent Update Time : Sun Jun 11 07:40:39 2017 State : clean Active Devices : 2 Working Devices : 2 Failed Devices : 0 Spare Devices : 0 Name : mythen:0 UUID : 4cd693e9:dd3ad1a9:3a5a23a9:62ce3a05 Events : 296999 Number Major Minor RaidDevice State 3 8 1 0 active sync /dev/sda1 2 8 17 1 active sync /dev/sdb1 munakata@mythen:~ (master #)$ cat /proc/mdstat Personalities : [linear] [multipath] [raid0] [raid1] [raid6] [raid5] [raid4] [raid10] md0 : active raid1 sda1[3] sdb1[2] 3906885632 blocks super 1.2 [2/2] [UU] *** dtv_recipe が動作不安定 @2017-6-11 [#a0649bd9] - HDD 録画したファイルの中で特定のファイルがリードエラー(再生中に停止)する状況になった - SMART のログを確認 -- 重要なのは &color(red){Current_Pending_Sector = 4}; となっている点、正常な状態ではない munakata@mythen:~ (master #)$ sudo smartctl -a /dev/sdf smartctl 6.2 2013-07-26 r3841 [x86_64-linux-3.13.0-48-generic] (local build) Copyright (C) 2002-13, Bruce Allen, Christian Franke, www.smartmontools.org === START OF INFORMATION SECTION === Device Model: WDC WD40EZRZ-00WN9B0 Serial Number: WD-WCC4E3JH7YV9 LU WWN Device Id: 5 0014ee 261da88a0 Firmware Version: 80.00A80 User Capacity: 4,000,787,030,016 bytes [4.00 TB] Sector Sizes: 512 bytes logical, 4096 bytes physical Rotation Rate: 5400 rpm Device is: Not in smartctl database [for details use: -P showall] ATA Version is: ACS-2 (minor revision not indicated) SATA Version is: SATA 3.0, 6.0 Gb/s (current: 6.0 Gb/s) Local Time is: Sun Jun 11 08:07:16 2017 JST SMART support is: Available - device has SMART capability. SMART support is: Enabled === START OF READ SMART DATA SECTION === SMART overall-health self-assessment test result: PASSED General SMART Values: Offline data collection status: (0x82) Offline data collection activity was completed without error. Auto Offline Data Collection: Enabled. Self-test execution status: ( 121) The previous self-test completed having the read element of the test failed. Total time to complete Offline data collection: (53760) seconds. Offline data collection capabilities: (0x7b) SMART execute Offline immediate. Auto Offline data collection on/off support. Suspend Offline collection upon new command. Offline surface scan supported. Self-test supported. Conveyance Self-test supported. Selective Self-test supported. SMART capabilities: (0x0003) Saves SMART data before entering power-saving mode. Supports SMART auto save timer. Error logging capability: (0x01) Error logging supported. General Purpose Logging supported. Short self-test routine recommended polling time: ( 2) minutes. Extended self-test routine recommended polling time: ( 537) minutes. Conveyance self-test routine recommended polling time: ( 5) minutes. SCT capabilities: (0x7035) SCT Status supported. SCT Feature Control supported. SCT Data Table supported. SMART Attributes Data Structure revision number: 16 Vendor Specific SMART Attributes with Thresholds: ID# ATTRIBUTE_NAME FLAG VALUE WORST THRESH TYPE UPDATED WHEN_FAILED RAW_VALUE 1 Raw_Read_Error_Rate 0x002f 200 200 051 Pre-fail Always - 912 3 Spin_Up_Time 0x0027 185 179 021 Pre-fail Always - 7741 4 Start_Stop_Count 0x0032 100 100 000 Old_age Always - 16 5 Reallocated_Sector_Ct 0x0033 200 200 140 Pre-fail Always - 0 7 Seek_Error_Rate 0x002e 200 200 000 Old_age Always - 0 9 Power_On_Hours 0x0032 081 081 000 Old_age Always - 14096 10 Spin_Retry_Count 0x0032 100 253 000 Old_age Always - 0 11 Calibration_Retry_Count 0x0032 100 253 000 Old_age Always - 0 12 Power_Cycle_Count 0x0032 100 100 000 Old_age Always - 10 192 Power-Off_Retract_Count 0x0032 200 200 000 Old_age Always - 2 193 Load_Cycle_Count 0x0032 025 025 000 Old_age Always - 527334 194 Temperature_Celsius 0x0022 110 104 000 Old_age Always - 42 196 Reallocated_Event_Count 0x0032 200 200 000 Old_age Always - 0 197 Current_Pending_Sector 0x0032 200 200 000 Old_age Always - 4 <------- ここ 198 Offline_Uncorrectable 0x0030 200 200 000 Old_age Offline - 3 199 UDMA_CRC_Error_Count 0x0032 200 200 000 Old_age Always - 0 200 Multi_Zone_Error_Rate 0x0008 200 200 000 Old_age Offline - 208 SMART Error Log Version: 1 No Errors Logged -- dtv_recipe (/dev/sdf) をテストする munakata@mythen:~ (master #)$ sudo smartctl -t short /dev/sdf smartctl 6.2 2013-07-26 r3841 [x86_64-linux-3.13.0-48-generic] (local build) Copyright (C) 2002-13, Bruce Allen, Christian Franke, www.smartmontools.org === START OF OFFLINE IMMEDIATE AND SELF-TEST SECTION === Sending command: "Execute SMART Short self-test routine immediately in off-line mode". Drive command "Execute SMART Short self-test routine immediately in off-line mode" successful. Testing has begun. Please wait 2 minutes for test to complete. Test will complete after Sun Jun 11 08:06:42 2017 Use smartctl -X to abort test. - テスト結果を見る -- 上から最新のテスト結果 -- read_failure で終了していて、エラーが出た LBA の先頭の番地が記録されている SMART Self-test log structure revision number 1 Num Test_Description Status Remaining LifeTime(hours) LBA_of_first_error # 1 Short offline Completed: read failure 90% 14096 140218489 # 2 Extended offline Completed: read failure 90% 14082 140218489munakata@mythen:~ (master #)$ sudo # 3 Conveyance offline Completed: read failure 90% 14082 140218488 # 4 Short offline Completed: read failure 90% 14082 140218488 - 今回はディスクを交換することにした。 - 暫定的に不良ブロックを使わない [[設定の紹介:http://nyacom.net/?p=78]] もあった(が、不良ブロックが1つとは限らないだろう) *** One Time Password (OTP) を利用してサーバーを外部公開 [#i0937aa3] - Apache への OTP 認証の追加 <Directory /raid_vol/www/pukiwiki> Options +Indexes +FollowSymLinks +MultiViews AllowOverride None # ローカルネットからはパスワードなしでアクセスを許可 Satisfy any Order allow,deny Allow from 127.0.0.1 Allow from 192.168.1 # それ以外からのアクセスにはワンタイムパスワードを要求 AuthType Basic AuthName "OTP Authentication (Enter OTP as password)" AuthBasicProvider OTP Require valid-user OTPAuthUsersFile /raid_vol/www/otp/users OTPAuthMaxLinger 3600 OTPAuthLogoutOnIPChange On #AuthType Basic #AuthName "KGB 奈々子" ## nanamochahiko #AuthUserFile "/raid_vol/home/munakata/.htpasswd" #Require user munakata </Directory> - ユーザー登録用スクリプト ( munakata のホームディレクトリーに配置) ---- &ref(otp_user_entry.sh); #!/bin/bash -e user=${1:?Usage: $0 username} issuer=${2:-KGB} secret=$(cat /dev/urandom | tr -dc 'a-z0-9' | fold -w 15 | head -n 1) secret_base16=$(python -c "import base64; print base64.b16encode('${secret}')") secret_base32=$(python -c "import base64; print base64.b32encode('${secret}')") otpauth_uri="otpauth://totp/${issuer}:${user}?secret=${secret_base32}&issuer=${issuer}" otpauth_uri=$(python -c "import urllib; print urllib.quote('${otpauth_uri}')") qrcode_url="https://chart.googleapis.com/chart?chs=300x300&cht=qr&chl=${otpauth_uri}" file="/raid_vol/www/otp/users" if [ ! -f "${file}" ]; then [ -d $(dirname "$file") ] || mkdir -p $(dirname "$file") touch ${file} chown -R www-data:www-data $(dirname "$file") fi [ -w "${file}" ] || (echo "${file}: Permission denied" && exit 1) count=$(awk "\$2 ~ /^$user}\$/" ${file} | wc -l) if [ $count -le 0 ]; then echo "HOTP/T30 $(printf '%-12s' $user) - ${secret_base16}" >> ${file} echo "$qrcode_url" else echo "User '$user' already exists" fi -- [[munakata 用の QR コード:https://chart.googleapis.com/chart?chs=300x300&cht=qr&chl=otpauth%3A//totp/KGB%3Amunakata%3Fsecret%3DOQ2HQ5DIPFXG65TPPJ3W243Z%26issuer%3DKGB]] -- &ref(muna_otp.jpg); - 参考 URL -- [[Apacheへのアクセスに二要素認証を適用する:http://qiita.com/kz-takahashi/items/af8ea7d9894f26a65068]] *** kgb.hmuna.com の証明書検証 [#zfcf4aae] - サーバー証明書関連のエラー(ブラウザーで証明書が失効と言われる、 Kaspersky で中間証明書の一つに問題があると言われる 等)があり、証明書の状況を再確認した。 - 現在の証明書の場所は /etc/ssl/official2munakata@mythen:/etc/ssl/official2 (master *) $ ls -l 合計 68 -rw-r--r-- 1 root root 1521 9月 28 2014 AddTrustExternalCARoot.crt -rw-r--r-- 1 root root 1952 9月 28 2014 COMODORSAAddTrustCA.crt -rw-r--r-- 1 root root 2151 9月 28 2014 COMODORSADomainValidationSecureServerCA.crt -rw-r--r-- 1 root root 1391 7月 6 2014 GeoTrust_intermediate_Certificate.pem -rw-r--r-- 1 root root 1679 9月 28 2014 kgb.hmuna.com.privatekey -rw-r--r-- 1 root root 1751 9月 24 2014 kgb.hmuna.com.privatekey-orig -rw-r--r-- 1 root root 1895 9月 28 2014 kgb_hmuna_com.crt -rw-r--r-- 1 root root 1005 9月 24 2014 kgbhmunaCSR.csr -rw-r--r-- 1 root root 1743 7月 6 2014 mail.hmuna.com.privatekey -rw-r--r-- 1 root root 1675 7月 6 2014 mail.hmuna.com.privatekey_withoutpass -rw-r--r-- 1 root root 1009 7月 6 2014 mailhmunaCSR.csr -rw-r--r-- 1 root root 1842 7月 6 2014 mailhmunaSSLCertificateFile2.pem -rw-r--r-- 1 root root 3233 7月 6 2014 mailhmuna_combined.pem -rw-r--r-- 1 root root 1751 7月 6 2014 wiki.hmuna.com.privatekey -rw-r--r-- 1 root root 1679 7月 6 2014 wiki.hmuna.com.privatekey_passphraseless -rw-r--r-- 1 root root 1009 7月 6 2014 wikihmunaCSR.csr -rw-r--r-- 1 root root 1842 7月 6 2014 wikihmunaSSLCertificateFile2.pem -- &color(red){kgb の証明書は 2014年9月24日に CSR を作成したものに見えるが、何処で購入したのか不明(namecheap dashboard には出てこない)}; - Apache での証明書、秘密鍵、CSR ファイルの内容を確認する -- 証明書ファイルの内容チェック --- Comodo が 2014年9月に発行したもので、2019年まで有効な証明書に見える(正常、上のファイルとも整合する) munakata@mythen:/etc/ssl/official2 (master *)$ openssl x509 -text -noout -in kgb_hmuna_com.crt