OPNsense decrypt header is used.

This commit is contained in:
Alvaro Sedano 2019-09-13 15:38:43 +02:00 committed by GitHub
parent ba5ff75244
commit 81434d3e5c
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -1,5 +1,5 @@
## pfSense/OPNsense Certificate Viewer ## pfSense/OPNsense Certificate Viewer
Powershell script: pfSense/OPNsense Certificate Viewer Powershell script v1.0.6: pfSense/OPNsense Certificate Viewer
Sometimes it happens in pfSense that certificates are created with Sometimes it happens in pfSense that certificates are created with
duplicated SerialNumbers (in the same CAroot). If any of these certificates duplicated SerialNumbers (in the same CAroot). If any of these certificates
@ -13,7 +13,9 @@ CA roots, server certificates and user certificates will also be displayed.
2019/09/11: New feature: Encrypted XML config files supported. To decrypt the xml files is mandatory a path to openssl.exe. By default this script looks for the openvpn bin folder. 2019/09/11: New feature: Encrypted XML config files supported. To decrypt the xml files is mandatory a path to openssl.exe. By default this script looks for the openvpn bin folder.
Last change 2019/09/13 New feature: Also supports OPNsense backups (both encrypted and unencrypted). 2019/09/13 New feature: Also supports OPNsense backups (both encrypted and unencrypted).
Last change 2019/09/13: The OPNSense decrypt header is used to call openssl.
Thanks to [pippin](https://forum.netgate.com/user/pippin) for show me the links to the pfSense docummented issue: Thanks to [pippin](https://forum.netgate.com/user/pippin) for show me the links to the pfSense docummented issue: