OPNsense decrypt header is used.

This commit is contained in:
Alvaro Sedano 2019-09-13 15:38:43 +02:00 committed by GitHub
parent ba5ff75244
commit 81434d3e5c
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -1,5 +1,5 @@
## pfSense/OPNsense Certificate Viewer
Powershell script: pfSense/OPNsense Certificate Viewer
Powershell script v1.0.6: pfSense/OPNsense Certificate Viewer
Sometimes it happens in pfSense that certificates are created with
duplicated SerialNumbers (in the same CAroot). If any of these certificates
@ -13,7 +13,9 @@ CA roots, server certificates and user certificates will also be displayed.
2019/09/11: New feature: Encrypted XML config files supported. To decrypt the xml files is mandatory a path to openssl.exe. By default this script looks for the openvpn bin folder.
Last change 2019/09/13 New feature: Also supports OPNsense backups (both encrypted and unencrypted).
2019/09/13 New feature: Also supports OPNsense backups (both encrypted and unencrypted).
Last change 2019/09/13: The OPNSense decrypt header is used to call openssl.
Thanks to [pippin](https://forum.netgate.com/user/pippin) for show me the links to the pfSense docummented issue: