Are you over 18 and want to see adult content?
More Annotations
A complete backup of xn--90aennii1b.xn--p1ai
Are you over 18 and want to see adult content?
A complete backup of reggaetonsinlimite.com
Are you over 18 and want to see adult content?
A complete backup of njworld.wordpress.com
Are you over 18 and want to see adult content?
A complete backup of nationalgallery.sg
Are you over 18 and want to see adult content?
A complete backup of blogdemadagascar.com
Are you over 18 and want to see adult content?
Favourite Annotations
A complete backup of mp-paysagisme.ch
Are you over 18 and want to see adult content?
A complete backup of thestonewallinnnyc.com
Are you over 18 and want to see adult content?
A complete backup of growingproduce.com
Are you over 18 and want to see adult content?
A complete backup of theundercoverrecruiter.com
Are you over 18 and want to see adult content?
A complete backup of 4-fronthospitality.com
Are you over 18 and want to see adult content?
A complete backup of skyscanner.co.kr
Are you over 18 and want to see adult content?
Text
GET HTTPS FOR FREE!
You can now get free https certificates (incuding wildcard certificates) from the non-profit certificate authority Let's Encrypt!This is a website that will take you through the manual steps to get your free https certificate so you can make your own websiteuse https!
GET HTTPS FOR FREE!
You can now get free https certificates (incuding wildcard certificates) from the non-profit certificate authority Let's Encrypt!This is a website that will take you through the manual steps to get your free https certificate so you can make your own websiteuse https!
GET HTTPS FOR FREE!
You can now get free https certificates (incuding wildcard certificates) from the non-profit certificate authority Let's Encrypt!This is a website that will take you through the manual steps to get your free https certificate so you can make your own websiteuse https!
GET HTTPS FOR FREE!
You can now get free https certificates (incuding wildcard certificates) from the non-profit certificate authority Let's Encrypt!This is a website that will take you through the manual steps to get your free https certificate so you can make your own websiteuse https!
GET HTTPS FOR FREE!
You can now get free https certificates (incuding wildcard certificates) from the non-profit certificate authority Let's Encrypt!This is a website that will take you through the manual steps to get your free https certificate so you can make your own websiteuse https!
GET HTTPS FOR FREE!
You can now get free https certificates (incuding wildcard certificates) from the non-profit certificate authority Let's Encrypt!This is a website that will take you through the manual steps to get your free https certificate so you can make your own websiteuse https!
GET HTTPS FOR FREE!
You can now get free https certificates (incuding wildcard certificates) from the non-profit certificate authority Let's Encrypt!This is a website that will take you through the manual steps to get your free https certificate so you can make your own websiteuse https!
GET HTTPS FOR FREE!
You can now get free https certificates (incuding wildcard certificates) from the non-profit certificate authority Let's Encrypt!This is a website that will take you through the manual steps to get your free https certificate so you can make your own websiteuse https!
GET HTTPS FOR FREE!
You can now get free https certificates (incuding wildcard certificates) from the non-profit certificate authority Let's Encrypt!This is a website that will take you through the manual steps to get your free https certificate so you can make your own websiteuse https!
GET HTTPS FOR FREE!
You can now get free https certificates (incuding wildcard certificates) from the non-profit certificate authority Let's Encrypt!This is a website that will take you through the manual steps to get your free https certificate so you can make your own websiteuse https!
GET HTTPS FOR FREE!
You can now get free https certificates (incuding wildcard certificates) from the non-profit certificate authority Let's Encrypt!This is a website that will take you through the manual steps to get your free https certificate so you can make your own websiteuse https!
GET HTTPS FOR FREE!
You can now get free https certificates (incuding wildcard certificates) from the non-profit certificate authority Let's Encrypt!This is a website that will take you through the manual steps to get your free https certificate so you can make your own websiteuse https!
GET HTTPS FOR FREE!
You can now get free https certificates (incuding wildcard certificates) from the non-profit certificate authority Let's Encrypt!This is a website that will take you through the manual steps to get your free https certificate so you can make your own websiteuse https!
GET HTTPS FOR FREE!
You can now get free https certificates (incuding wildcard certificates) from the non-profit certificate authority Let's Encrypt!This is a website that will take you through the manual steps to get your free https certificate so you can make your own websiteuse https!
GET HTTPS FOR FREE!
You can now get free https certificates (incuding wildcard certificates) from the non-profit certificate authority Let's Encrypt!This is a website that will take you through the manual steps to get your free https certificate so you can make your own websiteuse https!
GET HTTPS FOR FREE!
You can now get free https certificates (incuding wildcard certificates) from the non-profit certificate authority Let's Encrypt!This is a website that will take you through the manual steps to get your free https certificate so you can make your own websiteuse https!
GET HTTPS FOR FREE!
You can now get free https certificates (incuding wildcard certificates) from the non-profit certificate authority Let's Encrypt!This is a website that will take you through the manual steps to get your free https certificate so you can make your own websiteuse https!
GET HTTPS FOR FREE!
You can now get free https certificates (incuding wildcard certificates) from the non-profit certificate authority Let's Encrypt!This is a website that will take you through the manual steps to get your free https certificate so you can make your own websiteuse https!
GET HTTPS FOR FREE!
You can now get free https certificates (incuding wildcard certificates) from the non-profit certificate authority Let's Encrypt!This is a website that will take you through the manual steps to get your free https certificate so you can make your own websiteuse https!
GET HTTPS FOR FREE!
You can now get free https certificates (incuding wildcard certificates) from the non-profit certificate authority Let's Encrypt!This is a website that will take you through the manual steps to get your free https certificate so you can make your own websiteuse https!
GET HTTPS FOR FREE!
You can now get free https certificates (incuding wildcard certificates) from the non-profit certificate authority Let's Encrypt!This is a website that will take you through the manual steps to get your free https certificate so you can make your own websiteuse https!
GET HTTPS FOR FREE! UPDATE: ADDED WILDCARD CERTIFICATE SUPPORT! ERROR: YOUR BROWSER IS NOT COMPATIBLE WITH THIS WEBSITE (THIS WEBSITE NEEDS WEBCRYPTOAPI'S CRYPTO.SUBTLE.DIGEST()). PLEASE UPGRADE TO A MODERN BROWSER (FIREFOX, CHROME, SAFARI, EDGE, IE 11+). You can now get free https certificates (incuding wildcard certificates) from the non-profit certificate authority Let's Encrypt ! This is a website that will take you through the manual steps to get your free https certificate so you can make your own website use https! This website is open source and NEVER asks for your private keys. Never trust a website that asks for your private keys! NOTE: THIS WEBSITE IS FOR PEOPLE WHO KNOW HOW TO GENERATE CERTIFICATE SIGNING REQUESTS (CSRS)! If you're not familiar with how to do this, please use the official Let's Encrypt official client that can automatically issue and install https certificates for you. This website is designed for people who know what they are doing and just want to get their freehttps certificate.
If you need to renew a certificate, simply complete these steps belowagain.
------------------------- STEP 1: ACCOUNT INFO Let's Encrypt requires that you register an account email and public key before issuing a certificate. The email is so that they can contact you if needed, and the public key is so you can securely sign your requests to issue/revoke/renew your certificates. _KEEP YOUR ACCOUNT PRIVATE KEY SECRET! Anyone who has it can impersonate you when making requests to Let's Encrypt!_Account Email:
(how do I generate this?) How to generate a new account keypair using openssl: * Generate an account private key if you don't have one: (KEEP ACCOUNT.KEY SECRET!) openssl genrsa 4096 > account.key * Print your public key: openssl rsa -in account.key -pubout * Copy and paste the public key into the box below.Account Public Key:
------------------------- STEP 2: CERTIFICATE SIGNING REQUEST This is the certificate signing request (CSR) that you send to Let's Encrypt in order to issue you a signed certificate. It contains the website domains you want to issue certs for and the public key of your TLS private key. _KEEP YOUR TLS PRIVATE KEY SECRET! Anyone who has it can man-in-the-middle your website!_ (how do I generate this?) How to generate a new Certificate Signing Request (CSR): * Generate a TLS private key if you don't have one: (KEEP DOMAIN.KEY SECRET!) openssl genrsa 4096 > domain.key * Generate a CSR for your the domains you want certs for: (replace "foo.com" with your domain)Linux:
#change "/etc/ssl/openssl.cnf" as needed: # Debian: /etc/ssl/openssl.cnf # RHEL and CentOS: /etc/pki/tls/openssl.cnf # Mac OSX: /System/Library/OpenSSL/openssl.cnf openssl req -new -sha256 -key domain.key -subj "/" \ -reqexts SAN -config <(cat /etc/ssl/openssl.cnf \ <(printf "\n\nsubjectAltName=DNS:foo.com,DNS:www.foo.com")) * Copy and paste the CSR into the box below. Certificate Signing Request: ------------------------- STEP 3: SIGN API REQUESTS (WAITING...) Let's Encrypt requires that you sign all of your requests to them with your account private key. Below are the requests that you will need to sign. The commands to do this are generated below so you can copy-and-paste them into your terminal. _Be sure to change the account private key location so it points to your real private key._(how do I do this?)
This command asks to register your account key (or look it up if you have already registered) and accepts the terms and conditionsfor Let's Encrypt.
How to generate this signature: * Copy and paste the command below into your terminal (if your account private key isn't at "./account.key", change "./account.key" in the command to wherever it exists). * Copy and paste the hex encoded signature output from the command into the text field below that command. Accept the Let's Encrypt terms and conditions:
(how do I do this?)