Certificate: Data: Version: 3 (0x2) Serial Number: 71:82:44:f4:5b:6f:b9:65:dd:15:b8:e2:04:68:a7:64 Signature Algorithm: sha256WithRSAEncryption Issuer: C=GB, ST=Greater Manchester, L=Salford, O=COMODO CA Limited, CN=COMODO RSA Domain Validation Secure Server CA Validity Not Before: Sep 28 00:00:00 2014 GMT Not After : Sep 27 23:59:59 2019 GMT Subject: OU=Domain Control Validated, OU=PositiveSSL, CN=kgb.hmuna.com Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (2048 bit) Modulus: 00:b7:d8:37:66:40:96:9f:9c:f0:96:e6:fd:9a:25: d7:89:6b:6a:9e:44:67:22:24:0d:09:ad:03:36:e7: 65:9d:82:ed:c5:60:be:4c:a0:7c:7e:52:54:c8:84: f2:9f:6d:19:d4:f4:9e:ed:9f:73:d0:a5:df:83:1f: 44:99:26:ab:e7:d0:ff:05:48:1e:f3:9e:2b:bd:2a: ac:4a:bd:25:cb:48:d7:c0:6d:20:a0:ab:62:f8:82: d7:c4:ea:5c:1c:7d:ac:19:cc:60:6a:b2:9e:e0:3b: 1f:cd:36:be:35:3e:27:a4:0e:cd:07:1b:1b:bc:d4: 5d:57:63:f5:0d:ba:bf:a9:c1:3e:f7:7c:13:6a:b7: 8e:14:3f:5e:43:7a:87:c4:03:68:52:73:6e:c7:d9: c0:8d:8f:24:07:ce:7a:cb:b5:5f:fb:bd:47:80:08: 28:08:67:4e:dd:93:2e:37:16:e6:0e:f3:28:ad:0c: 36:11:51:b0:d3:dd:cc:9d:8b:a1:58:c6:af:64:78: 44:7d:42:cc:d2:40:42:c0:cb:96:11:a9:f8:50:ed: 89:98:de:28:3f:a5:1a:41:ad:b1:b1:88:a9:5b:90: 15:06:31:dc:0b:e1:24:eb:99:2f:1f:09:48:c0:f1: 09:9c:e5:de:cd:d5:ce:e0:b2:81:b4:61:fb:0f:61: 00:e5 Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Authority Key Identifier: keyid:90:AF:6A:3A:94:5A:0B:D8:90:EA:12:56:73:DF:43:B4:3A:28:DA:E7 X509v3 Subject Key Identifier: 68:03:77:22:D5:A3:CD:B6:A0:10:CF:A8:23:F4:46:63:B2:33:22:FB X509v3 Key Usage: critical Digital Signature, Key Encipherment X509v3 Basic Constraints: critical CA:FALSE X509v3 Extended Key Usage: TLS Web Server Authentication, TLS Web Client Authentication X509v3 Certificate Policies: Policy: 1.3.6.1.4.1.6449.1.2.2.7 CPS: https://secure.comodo.com/CPS Policy: 2.23.140.1.2.1 X509v3 CRL Distribution Points: Full Name: URI:http://crl.comodoca.com/COMODORSADomainValidationSecureServerCA.crl Authority Information Access: CA Issuers - URI:http://crt.comodoca.com/COMODORSADomainValidationSecureServerCA.crt OCSP - URI:http://ocsp.comodoca.com X509v3 Subject Alternative Name: DNS:kgb.hmuna.com, DNS:www.kgb.hmuna.com Signature Algorithm: sha256WithRSAEncryption 46:e6:63:54:c9:5b:e3:fb:d2:5d:8e:12:4d:68:64:ee:0d:54: 94:e2:e7:36:12:54:4c:e0:8a:17:d6:77:85:40:b1:d1:2e:e8: 61:94:80:15:7c:bd:90:43:51:57:68:34:5a:8c:8e:86:1a:d7: d8:b1:b1:46:ff:1b:91:ca:77:83:c8:0a:1d:7e:aa:58:fe:6b: a3:38:79:9f:75:b3:e4:04:1a:c7:06:1e:95:84:24:57:34:32: 8d:f3:3d:af:ca:be:25:68:90:c3:da:7b:63:e8:91:85:86:3c: 1a:4a:d7:73:c6:16:60:a2:82:c7:9e:9c:7a:68:b2:9b:b5:26: f7:bc:31:cf:f1:33:b4:49:1b:93:c6:a1:67:47:0b:7f:87:41: dd:da:d3:1d:d9:92:2e:53:d0:60:99:0c:50:a3:51:81:55:2e: 14:80:0e:da:c1:c3:b7:e6:e0:50:8d:f0:30:2f:60:e2:d9:05: 93:e1:e2:6e:54:1e:c1:fb:e0:66:f4:e3:3b:50:c4:aa:99:1c: 39:cf:ce:04:64:18:b1:ac:28:14:32:6c:2c:48:af:34:b2:c0: 0e:dc:d0:51:80:d3:5a:a3:31:8e:f6:e7:4c:c8:ed:d4:5e:17: b8:34:ab:07:04:1e:39:af:b2:de:47:e3:eb:84:cf:7f:51:4f: 79:65:6c:cf -- CSR(証明書発行リクエスト)ファイルの内容チェック --- kgb.hmuna.com 向けの証明書発行依頼であり、正常に見える munakata@mythen:/etc/ssl/official2 (master *)$ openssl req -text -noout -in kgbhmunaCSR.csr Certificate Request: Data: Version: 0 (0x0) Subject: C=JP, ST=Kanagawa, L=Yokohama, O=Admin, OU=IT, CN=kgb.hmuna.com Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (2048 bit) Modulus: 00:b7:d8:37:66:40:96:9f:9c:f0:96:e6:fd:9a:25: d7:89:6b:6a:9e:44:67:22:24:0d:09:ad:03:36:e7: 65:9d:82:ed:c5:60:be:4c:a0:7c:7e:52:54:c8:84: f2:9f:6d:19:d4:f4:9e:ed:9f:73:d0:a5:df:83:1f: 44:99:26:ab:e7:d0:ff:05:48:1e:f3:9e:2b:bd:2a: ac:4a:bd:25:cb:48:d7:c0:6d:20:a0:ab:62:f8:82: d7:c4:ea:5c:1c:7d:ac:19:cc:60:6a:b2:9e:e0:3b: 1f:cd:36:be:35:3e:27:a4:0e:cd:07:1b:1b:bc:d4: 5d:57:63:f5:0d:ba:bf:a9:c1:3e:f7:7c:13:6a:b7: 8e:14:3f:5e:43:7a:87:c4:03:68:52:73:6e:c7:d9: c0:8d:8f:24:07:ce:7a:cb:b5:5f:fb:bd:47:80:08: 28:08:67:4e:dd:93:2e:37:16:e6:0e:f3:28:ad:0c: 36:11:51:b0:d3:dd:cc:9d:8b:a1:58:c6:af:64:78: 44:7d:42:cc:d2:40:42:c0:cb:96:11:a9:f8:50:ed: 89:98:de:28:3f:a5:1a:41:ad:b1:b1:88:a9:5b:90: 15:06:31:dc:0b:e1:24:eb:99:2f:1f:09:48:c0:f1: 09:9c:e5:de:cd:d5:ce:e0:b2:81:b4:61:fb:0f:61: 00:e5 Exponent: 65537 (0x10001) Attributes: a0:00 Signature Algorithm: sha256WithRSAEncryption 0f:54:51:bb:62:65:46:be:2a:1e:a0:f6:f9:36:97:da:b2:1a: 41:cc:43:32:ea:37:87:8d:d4:8d:dd:2e:ac:20:65:a8:6a:63: f5:d6:b7:b3:db:20:97:20:42:b9:4f:54:fa:45:c7:00:d6:48: 40:d2:88:54:f8:eb:ae:29:ac:5a:7d:29:6c:00:ce:aa:85:1a: 2e:72:91:be:c7:5a:9a:5e:02:8e:9d:43:22:d6:f0:b9:7f:9c: 46:0f:d8:1a:03:2f:e8:25:ab:56:8b:85:f2:7c:ad:ff:3e:d5: 1e:db:96:e7:e0:f5:23:7c:22:39:87:4e:bf:58:8a:84:02:b9: 00:cd:81:4c:8e:13:f9:85:1f:2b:11:b9:89:cc:a4:3f:08:4c: c2:ca:df:0f:45:d7:89:e4:96:de:d9:a6:cc:4e:b9:84:50:a5: 09:db:85:22:13:5b:02:4c:70:ab:30:a1:0c:4d:b1:3a:00:57: f3:c6:22:f0:b8:ff:89:57:e0:62:c8:6e:23:3d:94:8c:c4:2d: 19:94:2e:0e:bd:10:95:ec:6c:0c:dc:45:bf:98:b1:5c:e4:67: c1:bd:ab:f9:32:65:37:5e:b2:40:5d:5c:01:a9:14:27:87:01: 2b:ef:86:8a:e9:95:43:a7:66:4c:4a:65:ee:a4:b4:f8:c3:65: 9d:54:f4:41 - comodo による証明書発行時のガイダンス &ref{ORDER_15187565.eml}; を再確認 -- Attached to this email you should find a .zip file containing: --- Root CA Certificate - AddTrustExternalCARoot.crt --- Intermediate CA Certificate - COMODORSAAddTrustCA.crt --- Intermediate CA Certificate - COMODORSADomainValidationSecureServerCA.crt --- Your PositiveSSL Certificate - kgb_hmuna_com.crt You can also find your PositiveSSL Certificate for kgb.hmuna.com in text format at the bottom of this email. - Apache 内での証明書関連の設定(経緯込み全体) # 20101225 に公式の証明書(でも安い!)を導入しなおした。 # 20121211 に公式の証明書(でも安い!)を導入しなおした。 # 20140928 に wiki.hmuna.com --> kgb.hmuna.com 変更に伴い公式の証明書を導入しなおした。 # 導入経緯の説明は wiki に(https://kgb.hmuna.com:443/index.php?HomeServer6) # Server Certificate: #SSLCertificateFile /etc/ssl/official/wikihmunaSSLCertificateFile.pem #SSLCertificateFile /etc/ssl/official2/wikihmunaSSLCertificateFile2.pem SSLCertificateFile /etc/ssl/official2/kgb_hmuna_com.crt # Server Private Key: #SSLCertificateKeyFile /etc/ssl/official/wikihmunaPrivateKey.key #SSLCertificateKeyFile /etc/ssl/official2/wiki.hmuna.com.privatekey SSLCertificateKeyFile /etc/ssl/official2/kgb.hmuna.com.privatekey # Server Certificate Chain: #SSLCertificateChainFile /etc/ssl/official/RapidSSL_CA_bundle.pem #SSLCertificateChainFile /etc/ssl/official2/GeoTrust_intermediate_Certificate.pem SSLCertificateChainFile /etc/ssl/official2/COMODORSAAddTrustCA.crt SSLCertificateChainFile /etc/ssl/official2/COMODORSAAddTrustCA.crt - Apache 内での証明書関連の設定(kgb 関連部分) # 20140928 に wiki.hmuna.com --> kgb.hmuna.com 変更に伴い公式の証明書を導入しなおした。 # 導入経緯の説明は wiki に(https://kgb.hmuna.com:443/index.php?HomeServer6) # Server Certificate: SSLCertificateFile /etc/ssl/official2/kgb_hmuna_com.crt # Server Private Key: SSLCertificateKeyFile /etc/ssl/official2/kgb.hmuna.com.privatekey # Server Certificate Chain: SSLCertificateChainFile /etc/ssl/official2/COMODORSAAddTrustCA.crt SSLCertificateChainFile /etc/ssl/official2/COMODORSAAddTrustCA.crt -- &color(red){中間証明書(COMODORSAAddTrustCA.crt)が怪しい、2つ書いてあるのは害は無いだろうが中味が問題}; -- &color(red){良く読み直すと Comodo からは中間証明書が2つ発行されているが、上記設定では2つ目の設定をしようとして正しい2つ目を記載ミスしている?}; -- 修正して relaod SSLCertificateChainFile /etc/ssl/official2/COMODORSAAddTrustCA.crt SSLCertificateChainFile /etc/ssl/official2/COMODORSADomainValidationSecureServerCA.crt - 証明書のインストール状況を確認 munakata@muna-E450:~$ openssl s_client -connect kgb.hmuna.com:443 -showcerts CONNECTED(00000003) depth=2 C = GB, ST = Greater Manchester, L = Salford, O = COMODO CA Limited, CN = COMODO RSA Certification Authority verify return:1 depth=1 C = GB, ST = Greater Manchester, L = Salford, O = COMODO CA Limited, CN = COMODO RSA Domain Validation Secure Server CA verify return:1 depth=0 OU = Domain Control Validated, OU = PositiveSSL, CN = kgb.hmuna.com verify return:1 --- Certificate chain 0 s:/OU=Domain Control Validated/OU=PositiveSSL/CN=kgb.hmuna.com i:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Domain Validation Secure Server CA -----BEGIN CERTIFICATE----- MIIFSzCCBDOgAwIBAgIQcYJE9FtvuWXdFbjiBGinZDANBgkqhkiG9w0BAQsFADCB kDELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4G A1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxNjA0BgNV BAMTLUNPTU9ETyBSU0EgRG9tYWluIFZhbGlkYXRpb24gU2VjdXJlIFNlcnZlciBD QTAeFw0xNDA5MjgwMDAwMDBaFw0xOTA5MjcyMzU5NTlaMFExITAfBgNVBAsTGERv bWFpbiBDb250cm9sIFZhbGlkYXRlZDEUMBIGA1UECxMLUG9zaXRpdmVTU0wxFjAU BgNVBAMTDWtnYi5obXVuYS5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK AoIBAQC32DdmQJafnPCW5v2aJdeJa2qeRGciJA0JrQM252Wdgu3FYL5MoHx+UlTI hPKfbRnU9J7tn3PQpd+DH0SZJqvn0P8FSB7zniu9KqxKvSXLSNfAbSCgq2L4gtfE 6lwcfawZzGBqsp7gOx/NNr41PiekDs0HGxu81F1XY/UNur+pwT73fBNqt44UP15D eofEA2hSc27H2cCNjyQHznrLtV/7vUeACCgIZ07dky43FuYO8yitDDYRUbDT3cyd i6FYxq9keER9QszSQELAy5YRqfhQ7YmY3ig/pRpBrbGxiKlbkBUGMdwL4STrmS8f CUjA8Qmc5d7N1c7gsoG0YfsPYQDlAgMBAAGjggHdMIIB2TAfBgNVHSMEGDAWgBSQ r2o6lFoL2JDqElZz30O0Oija5zAdBgNVHQ4EFgQUaAN3ItWjzbagEM+oI/RGY7Iz