4,461
edits
add get local ip address from cli |
Get server certificate fingerprint |
||
Line 62: | Line 62: | ||
$ hostname -I | awk '{print $1}' | $ hostname -I | awk '{print $1}' | ||
192.168.86.21 | 192.168.86.21 | ||
</source> | |||
== Get server certificate fingerprint == | |||
<source lang="console"> | |||
$ gnutls-cli --insecure vpn.server.edu | |||
Processed 0 CA certificate(s). | |||
Resolving 'vpn.server.edu'... | |||
Connecting to '129.24.220.45:443'... | |||
- Certificate type: X.509 | |||
- Got a certificate list of 1 certificates. | |||
- Certificate[0] info: | |||
- subject `C=US,postalCode=12331,ST=VA,L=Springfield,street=1 University of Muchakan,O=University of Muchakan,OU=IT,CN=vpn.server.edu', issuer `C=US,ST=MI,L=Ann Arbor,O=Internet2,OU=InCommon,CN=InCommon RSA Server CA', RSA key 2048 bits, signed using RSA-SHA256, activated `2019-04-04 00:00:00 UTC', expires `2020-04-03 23:59:59 UTC', SHA-1 fingerprint `9521c4b9db51e376a9527ca38d46925e09e171f1' | |||
Public Key ID: | |||
4390f7806426e1db181442a4b31dfe2887fb5b33 | |||
Public key's random art: | |||
+--[ RSA 2048]----+ | |||
| o+ =+=o | | |||
| . + +o.o | | |||
|o . o ..o | | |||
| = . = . . | | |||
|. o o . S | | |||
| . o . | | |||
|o o o | | |||
| + oE | | |||
|..o... | | |||
+-----------------+ | |||
- Status: The certificate is NOT trusted. The certificate issuer is unknown. | |||
*** PKI verification of server certificate failed... | |||
- Description: (TLS1.2)-(RSA)-(AES-128-CBC)-(SHA256) | |||
- Session ID: BB:02:45:FF:1D:DB:E9:D3:25:FF:BA:80:8B:45:01:FF:27:04:26:41:50:A8:9D:9A:E6:62:C8:0F:50:4D:85:9B | |||
- Version: TLS1.2 | |||
- Key Exchange: RSA | |||
- Cipher: AES-128-CBC | |||
- MAC: SHA256 | |||
- Compression: NULL | |||
- Options: safe renegotiation, | |||
- Handshake was completed | |||
- Simple Client Mode: | |||
^C | |||
$ | |||
</source> | </source> |