Aggiornamento certificato STS VMware vCenter | GOLINE
Goline Logo

FAQ

News

  • Route RPKI validation April 1st, 2022
    RPKI is a security framework by which network owners can validate and secure the critical route updates or Border Gateway Protocol (BGP) announcements between public Internet networks. BGP is essentially the central nervous system of the Internet and one of its fundamental building blocks. The main function of BGP is to facilitate efficient routing between Autonomous Systems (AS), by building and maintaining the Internet routing table. The Internet routing table is effectively the navigation system of the Internet and without it, traffic would be unable to flow between its constituent networks. Unfortunately, routing equipment alone cannot distinguish between legitimate and malicious routing announcements,...
  • RIPE – Atlas Anchor February 17th, 2022
    We have become an even more integral part of the RIPE Atlas project by hosting an anchor, a device that allows for latency analysis of traffic between autonomous systems.https://atlas.ripe.net/probes/7073/RIPE Atlas anchors play an integral role in the RIPE Atlas network by acting both as enhanced RIPE Atlas probes with more measurement capacity, as well as regional measurement targets within the greater RIPE Atlas network. Anchors are able to perform many more measurements than a regular RIPE Atlas probe, and the large amount of data they collect is made available to everyone. In addition, anchors act as powerful targets that can...
  • MANRS June 20th, 2020
    GOLINE firmly believes in initiatives to protect networks, improve security and resilience of the global routing system. Therefore we decided to support the MANRS project and join as participants.Mutually Agreed Norms for Routing Security (MANRS) is a global initiative, supported by the Internet Society, that provides crucial fixes to reduce the most common routing threats. MANRS offers specific actions via four programs for Network Operators, Internet Exchange Points, CDN and Cloud Providers, and Equipment Vendors. Requirements for Participation Please read the full MANRS Actions document before applying. You can become a participant if you meet these requirements: You (or your company) support...

Aggiornamento certificato STS VMware vCenter

Potoms Omar VMware 30 March 2023

1- Collegarsi in SSH con utenza di root sulla VCSA
2- Creare una nuova folder in root con il seguente comando:

Cd /root
mkdir newsts_dd.mm.yyyy
cd /root/newsts_dd.mm.yyyy

3- Copiare template precedentemente configurato (se presente) col seguente comando
cp /usr/lib/wmware-vmca/share/config/certool.cfg /root/newsts_dd.mm.yyyy

4- Nel caso il template non fosse mai stato creato, generare un nuovo file con il seguente comando

touch certool.cfg

5- Compilare file certool.cfg, inserendo i dati aziendali necessari

vi certool.cfg

6- Creare le chiavi privata e pubblica eseguendo il seguente comando:

/usr/lib/vmware-vmca/bin/certool –server localhost –genkey –privkey=/root/newsts_dd.mm.yyyy/sts.key –pubkey=/root/newsts_dd.mm.yyyy/sts.pub

7- Eseguire "ls -l" per verificare la creazione dei file sts.key e sts.pub

8- Generare il certificato .cer lanciando il seguente comando

/usr/lib/vmware-vmca/bin/certool –gencert –cert=/root/newsts_dd.mm.yyyy/newsts.cer –privkey=/root/newsts_dd.mm.yyyy/sts.key –config=/root/newsts_dd.mm.yyyy/certool.cfg

9- Eseguire "ls -l" per verificare la creazione del file newsts.cer

10- Convertire il certificato .cer in formato PK12

openssl pkcs12 -export -in /root/newsts_dd.mm.yyyy/newsts.cer -inkey /root/newsts_dd.mm.yyyy/sts.key -certfile /var/lib/vmware/vmca/root.cer -name "newstssigning" -passout pass:Inserireunapassword -out newsts.p12

11- Eseguire "ls -l" per verificare la creazione del file newsts.p12

12- convertire il certificato pk12 in PEM, il primo comando serve per creare un file chain.pem, il secondo per creare un file key.pem

openssl pkcs12 -in newsts.p12 -nokeys -out newsts_chain.pem
openssl pkcs12 -in newsts.p12 -nodes -nocerts -out newsts_key.pem

13- Controllare che il file newsts_key.pem inizia e termina come il seguente esempio:

—–BEGIN PRIVATE KEY—–
—–END PRIVATE KEY—–

Nel caso non lo fosse, lanciare il seguente comando:

openssl rsa -in newsts_key.pem -check -out newsts_key_rsa.pem

14- Aprire con un notepad i 2 file appena generati

15- Incollare il contenuto del file newsts_key.pem (o newsts_key_rsa.pem nel caso di modifiche) in fondo al contenuto del file newsts_chain.pem (vedi esempi seguenti)



File newsts_chain.pem + newsts_key.pem

16- Salvare il file combinato in newsts.pem

17- Aprire da web vSphere con utenza di root
18- Caricare il certificato newsts.pem nella tab Administrator –> Certificate Management

19- Premere Import and replace certificate e indicare il file newsts.pem

0 0 votes
Article Rating
Subscribe
Notify of
0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x