IvswDgYDVR0PAQH/BAQDAgWgMAwGA1UdEwEB/wQCMAAwHQYDVR0lBBYwFAYIKwYB BQUHAwEGCCsGAQUFBwMCME8GA1UdIARIMEYwOgYLKwYBBAGyMQECAgcwKzApBggr BgEFBQcCARYdaHR0cHM6Ly9zZWN1cmUuY29tb2RvLmNvbS9DUFMwCAYGZ4EMAQIB MFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly9jcmwuY29tb2RvY2EuY29tL0NPTU9E T1JTQURvbWFpblZhbGlkYXRpb25TZWN1cmVTZXJ2ZXJDQS5jcmwwgYUGCCsGAQUF BwEBBHkwdzBPBggrBgEFBQcwAoZDaHR0cDovL2NydC5jb21vZG9jYS5jb20vQ09N T0RPUlNBRG9tYWluVmFsaWRhdGlvblNlY3VyZVNlcnZlckNBLmNydDAkBggrBgEF BQcwAYYYaHR0cDovL29jc3AuY29tb2RvY2EuY29tMCsGA1UdEQQkMCKCDWtnYi5o bXVuYS5jb22CEXd3dy5rZ2IuaG11bmEuY29tMA0GCSqGSIb3DQEBCwUAA4IBAQBG 5mNUyVvj+9JdjhJNaGTuDVSU4uc2ElRM4IoX1neFQLHRLuhhlIAVfL2QQ1FXaDRa jI6GGtfYsbFG/xuRyneDyAodfqpY/mujOHmfdbPkBBrHBh6VhCRXNDKN8z2vyr4l aJDD2ntj6JGFhjwaStdzxhZgooLHnpx6aLKbtSb3vDHP8TO0SRuTxqFnRwt/h0Hd 2tMd2ZIuU9BgmQxQo1GBVS4UgA7awcO35uBQjfAwL2Di2QWT4eJuVB7B++Bm9OM7 UMSqmRw5z84EZBixrCgUMmwsSK80ssAO3NBRgNNaozGO9udMyO3UXhe4NKsHBB45 r7LeR+PrhM9/UU95ZWzP -----END CERTIFICATE----- 1 s:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Domain Validation Secure Server CA i:/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Certification Authority -----BEGIN CERTIFICATE----- MIIGCDCCA/CgAwIBAgIQKy5u6tl1NmwUim7bo3yMBzANBgkqhkiG9w0BAQwFADCB hTELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4G A1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxKzApBgNV BAMTIkNPTU9ETyBSU0EgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkwHhcNMTQwMjEy MDAwMDAwWhcNMjkwMjExMjM1OTU5WjCBkDELMAkGA1UEBhMCR0IxGzAZBgNVBAgT EkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgGA1UEChMR Q09NT0RPIENBIExpbWl0ZWQxNjA0BgNVBAMTLUNPTU9ETyBSU0EgRG9tYWluIFZh bGlkYXRpb24gU2VjdXJlIFNlcnZlciBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEP ADCCAQoCggEBAI7CAhnhoFmk6zg1jSz9AdDTScBkxwtiBUUWOqigwAwCfx3M28Sh bXcDow+G+eMGnD4LgYqbSRutA776S9uMIO3Vzl5ljj4Nr0zCsLdFXlIvNN5IJGS0 Qa4Al/e+Z96e0HqnU4A7fK31llVvl0cKfIWLIpeNs4TgllfQcBhglo/uLQeTnaG6 ytHNe+nEKpooIZFNb5JPJaXyejXdJtxGpdCsWTWM/06RQ1A/WZMebFEh7lgUq/51 UHg+TLAchhP6a5i84DuUHoVS3AOTJBhuyydRReZw3iVDpA3hSqXttn7IzW3uLh0n c13cRTCAquOyQQuvvUSH2rnlG51/ruWFgqUCAwEAAaOCAWUwggFhMB8GA1UdIwQY MBaAFLuvfgI9+qbxPISOre44mOzZMjLUMB0GA1UdDgQWBBSQr2o6lFoL2JDqElZz 30O0Oija5zAOBgNVHQ8BAf8EBAMCAYYwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNV HSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwGwYDVR0gBBQwEjAGBgRVHSAAMAgG BmeBDAECATBMBgNVHR8ERTBDMEGgP6A9hjtodHRwOi8vY3JsLmNvbW9kb2NhLmNv bS9DT01PRE9SU0FDZXJ0aWZpY2F0aW9uQXV0aG9yaXR5LmNybDBxBggrBgEFBQcB AQRlMGMwOwYIKwYBBQUHMAKGL2h0dHA6Ly9jcnQuY29tb2RvY2EuY29tL0NPTU9E T1JTQUFkZFRydXN0Q0EuY3J0MCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5jb21v ZG9jYS5jb20wDQYJKoZIhvcNAQEMBQADggIBAE4rdk+SHGI2ibp3wScF9BzWRJ2p mj6q1WZmAT7qSeaiNbz69t2Vjpk1mA42GHWx3d1Qcnyu3HeIzg/3kCDKo2cuH1Z/ e+FE6kKVxF0NAVBGFfKBiVlsit2M8RKhjTpCipj4SzR7JzsItG8kO3KdY3RYPBps P0/HEZrIqPW1N+8QRcZs2eBelSaz662jue5/DJpmNXMyYE7l3YphLG5SEXdoltMY dVEVABt0iN3hxzgEQyjpFv3ZBdRdRydg1vs4O2xyopT4Qhrf7W8GjEXCBgCq5Ojc 2bXhc3js9iPc0d1sjhqPpepUfJa3w/5Vjo1JXvxku88+vZbrac2/4EjxYoIQ5QxG V/Iz2tDIY+3GH5QFlkoakdH368+PUq4NCNk+qKBR6cGHdNXJ93SrLlP7u3r7l+L4 HyaPs9Kg4DdbKDsx5Q5XLVq4rXmsXiBmGqW5prU5wfWYQ//u+aen/e7KJD2AFsQX j4rBYKEMrltDR5FL1ZoXX/nUh8HCjLfn4g8wGTeGrODcQgPmlKidrv0PJFGUzpII 0fxQ8ANAe4hZ7Q7drNJ3gjTcBpUC2JD5Leo31Rpg0Gcg19hCC0Wvgmje3WYkN5Ap lBlGGSW4gNfL1IYoakRwJiNiqZ+Gb7+6kHDSVneFeO/qJakXzlByjAA6quPbYzSf +AZxAeKCINT+b72x -----END CERTIFICATE----- --- Server certificate subject=/OU=Domain Control Validated/OU=PositiveSSL/CN=kgb.hmuna.com issuer=/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Domain Validation Secure Server CA --- No client certificate CA names sent Peer signing digest: SHA512 Server Temp Key: ECDH, P-256, 256 bits --- SSL handshake has read 3601 bytes and written 431 bytes --- New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-GCM-SHA384 Server public key is 2048 bit Secure Renegotiation IS supported Compression: NONE Expansion: NONE No ALPN negotiated SSL-Session: Protocol : TLSv1.2 Cipher : ECDHE-RSA-AES256-GCM-SHA384 Session-ID: 7A9F11F070145BD4C77E8B3ABF8034697BE71B290ACB287C4ED3E8053F9223BD Session-ID-ctx: Master-Key: 528FD41DC441663C3ED83D3E9442E260F9526C5C13A699BBBE889CBF3813084E0CFC86BB688492B97915B047C76F6BC7 Key-Arg : None PSK identity: None PSK identity hint: None SRP username: None TLS session ticket lifetime hint: 300 (seconds) TLS session ticket: 0000 - 00 4b 4e 02 87 e4 ec 03-40 34 cd e1 2e 6d 51 33 .KN.....@4...mQ3 0010 - 08 70 b8 07 5c 9f 9c e6-76 d3 57 ed b9 03 30 c3 .p..\...v.W...0. 0020 - 3b 43 29 5c cd f8 f0 f9-fa 4e 0e 39 8e 34 21 e8 ;C)\.....N.9.4!. 0030 - 46 44 74 5a 51 98 76 81-ec 1c af b1 84 76 16 a4 FDtZQ.v......v.. 0040 - e9 09 d4 39 e3 bc f3 85-b6 01 5f 8e b1 fa 2b 2f ...9......_...+/ 0050 - c0 de 25 b9 11 cc c9 53-f5 84 4e 14 47 79 60 a5 ..%....S..N.Gy`. 0060 - f9 75 e6 9f d4 a3 62 7f-a4 ad a9 aa 40 9f 67 78 .u....b.....@.gx 0070 - 7d 6c 06 ee 1b 2c 1d e3-73 71 e7 f8 de 45 89 33 }l...,..sq...E.3 0080 - 86 a6 85 92 03 21 22 f9-7c 07 4e f6 00 31 af a7 .....!".|.N..1.. 0090 - d0 34 ba 93 bc 11 93 02-cd 75 87 a6 20 a0 b9 1a .4.......u.. ... 00a0 - a4 64 6f ba e6 16 9b fb-11 3d ec ff c9 fc 60 02 .do......=....`. 00b0 - 9d 28 5f 79 85 f7 ad 43-2d aa 60 c5 83 f0 f2 23 .(_y...C-.`....# Start Time: 1501092236 Timeout : 300 (sec) Verify return code: 0 (ok) --- *** 証明書の更新 [#ga366933] &color(red){いくつかの PC で kgb.hmuna.com の証明書が失効しているとエラーになる(ならないPCもあるには不思議だが)ので、証明書を新規に1年購入して更新してみる}; - CSR の作成 -- サーバ用秘密鍵 = kgb201707.key -- pass phrase = nanamochahiko - 注文記録 ---- &ref(Namecheap.com Order Summary.eml); - 発行された証明書(以前より中間証明所がシンプルになっている) ---- &ref(kgb_hmuna_com.zip);
テキスト整形のルールを表示する
添付ファイル:
login.jpg
13件
[
詳細
]
ORDER_15187565.eml
20件
[
詳細
]
A Mailserver on Ubuntu 16.pdf
65件
[
詳細
]
kgb_hmuna_com.zip
14件
[
詳細
]
Namecheap.com Order Summary.eml
45件
[
詳細
]
maildb_backup_20170825.sql
13件
[
詳細
]
otp_user_entry.sh
18件
[
詳細
]
admin_list.jpg
11件
[
詳細
]
muna_otp.jpg
18件
[
詳細
]
looksOK.jpg
12件
[
詳細
]