This command sets your account contact email to what you put in Step 1. If you had already set this email when you ran these commands previously, this command will simply set the same email again. How to generate this signature: * Copy and paste the command below into your terminal (if your account private key isn't at "./account.key", change "./account.key" in the command to wherever it exists). * Copy and paste the hex encoded signature output from the command into the text field below that command. Update your account email (foo@foo.com):(how do I do this?)
This command creates an order for the domains you included in your certificate signing request (CSR) in Step 2. How to generate this signature: * Copy and paste the command below into your terminal (if your account private key isn't at "./account.key", change "./account.key" in the command to wherever it exists). * Copy and paste the hex encoded signature output from the command into the text field below that command. Create your certificate order: ------------------------- STEP 4: VERIFY OWNERSHIP (WAITING...) Let's Encrypt requires you prove you own the domains you have in your CSR. You can do this by serving a specific file at a specific url under your domains. Below are the files you need to serve along with some copy-and-paste commands you can run on your website to start serving the file. Once you are serving the file on your website, click "I'm now running this on...". After that, you need to tell Let's Encrypt to check the above files to verify ownership of your domains. This request needs to be signed with your account private key. Below are the verification requests that you will need to sign. The commands to do this are generated below so you can copy-and-paste them into your terminal. _Be sure to change the account private key location so it points to your real private key._(how do I do this?)
This command requests the challenges you need to complete in order to make sure you control a domain in your certificate order. How to generate this signature: * Copy and paste the command below into your terminal (if your account private key isn't at "./account.key", change "./account.key" in the command to wherever it exists). * Copy and paste the hex encoded signature output from the command into the text field below that command. Load set of challenges (/): _Challenges: not loaded yet_ _Challenges for:_ FOOBAR.COM Option 1 - python server Option 2 - file-based Option 3 - DNS record(how do I do this?)
How to serve the challenge response on your domain: * SSH into your domain as someone with sudo permissions: ssh ubuntu@foobar.com * Stop any webserver running on port 80, if any. If you had previously been running another python command, you can kill it withCtrl+C):
sudo service nginx stop <-- example for nginx sudo apachectl -k graceful-stop <-- example for apache * Copy and paste the python command below into your terminal. This command starts a temporary webserver that serves nothing but the challenge response. You only need to keep this running briefly. * Open the link in a new window to make sure it's working: http://foo.com/.well-known/acme-challenge/aaaaaaaaaaa * Click "I'm now running this command..." button when the file is being served on your domain. Run this command on foobar.com's server:(how do I do this?)
This step tells Let's Encrypt that you're serving the correct data for this challenge on your server. When Let's Encrypt receives this submission, they will make a request to your server to verify you are serving the data correctly. How to generate this signature: * Copy and paste the command below into your terminal (if your account private key isn't at "./account.key", change "./account.key" in the command to wherever it exists). * Copy and paste the hex encoded signature output from the command into the text field below that command. Sign challenge command:(how do I do this?)
This step checks to see if Let's Encrypt has marked the challenge for this domain as complete. How to generate this signature: * Copy and paste the command below into your terminal (if your account private key isn't at "./account.key", change "./account.key" in the command to wherever it exists). * Copy and paste the hex encoded signature output from the command into the text field below that command. Check challenge status command:(how do I do this?)
How to host this file on your server: * SSH into your domain as someone with write access to your staticweb directory:
ssh ubuntu@foobar.com * Create the ".well-known/acme-challenge/" directory in your webserver's static file path: mkdir -p /path/to/www/.well-known/acme-challenge/ * Add the static folder to your webserver's config (if you haven'talready):
server {...
* Create the file with the necessary contents:echo ...
* Open the link in a new window to make sure it's working: http://foo.com/.well-known/acme-challenge/aaaaaaaaaaa * Click "I'm now serving this file..." button when the file is being served on your domain.Under this url:
Serve this content:
(how do I do this?)
This step tells Let's Encrypt that you're serving the correct data for this challenge on your server. When Let's Encrypt receives this submission, they will make a request to your server to verify you are serving the data correctly. How to generate this signature: * Copy and paste the command below into your terminal (if your account private key isn't at "./account.key", change "./account.key" in the command to wherever it exists). * Copy and paste the hex encoded signature output from the command into the text field below that command. Sign challenge command:(how do I do this?)
This step checks to see if Let's Encrypt has marked the challenge for this domain as complete. How to generate this signature: * Copy and paste the command below into your terminal (if your account private key isn't at "./account.key", change "./account.key" in the command to wherever it exists). * Copy and paste the hex encoded signature output from the command into the text field below that command. Check challenge status command:(how do I do this?)
