[158358] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: juniper vpn

daemon@ATHENA.MIT.EDU (Edward Dore)
Wed Nov 28 17:04:17 2012

From: Edward Dore <edward.dore@freethought-internet.co.uk>
Date: Wed, 28 Nov 2012 22:03:47 +0000
In-Reply-To: <50B67FFF.1030205@mompl.net>
To: NANOG mailing list <nanog@nanog.org>
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

Assuming that it's a binary DER encoded x509 certificate, you can use =
OpenSSL to convert it to a base64 encoded PEM certificate with:

openssl x509 -inform DER -in <file> -outform PEM -out <file>

Edward Dore=20
Freethought Internet=20

On 28 Nov 2012, at 21:19, Jeroen van Aart wrote:

> On 11/27/2012 07:27 PM, Owen DeLong wrote:
>> Do you want one for IPSEC or for the SSL VPN Appliance that Juniper =
is pushing nowadays?
>=20
> I just checked, the script i am looking at calls the ncscv tool which =
I believe is made by juniper? It needs amongst other things an ssl =
certificate. So I presume it's using the latter.
>=20
> This tool/script did download a certificate, however it appears to be =
a binary file, not the usual plain text file. Is there a way to retrieve =
the plaintext one or extract it from the binary file? Using "file" =
identifies it as a data file.
>=20
> Thanks,
> Jeroen
>=20
> --=20
> Earthquake Magnitude: 4.8
> Date: Wednesday, November 28, 2012 18:05:30 UTC
> Location: Catamarca, Argentina
> Latitude: -27.8486; Longitude: -66.4048
> Depth: 154.40 km
>=20


home help back first fref pref prev next nref lref last post