How to set this DNS record: * Log into your domain name provider. * Create a new DNS record on foo.com:Type:
TXT
Name/Host/Alias:
_acme-challenge
Value/Answer/Destination: aaaaaaaaaaaaaaaaaaaaaaTime to Live (TTL):
900
* Wait until the TXT record is being served (this can take a while). dig +short @ns.yournameserver.com _acme_challenge.foo.com TXT * Click "I can see the TXT record..." button when you can see that new TXT record has propagated. Under this DNS domain: Set this TXT record:(how do I do this?)
This step tells Let's Encrypt that you're serving the correct data for this challenge on your server. When Let's Encrypt receives this submission, they will make a request to your server to verify you are serving the data correctly. How to generate this signature: * Copy and paste the command below into your terminal (if your account private key isn't at "./account.key", change "./account.key" in the command to wherever it exists). * Copy and paste the hex encoded signature output from the command into the text field below that command. Sign challenge command:(how do I do this?)
This step checks to see if Let's Encrypt has marked the challenge for this domain as complete. How to generate this signature: * Copy and paste the command below into your terminal (if your account private key isn't at "./account.key", change "./account.key" in the command to wherever it exists). * Copy and paste the hex encoded signature output from the command into the text field below that command. Check challenge status command:(how do I do this?)
This command finalizes your order and tells Let's Encrypt to generate your new certificate. How to generate this signature: * Copy and paste the command below into your terminal (if your account private key isn't at "./account.key", change "./account.key" in the command to wherever it exists). * Copy and paste the hex encoded signature output from the command into the text field below that command. Finalize order and generate certificate:(how do I do this?)
This command checks the certificate status of your order to see if it's been generated yet. How to generate this signature: * Copy and paste the command below into your terminal (if your account private key isn't at "./account.key", change "./account.key" in the command to wherever it exists). * Copy and paste the hex encoded signature output from the command into the text field below that command. Check certificate generation status:(how do I do this?)
This command downloads the final generated certificate. How to generate this signature: * Copy and paste the command below into your terminal (if your account private key isn't at "./account.key", change "./account.key" in the command to wherever it exists). * Copy and paste the hex encoded signature output from the command into the text field below that command. Retrieve the generated certificate: ------------------------- STEP 5: INSTALL CERTIFICATE (WAITING...) Congratulations! Let's Encrypt has issued you a certificate for your domains! Below is the signed certificate you can use for your website. (how do I install this?) Nginx installation instructions: * Copy and paste the below certificates (the text contains both your domain certificate and intermediate certificate) into a text file called "chained.pem". * If not done already, generate non-default dhparams. openssl dhparam -out dhparam.pem 4096 * Copy "chained.pem" and "dhparam.pem" to /etc/ssl/certs/. scp chained.pem root@foo.com:/etc/ssl/certs/chained.pem scp dhparam.pem root@foo.com:/etc/ssl/certs/dhparam.pem * Copy "domain.key" /etc/ssl/private/. scp domain.key root@foo.com:/etc/ssl/private/domain.key * Update your webserver config to use https (examples below).server {
listen 443;
server_name foo.com;ssl on;
ssl_certificate /etc/ssl/certs/chained.pem; ssl_certificate_key /etc/ssl/private/domain.key; ssl_session_timeout 5m; ssl_protocols TLSv1.2; ssl_ciphers ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384; ssl_session_cache shared:SSL:50m; ssl_dhparam /etc/ssl/certs/dhparam.pem; ssl_prefer_server_ciphers on;location / {
return 200 'Hello world!'; add_header Content-Type text/plain;}
}
Apache installation instructions: * Copy and paste the first certificate section (e.g. the first "-----BEGIN CERTIFICATE-----" section) into a text file named"domain.crt".
* Copy and paste the second certificate section (e.g. the second "-----BEGIN CERTIFICATE-----" section) into a text file named"intermediate.pem".
* Copy "domain.crt" and "intermediate.pem" to /etc/ssl/certs/. scp domain.crt root@foo.com:/etc/ssl/certs/domain.crt scp intermediate.pem root@foo.com:/etc/ssl/certs/intermediate.pem * Copy "domain.key" /etc/ssl/private/. scp domain.key root@foo.com:/etc/ssl/private/domain.key * Update your webserver config to use https (examples below).SSLEngine on
SSLCertificateFile /etc/ssl/certs/domain.crt SSLCertificateKeyFile /etc/ssl/private/domain.key SSLCertificateChainFile /etc/ssl/certs/intermediate.pem SSLProtocol TLSv1.2 SSLCipherSuite ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384 SSLHonorCipherOrder onAllowOverride All
Order allow,deny
allow from all
Details
Copyright © 2024 ArchiveBay.com. All rights reserved. Terms of Use | Privacy Policy | DMCA | 2021 | Feedback | Advertising | RSS 2.0