diff --git a/.etckeeper b/.etckeeper index 18a57ff..5f8e30b 100755 --- a/.etckeeper +++ b/.etckeeper @@ -383,6 +383,7 @@ maybe chmod 0644 'crowdsec/hub/scenarios/crowdsecurity/CVE-2022-42889.yaml' maybe chmod 0644 'crowdsec/hub/scenarios/crowdsecurity/CVE-2022-44877.yaml' maybe chmod 0644 'crowdsec/hub/scenarios/crowdsecurity/CVE-2022-46169.yaml' maybe chmod 0644 'crowdsec/hub/scenarios/crowdsecurity/CVE-2023-22515.yaml' +maybe chmod 0644 'crowdsec/hub/scenarios/crowdsecurity/CVE-2023-22518.yaml' maybe chmod 0644 'crowdsec/hub/scenarios/crowdsecurity/apache_log4j2_cve-2021-44228.yaml' maybe chmod 0644 'crowdsec/hub/scenarios/crowdsecurity/f5-big-ip-cve-2020-5902.yaml' maybe chmod 0644 'crowdsec/hub/scenarios/crowdsecurity/fortinet-cve-2018-13379.yaml' @@ -1582,6 +1583,7 @@ maybe chmod 0644 'letsencrypt/archive/mail.898.ro/cert12.pem' maybe chmod 0640 'letsencrypt/archive/mail.898.ro/cert13.pem' maybe chmod 0644 'letsencrypt/archive/mail.898.ro/cert14.pem' maybe chmod 0644 'letsencrypt/archive/mail.898.ro/cert15.pem' +maybe chmod 0644 'letsencrypt/archive/mail.898.ro/cert16.pem' maybe chmod 0640 'letsencrypt/archive/mail.898.ro/cert2.pem' maybe chmod 0640 'letsencrypt/archive/mail.898.ro/cert3.pem' maybe chmod 0640 'letsencrypt/archive/mail.898.ro/cert4.pem' @@ -1597,6 +1599,7 @@ maybe chmod 0644 'letsencrypt/archive/mail.898.ro/chain12.pem' maybe chmod 0640 'letsencrypt/archive/mail.898.ro/chain13.pem' maybe chmod 0644 'letsencrypt/archive/mail.898.ro/chain14.pem' maybe chmod 0644 'letsencrypt/archive/mail.898.ro/chain15.pem' +maybe chmod 0644 'letsencrypt/archive/mail.898.ro/chain16.pem' maybe chmod 0640 'letsencrypt/archive/mail.898.ro/chain2.pem' maybe chmod 0640 'letsencrypt/archive/mail.898.ro/chain3.pem' maybe chmod 0640 'letsencrypt/archive/mail.898.ro/chain4.pem' @@ -1612,6 +1615,7 @@ maybe chmod 0644 'letsencrypt/archive/mail.898.ro/fullchain12.pem' maybe chmod 0640 'letsencrypt/archive/mail.898.ro/fullchain13.pem' maybe chmod 0644 'letsencrypt/archive/mail.898.ro/fullchain14.pem' maybe chmod 0644 'letsencrypt/archive/mail.898.ro/fullchain15.pem' +maybe chmod 0644 'letsencrypt/archive/mail.898.ro/fullchain16.pem' maybe chmod 0640 'letsencrypt/archive/mail.898.ro/fullchain2.pem' maybe chmod 0640 'letsencrypt/archive/mail.898.ro/fullchain3.pem' maybe chmod 0640 'letsencrypt/archive/mail.898.ro/fullchain4.pem' @@ -1627,6 +1631,7 @@ maybe chmod 0600 'letsencrypt/archive/mail.898.ro/privkey12.pem' maybe chmod 0600 'letsencrypt/archive/mail.898.ro/privkey13.pem' maybe chmod 0600 'letsencrypt/archive/mail.898.ro/privkey14.pem' maybe chmod 0600 'letsencrypt/archive/mail.898.ro/privkey15.pem' +maybe chmod 0600 'letsencrypt/archive/mail.898.ro/privkey16.pem' maybe chmod 0600 'letsencrypt/archive/mail.898.ro/privkey2.pem' maybe chmod 0600 'letsencrypt/archive/mail.898.ro/privkey3.pem' maybe chmod 0600 'letsencrypt/archive/mail.898.ro/privkey4.pem' @@ -1644,6 +1649,7 @@ maybe chmod 0644 'letsencrypt/archive/mail.anywhere.ro/cert13.pem' maybe chmod 0640 'letsencrypt/archive/mail.anywhere.ro/cert14.pem' maybe chmod 0644 'letsencrypt/archive/mail.anywhere.ro/cert15.pem' maybe chmod 0644 'letsencrypt/archive/mail.anywhere.ro/cert16.pem' +maybe chmod 0644 'letsencrypt/archive/mail.anywhere.ro/cert17.pem' maybe chmod 0644 'letsencrypt/archive/mail.anywhere.ro/cert2.pem' maybe chmod 0640 'letsencrypt/archive/mail.anywhere.ro/cert3.pem' maybe chmod 0640 'letsencrypt/archive/mail.anywhere.ro/cert4.pem' @@ -1660,6 +1666,7 @@ maybe chmod 0644 'letsencrypt/archive/mail.anywhere.ro/chain13.pem' maybe chmod 0640 'letsencrypt/archive/mail.anywhere.ro/chain14.pem' maybe chmod 0644 'letsencrypt/archive/mail.anywhere.ro/chain15.pem' maybe chmod 0644 'letsencrypt/archive/mail.anywhere.ro/chain16.pem' +maybe chmod 0644 'letsencrypt/archive/mail.anywhere.ro/chain17.pem' maybe chmod 0644 'letsencrypt/archive/mail.anywhere.ro/chain2.pem' maybe chmod 0640 'letsencrypt/archive/mail.anywhere.ro/chain3.pem' maybe chmod 0640 'letsencrypt/archive/mail.anywhere.ro/chain4.pem' @@ -1676,6 +1683,7 @@ maybe chmod 0644 'letsencrypt/archive/mail.anywhere.ro/fullchain13.pem' maybe chmod 0640 'letsencrypt/archive/mail.anywhere.ro/fullchain14.pem' maybe chmod 0644 'letsencrypt/archive/mail.anywhere.ro/fullchain15.pem' maybe chmod 0644 'letsencrypt/archive/mail.anywhere.ro/fullchain16.pem' +maybe chmod 0644 'letsencrypt/archive/mail.anywhere.ro/fullchain17.pem' maybe chmod 0644 'letsencrypt/archive/mail.anywhere.ro/fullchain2.pem' maybe chmod 0640 'letsencrypt/archive/mail.anywhere.ro/fullchain3.pem' maybe chmod 0640 'letsencrypt/archive/mail.anywhere.ro/fullchain4.pem' @@ -1692,6 +1700,7 @@ maybe chmod 0600 'letsencrypt/archive/mail.anywhere.ro/privkey13.pem' maybe chmod 0600 'letsencrypt/archive/mail.anywhere.ro/privkey14.pem' maybe chmod 0600 'letsencrypt/archive/mail.anywhere.ro/privkey15.pem' maybe chmod 0600 'letsencrypt/archive/mail.anywhere.ro/privkey16.pem' +maybe chmod 0600 'letsencrypt/archive/mail.anywhere.ro/privkey17.pem' maybe chmod 0600 'letsencrypt/archive/mail.anywhere.ro/privkey2.pem' maybe chmod 0600 'letsencrypt/archive/mail.anywhere.ro/privkey3.pem' maybe chmod 0600 'letsencrypt/archive/mail.anywhere.ro/privkey4.pem' @@ -2808,6 +2817,8 @@ maybe chmod 0640 'letsencrypt/csr/0542_csr-certbot.pem' maybe chmod 0640 'letsencrypt/csr/0543_csr-certbot.pem' maybe chmod 0640 'letsencrypt/csr/0544_csr-certbot.pem' maybe chmod 0640 'letsencrypt/csr/0545_csr-certbot.pem' +maybe chmod 0644 'letsencrypt/csr/0546_csr-certbot.pem' +maybe chmod 0644 'letsencrypt/csr/0547_csr-certbot.pem' maybe chown 'setroubleshoot' 'letsencrypt/keys' maybe chgrp 'setroubleshoot' 'letsencrypt/keys' maybe chmod 0700 'letsencrypt/keys' @@ -3389,6 +3400,8 @@ maybe chmod 0600 'letsencrypt/keys/0542_key-certbot.pem' maybe chmod 0600 'letsencrypt/keys/0543_key-certbot.pem' maybe chmod 0600 'letsencrypt/keys/0544_key-certbot.pem' maybe chmod 0600 'letsencrypt/keys/0545_key-certbot.pem' +maybe chmod 0600 'letsencrypt/keys/0546_key-certbot.pem' +maybe chmod 0600 'letsencrypt/keys/0547_key-certbot.pem' maybe chown 'setroubleshoot' 'letsencrypt/live' maybe chgrp 'setroubleshoot' 'letsencrypt/live' maybe chmod 0700 'letsencrypt/live' @@ -4081,6 +4094,14 @@ maybe chgrp 'mock' 'mock/eol/opensuse-leap-15.2-aarch64.cfg' maybe chmod 0644 'mock/eol/opensuse-leap-15.2-aarch64.cfg' maybe chgrp 'mock' 'mock/eol/opensuse-leap-15.2-x86_64.cfg' maybe chmod 0644 'mock/eol/opensuse-leap-15.2-x86_64.cfg' +maybe chgrp 'mock' 'mock/eol/opensuse-leap-15.3-aarch64.cfg' +maybe chmod 0644 'mock/eol/opensuse-leap-15.3-aarch64.cfg' +maybe chgrp 'mock' 'mock/eol/opensuse-leap-15.3-ppc64le.cfg' +maybe chmod 0644 'mock/eol/opensuse-leap-15.3-ppc64le.cfg' +maybe chgrp 'mock' 'mock/eol/opensuse-leap-15.3-s390x.cfg' +maybe chmod 0644 'mock/eol/opensuse-leap-15.3-s390x.cfg' +maybe chgrp 'mock' 'mock/eol/opensuse-leap-15.3-x86_64.cfg' +maybe chmod 0644 'mock/eol/opensuse-leap-15.3-x86_64.cfg' maybe chgrp 'mock' 'mock/eol/rhel-6-x86_64.cfg' maybe chmod 0644 'mock/eol/rhel-6-x86_64.cfg' maybe chmod 0755 'mock/eol/templates' @@ -4100,6 +4121,8 @@ maybe chgrp 'mock' 'mock/eol/templates/mageia-6.tpl' maybe chmod 0644 'mock/eol/templates/mageia-6.tpl' maybe chgrp 'mock' 'mock/eol/templates/openmandriva-4.0.tpl' maybe chmod 0644 'mock/eol/templates/openmandriva-4.0.tpl' +maybe chgrp 'mock' 'mock/eol/templates/opensuse-leap-15.3.tpl' +maybe chmod 0644 'mock/eol/templates/opensuse-leap-15.3.tpl' maybe chgrp 'mock' 'mock/eol/templates/rhel-6.tpl' maybe chmod 0644 'mock/eol/templates/rhel-6.tpl' maybe chgrp 'mock' 'mock/eurolinux-8-aarch64.cfg' @@ -4181,6 +4204,14 @@ maybe chgrp 'mock' 'mock/mageia-8-i586.cfg' maybe chmod 0644 'mock/mageia-8-i586.cfg' maybe chgrp 'mock' 'mock/mageia-8-x86_64.cfg' maybe chmod 0644 'mock/mageia-8-x86_64.cfg' +maybe chgrp 'mock' 'mock/mageia-9-aarch64.cfg' +maybe chmod 0644 'mock/mageia-9-aarch64.cfg' +maybe chgrp 'mock' 'mock/mageia-9-armv7hl.cfg' +maybe chmod 0644 'mock/mageia-9-armv7hl.cfg' +maybe chgrp 'mock' 'mock/mageia-9-i586.cfg' +maybe chmod 0644 'mock/mageia-9-i586.cfg' +maybe chgrp 'mock' 'mock/mageia-9-x86_64.cfg' +maybe chmod 0644 'mock/mageia-9-x86_64.cfg' maybe chgrp 'mock' 'mock/mageia-cauldron-aarch64.cfg' maybe chmod 0644 'mock/mageia-cauldron-aarch64.cfg' maybe chgrp 'mock' 'mock/mageia-cauldron-armv7hl.cfg' @@ -4223,14 +4254,6 @@ maybe chgrp 'mock' 'mock/openmandriva-rolling-i686.cfg' maybe chmod 0644 'mock/openmandriva-rolling-i686.cfg' maybe chgrp 'mock' 'mock/openmandriva-rolling-x86_64.cfg' maybe chmod 0644 'mock/openmandriva-rolling-x86_64.cfg' -maybe chgrp 'mock' 'mock/opensuse-leap-15.3-aarch64.cfg' -maybe chmod 0644 'mock/opensuse-leap-15.3-aarch64.cfg' -maybe chgrp 'mock' 'mock/opensuse-leap-15.3-ppc64le.cfg' -maybe chmod 0644 'mock/opensuse-leap-15.3-ppc64le.cfg' -maybe chgrp 'mock' 'mock/opensuse-leap-15.3-s390x.cfg' -maybe chmod 0644 'mock/opensuse-leap-15.3-s390x.cfg' -maybe chgrp 'mock' 'mock/opensuse-leap-15.3-x86_64.cfg' -maybe chmod 0644 'mock/opensuse-leap-15.3-x86_64.cfg' maybe chgrp 'mock' 'mock/opensuse-leap-15.4-aarch64.cfg' maybe chmod 0644 'mock/opensuse-leap-15.4-aarch64.cfg' maybe chgrp 'mock' 'mock/opensuse-leap-15.4-ppc64le.cfg' @@ -4239,6 +4262,14 @@ maybe chgrp 'mock' 'mock/opensuse-leap-15.4-s390x.cfg' maybe chmod 0644 'mock/opensuse-leap-15.4-s390x.cfg' maybe chgrp 'mock' 'mock/opensuse-leap-15.4-x86_64.cfg' maybe chmod 0644 'mock/opensuse-leap-15.4-x86_64.cfg' +maybe chgrp 'mock' 'mock/opensuse-leap-15.5-aarch64.cfg' +maybe chmod 0644 'mock/opensuse-leap-15.5-aarch64.cfg' +maybe chgrp 'mock' 'mock/opensuse-leap-15.5-ppc64le.cfg' +maybe chmod 0644 'mock/opensuse-leap-15.5-ppc64le.cfg' +maybe chgrp 'mock' 'mock/opensuse-leap-15.5-s390x.cfg' +maybe chmod 0644 'mock/opensuse-leap-15.5-s390x.cfg' +maybe chgrp 'mock' 'mock/opensuse-leap-15.5-x86_64.cfg' +maybe chmod 0644 'mock/opensuse-leap-15.5-x86_64.cfg' maybe chgrp 'mock' 'mock/opensuse-tumbleweed-aarch64.cfg' maybe chmod 0644 'mock/opensuse-tumbleweed-aarch64.cfg' maybe chgrp 'mock' 'mock/opensuse-tumbleweed-i586.cfg' @@ -4404,10 +4435,10 @@ maybe chgrp 'mock' 'mock/templates/openmandriva-cooker.tpl' maybe chmod 0644 'mock/templates/openmandriva-cooker.tpl' maybe chgrp 'mock' 'mock/templates/openmandriva-rolling.tpl' maybe chmod 0644 'mock/templates/openmandriva-rolling.tpl' -maybe chgrp 'mock' 'mock/templates/opensuse-leap-15.3.tpl' -maybe chmod 0644 'mock/templates/opensuse-leap-15.3.tpl' maybe chgrp 'mock' 'mock/templates/opensuse-leap-15.4.tpl' maybe chmod 0644 'mock/templates/opensuse-leap-15.4.tpl' +maybe chgrp 'mock' 'mock/templates/opensuse-leap-15.5.tpl' +maybe chmod 0644 'mock/templates/opensuse-leap-15.5.tpl' maybe chgrp 'mock' 'mock/templates/opensuse-tumbleweed.tpl' maybe chmod 0644 'mock/templates/opensuse-tumbleweed.tpl' maybe chgrp 'mock' 'mock/templates/oraclelinux-7.tpl' diff --git a/crowdsec/hub/.index.json b/crowdsec/hub/.index.json index e934bb5..80b720b 100644 --- a/crowdsec/hub/.index.json +++ b/crowdsec/hub/.index.json @@ -1009,7 +1009,7 @@ }, "crowdsecurity/http-cve": { "path": "collections/crowdsecurity/http-cve.yaml", - "version": "2.3", + "version": "2.4", "versions": { "0.1": { "digest": "30748e051a470c1bc91506ae63e8784cd054564f90ccc23eb655823fc30e3019", @@ -1102,10 +1102,14 @@ "2.3": { "digest": "00e148cb998efbf5668391f2971ec39ee3c2bcc8e0e6c952fe436709678abf72", "deprecated": false + }, + "2.4": { + "digest": "9a1288c042d53f81c16653efae7084bbb83e56cec8a6eade98c702e2febb8d4e", + "deprecated": false } }, - "long_description": "CgpBIGNvbGxlY3Rpb24gdG8gZGV0ZWN0IGV4cGxvaXRhdGlvbiBvZiBzb21lIHNwZWNpZmljIGh0dHAgQ1ZFcy4KCldvcmtzIHdpdGggW2FwYWNoZTJdKGh0dHBzOi8vaHViLmNyb3dkc2VjLm5ldC9hdXRob3IvY3Jvd2RzZWN1cml0eS9jb2xsZWN0aW9ucy9hcGFjaGUyKSwgW25naW54XShodHRwczovL2h1Yi5jcm93ZHNlYy5uZXQvYXV0aG9yL2Nyb3dkc2VjdXJpdHkvY29sbGVjdGlvbnMvbmdpbngpLCBbdHJhZWZpa10oaHR0cHM6Ly9odWIuY3Jvd2RzZWMubmV0L2F1dGhvci9jcm93ZHNlY3VyaXR5L2NvbGxlY3Rpb25zL3RyYWVmaWspIGV0Yy4KCjp3YXJuaW5nOiBXaGlsZSB0aGlzIGNvbGxlY3Rpb24gaXMgZnJlcXVlbnRseSB1cGRhdGVkIHdpdGggdHJlbmRpbmcgQ1ZFcywgaXQgaXMgX25vdF8gYSBXQUYgYW5kIGRvZXMgX25vdF8gYWltcyBhdCByZXBsYWNpbmcgYSBXQUYuIEFzIHN1Y2gsIGFuIGF0dGFja2VyIG1pZ2h0IGJlIGFibGUgdG8gYnlwYXNzIHRob3NlIHNpZ25hdHVyZXMuCgogLSBbQXBhY2hlIENWRS0yMDIxLTQxNzczXShodHRwczovL2N2ZS5jaXJjbC5sdS9jdmUvQ1ZFLTIwMjEtNDE3NzMpCiAtIFtBcGFjaGUgQ1ZFLTIwMjEtNDIwMTNdKGh0dHBzOi8vY3ZlLmNpcmNsLmx1L2N2ZS9DVkUtMjAyMS00MjAxMykKIC0gW0dyYWZhbmEgQ1ZFLTIwMjEtNDM3OThdKGh0dHBzOi8vY3ZlLmNpcmNsLmx1L2N2ZS9DVkUtMjAyMS00Mzc5OCkKIC0gW0ZvcnRpbmV0IENWRS0yMDE4LTEzMzc5XShodHRwczovL2N2ZS5jaXJjbC5sdS9jdmUvQ1ZFLTIwMTgtMTMzNzkpCiAtIFtQdWxzZSBTZWN1cmUgQ1ZFLTIwMTktMTE1MTBdKGh0dHBzOi8vY3ZlLmNpcmNsLmx1L2N2ZS9DVkUtMjAxOS0xMTUxMCkKIC0gW0Y1IEJJRy1JUCBDVkUtMjAyMC01OTAyXShodHRwczovL2N2ZS5jaXJjbC5sdS9jdmUvQ1ZFLTIwMjAtNTkwMikKIC0gW1RoaW5rUEhQIENWRS0yMDE4LTIwMDYyXShodHRwczovL2N2ZS5jaXJjbC5sdS9jdmUvQ1ZFLTIwMTgtMjAwNjIpCiAtIFtBcGFjaGUgTG9nNGoyIENWRS0yMDIxLTQ0MjI4XShodHRwczovL2N2ZS5jaXJjbC5sdS9jdmUvQ1ZFLTIwMjEtNDQyMjgpCiAtIFtWTXdhcmUgVk1TQS0yMDIxLTAwMjddKGh0dHBzOi8vd3d3LnZtd2FyZS5jb20vc2VjdXJpdHkvYWR2aXNvcmllcy9WTVNBLTIwMjEtMDAyNy5odG1sKQogLSBbQXRsYXNzaWFuIEppcmEgQ1ZFLTIwMjEtMjYwODZdKGh0dHBzOi8vY3ZlLmNpcmNsLmx1L2N2ZS9DVkUtMjAyMS0yNjA4NikKIC0gW1NwcmluZzRTaGVsbCBDVkUtMjAyMi0yMjk2NV0oaHR0cHM6Ly9jdmUubWl0cmUub3JnL2NnaS1iaW4vY3ZlbmFtZS5jZ2k/bmFtZT1DVkUtMjAyMi0yMjk2NSkKIC0gW1ZNd2FyZSBDVkUtMjAyMi0yMjk1NF0oaHR0cHM6Ly93d3cudm13YXJlLmNvbS9zZWN1cml0eS9hZHZpc29yaWVzL1ZNU0EtMjAyMi0wMDExLmh0bWwpCiAtIFtaaW1icmEgQ1ZFLTIwMjItMzcwNDJdKGh0dHBzOi8vbnZkLm5pc3QuZ292L3Z1bG4vZGV0YWlsL0NWRS0yMDIyLTM3MDQyKQogLSBbTWljcm9zb2Z0IEV4Y2hhbmdlIENWRS0yMDIyLTQxMDgyXShodHRwczovL252ZC5uaXN0Lmdvdi92dWxuL2RldGFpbC9DVkUtMjAyMi00MTA4MikKIC0gW0dMUEkgQ1ZFLTIwMjItMzU5MTRdKGh0dHBzOi8vbnZkLm5pc3QuZ292L3Z1bG4vZGV0YWlsL0NWRS0yMDIyLTM1OTE0KQogLSBbRm9ydGluZXQgQ1ZFLTIwMjItNDA2ODRdKGh0dHBzOi8vd3d3Lmhvcml6b24zLmFpL2ZvcnRpb3MtZm9ydGlwcm94eS1hbmQtZm9ydGlzd2l0Y2htYW5hZ2VyLWF1dGhlbnRpY2F0aW9uLWJ5cGFzcy10ZWNobmljYWwtZGVlcC1kaXZlLWN2ZS0yMDIyLTQwNjg0LykKIC0gW0NvbmZsdWVuY2UgQ1ZFLTIwMjItMjYxMzRdKGh0dHBzOi8vY3ZlLm1pdHJlLm9yZy9jZ2ktYmluL2N2ZW5hbWUuY2dpP25hbWU9Q1ZFLTIwMjItMjYxMzQpCiAtIFtUZXh0NFNoZWxsIENWRS0yMDIyLTQyODg5XShodHRwczovL2N2ZS5taXRyZS5vcmcvY2dpLWJpbi9jdmVuYW1lLmNnaT9uYW1lPUNWRS0yMDIyLTQyODg5KQogLSBbR2hvc3QgQ01TIENWRS0yMDIyLTQxNjk3XShodHRwczovL252ZC5uaXN0Lmdvdi92dWxuL2RldGFpbC9DVkUtMjAyMi00MTY5NykKIC0gW0NhY3RpIENWRS0yMDIyLTQ2MTY5XShodHRwczovL252ZC5uaXN0Lmdvdi92dWxuL2RldGFpbC9DVkUtMjAyMi00NjE2OSkKIC0gW0NlbnRvcyBXZWIgUGFuZWwgNyBDVkUtMjAyMi00NDg3N10oaHR0cHM6Ly9udmQubmlzdC5nb3YvdnVsbi9kZXRhaWwvQ1ZFLTIwMjItNDQ4NzcpCiAtIFtUZWxlcmlrIFVJIENWRS0yMDE5LTE4OTM1XShodHRwczovL2N2ZS5taXRyZS5vcmcvY2dpLWJpbi9jdmVuYW1lLmNnaT9uYW1lPUNWRS0yMDE5LTE4OTM1KQogLSBbTmV0Z2VhciBER04xMDAwIC8gREdOMjIwMCBSZW1vdGUgQ29tbWFuZCBFeGVjdXRpb25dKGh0dHBzOi8vd3d3LmV4cGxvaXQtZGIuY29tL2V4cGxvaXRzLzI1OTc4KQogLSBbQ29uZmx1ZW5jZSBDVkUtMjAyMy0yMjUxNV0oaHR0cHM6Ly9jb25mbHVlbmNlLmF0bGFzc2lhbi5jb20vc2VjdXJpdHkvY3ZlLTIwMjMtMjI1MTUtcHJpdmlsZWdlLWVzY2FsYXRpb24tdnVsbmVyYWJpbGl0eS1pbi1jb25mbHVlbmNlLWRhdGEtY2VudGVyLWFuZC1zZXJ2ZXItMTI5NTY4MjI3Ni5odG1sKQoKCgoKCg==", - "content": "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", + "long_description": "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", + "content": "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", "description": "Detect CVE exploitation in http logs", "author": "crowdsecurity", "labels": null, @@ -1133,7 +1137,8 @@ "crowdsecurity/CVE-2022-44877", "crowdsecurity/CVE-2019-18935", "crowdsecurity/netgear_rce", - "crowdsecurity/CVE-2023-22515" + "crowdsecurity/CVE-2023-22515", + "crowdsecurity/CVE-2023-22518" ] }, "crowdsecurity/http-dos": { @@ -1638,6 +1643,52 @@ "crowdsecurity/palo-alto-threat" ] }, + "crowdsecurity/pfsense": { + "path": "collections/crowdsecurity/pfsense.yaml", + "version": "0.2", + "versions": { + "0.1": { + "digest": "b0e0d8b751b34cc9d63268169a51849182039aa17ea78093a80da9d302756b97", + "deprecated": false + }, + "0.2": { + "digest": "cc77813340e5e49379dcae520d2da5b2d5b9451eca6cbe7f5a68b6f9ad302d75", + "deprecated": false + } + }, + "long_description": "IyMgcGZTZW5zZSBjb2xsZWN0aW9uCgpUaGlzIHBmU2Vuc2UgY29sbGVjdGlvbiBzdXBwb3J0cyA6CiAtIHNzaCBwYXJzZXJzICYgYnJ1dGVmb3JjZSBkZXRlY3Rpb24KIC0gd2ViIGF1dGhlbnRpY2F0aW9uIGJydXRlZm9yY2UgZGV0ZWN0aW9uCiAtIHBvcnQgc2NhbiBkZXRlY3Rpb24K", + "content": "Y29sbGVjdGlvbnM6CiAgLSBjcm93ZHNlY3VyaXR5L2ZyZWVic2QKICAtIGNyb3dkc2VjdXJpdHkvcGZzZW5zZS1ndWkKICAtIGNyb3dkc2VjdXJpdHkvbmdpbngKICAtIGZpcmV3YWxsc2VydmljZXMvcGYKZGVzY3JpcHRpb246ICJjb3JlIHBmc2Vuc2Ugc3VwcG9ydCIKYXV0aG9yOiBjcm93ZHNlY3VyaXR5CnRhZ3M6CiAgLSBmcmVlYnNkCg==", + "description": "core pfsense support", + "author": "crowdsecurity", + "labels": null, + "collections": [ + "crowdsecurity/freebsd", + "crowdsecurity/pfsense-gui", + "crowdsecurity/nginx", + "firewallservices/pf" + ] + }, + "crowdsecurity/pfsense-gui": { + "path": "collections/crowdsecurity/pfsense-gui.yaml", + "version": "0.1", + "versions": { + "0.1": { + "digest": "5e3c9d329eb515265634bcb8684180c2df2d01431273b6d1a9123e972109f408", + "deprecated": false + } + }, + "long_description": "IyMgcGZTZW5zZSB3ZWIgYXV0aGVudGljYXRpb24gY29sbGVjdGlvbgoKU3VwcG9ydCB0byBkZXRlY3QgYnJ1dGVmb3JjZSBvbiB0aGUgcGZTZW5zZSB3ZWIgcG9ydGFsCg==", + "content": "cGFyc2VyczoKICAtIGNyb3dkc2VjdXJpdHkvcGZzZW5zZS1ndWktbG9ncwpzY2VuYXJpb3M6CiAgLSBjcm93ZHNlY3VyaXR5L3Bmc2Vuc2UtZ3VpLWJmCmRlc2NyaXB0aW9uOiAicGZTZW5zZSB3ZWIgYXV0aGVudGljYXRpb24gc3VwcG9ydCIKYXV0aG9yOiBjcm93ZHNlY3VyaXR5CnRhZ3M6CiAgLSBmcmVlYnNkCiAgLSBwZnNlbnNlCiAgLSBicnV0ZWZvcmNlCiAgLSBzY2FuCg==", + "description": "pfSense web authentication support", + "author": "crowdsecurity", + "labels": null, + "parsers": [ + "crowdsecurity/pfsense-gui-logs" + ], + "scenarios": [ + "crowdsecurity/pfsense-gui-bf" + ] + }, "crowdsecurity/pgsql": { "path": "collections/crowdsecurity/pgsql.yaml", "version": "0.1", @@ -3949,7 +4000,7 @@ "crowdsecurity/mssql-logs": { "path": "parsers/s01-parse/crowdsecurity/mssql-logs.yaml", "stage": "s01-parse", - "version": "0.2", + "version": "0.3", "versions": { "0.1": { "digest": "9c99578104a9158ada41bb8dd920575a83d494e6f6e2d166eb5773fb4d7023b1", @@ -3958,10 +4009,14 @@ "0.2": { "digest": "2c39d0c3f1cf4124d5e3cc113c733b2ef220522d01706b5434382240de10b147", "deprecated": false + }, + "0.3": { + "digest": "b9dc0a3b53d5e1ad6eeae3e1beb04d01afe62111e80d5871b77caee2e7172cfd", + "deprecated": false } }, "long_description": "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", - "content": "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", + "content": "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", "description": "Parse mssql logs", "author": "crowdsecurity", "labels": null @@ -4233,6 +4288,22 @@ "author": "crowdsecurity", "labels": null }, + "crowdsecurity/pfsense-gui-logs": { + "path": "parsers/s01-parse/crowdsecurity/pfsense-gui-logs.yaml", + "stage": "s01-parse", + "version": "0.1", + "versions": { + "0.1": { + "digest": "0e759d86c5244f6593c6ba58f18d59ad1fac1fe9cc2f127053f229d4851f57f4", + "deprecated": false + } + }, + "long_description": "IyMgcGZTZW5zZSB3ZWIgYXV0aGVudGljYXRpb24gcGFyc2VyCgpBIHBhcnNlciBmb3IgcGZTZW5zZSB3ZWIgYXV0aGVudGljYXRpb24gKGZhaWxlZCkgbG9ncy4KVGhvc2UgbG9ncyBhcmUgdXN1YWxseSBwcmVzZW50IGluIGAvdmFyL2xvZy9hdXRoLmxvZ2AuCgo=", + "content": "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", + "description": "Parse pfSense web auth logs", + "author": "crowdsecurity", + "labels": null + }, "crowdsecurity/pgsql-logs": { "path": "parsers/s01-parse/crowdsecurity/pgsql-logs.yaml", "stage": "s01-parse", @@ -6641,6 +6712,38 @@ "type": "exploit" } }, + "crowdsecurity/CVE-2023-22518": { + "path": "scenarios/crowdsecurity/CVE-2023-22518.yaml", + "version": "0.2", + "versions": { + "0.1": { + "digest": "f597bf30acce708e51d463f358b5ed5840133b907df8ab8a8358565b0e506a85", + "deprecated": false + }, + "0.2": { + "digest": "e1634f917d0008561fee2191e0988eecf4629941275e74246836f03d790d0b3b", + "deprecated": false + } + }, + "long_description": "IyMgQ1ZFLTIwMjMtMjI1MTgKClRyaWdnZXIgZXhwbG9pdHMgb2YgQ1ZFLTIwMjMtMjI1MTggQXRsYXNzaWFuIENvbmZsdWVuY2UgU2VydmVyIEltcHJvcGVyIEF1dGhvcml6YXRpb24gdGhhdCBsZWFkcyB0byBBdXRoZW50aWNhdGlvbiBCeXBhc3MKCgpSZWZlcmVuY2VzOiAKKiBodHRwczovL252ZC5uaXN0Lmdvdi92dWxuL2RldGFpbC9DVkUtMjAyMy0yMjUxOAoqIGh0dHBzOi8vYmxvZy5wcm9qZWN0ZGlzY292ZXJ5LmlvL2F0bGFzc2lhbi1jb25mbHVlbmNlLWF1dGgtYnlwYXNzLw==", + "content": "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", + "description": "Detect CVE-2023-22518 exploits", + "author": "crowdsecurity", + "labels": { + "behavior": "http:exploit", + "classification": [ + "attack.T1595", + "attack.T1190", + "cve.CVE-2023-22518" + ], + "confidence": 1, + "label": "Atlassian Confluence Server CVE-2023-22518", + "remediation": true, + "service": "Atlassian Confluence", + "spoofable": 0, + "type": "exploit" + } + }, "crowdsecurity/CVE-2023-23397": { "path": "scenarios/crowdsecurity/CVE-2023-23397.yaml", "version": "0.2", @@ -9651,7 +9754,7 @@ }, "crowdsecurity/opnsense-gui-bf": { "path": "scenarios/crowdsecurity/opnsense-gui-bf.yaml", - "version": "0.2", + "version": "0.3", "versions": { "0.1": { "digest": "15f0d4f03f1e18a8cd5d95467a13e86ebfd717354f53ba02b4d165e6537965bf", @@ -9660,10 +9763,14 @@ "0.2": { "digest": "c1031635c18c69203a1e251d25da8f309182ed04221142e94e3a2ff1d8533af3", "deprecated": false + }, + "0.3": { + "digest": "5f06456ab0875a8245a6863775ccfe215f3d8a38da562dbcb9de97756aea188a", + "deprecated": false } }, "long_description": "IyMgT1BOU2Vuc2Ugd2ViIHBvcnRhbCBicnV0ZWZvcmNlIGRldGVjdGlvbgoKRGV0ZWN0cyBicnV0ZWZvcmNlIGF0dGVtcHRzIG9uIHRoZSBPUE5TZW5zZSB3ZWIgcG9ydGFsIDoKIC0gbW9yZSB0aGFuIDUgYXR0ZW1wdHMKIC0gMTAgc2Vjb25kcyBiZXR3ZWVuIGVhY2gKCgo=", - "content": "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", + "content": "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", "description": "Detect bruteforce on opnsense web interface", "author": "crowdsecurity", "labels": { @@ -9672,7 +9779,7 @@ "attack.T1110" ], "confidence": 3, - "label": "Opnsense GUI Bruteforce", + "label": "OPNsense GUI Bruteforce", "remediation": true, "service": "opnsense", "spoofable": 0 @@ -9695,6 +9802,35 @@ "remediation": true } }, + "crowdsecurity/pfsense-gui-bf": { + "path": "scenarios/crowdsecurity/pfsense-gui-bf.yaml", + "version": "0.2", + "versions": { + "0.1": { + "digest": "b23ed9edafd3b8cea053d4286abfc2513d53c54904e7348b4fc1bf24e9e3a77d", + "deprecated": false + }, + "0.2": { + "digest": "07019c43c3bbd31e077d12c85aea855332e6891db2605bae00a481dacf17826f", + "deprecated": false + } + }, + "long_description": "IyMgcGZTZW5zZSB3ZWIgcG9ydGFsIGJydXRlZm9yY2UgZGV0ZWN0aW9uCgpEZXRlY3RzIGJydXRlZm9yY2UgYXR0ZW1wdHMgb24gdGhlIHBmU2Vuc2Ugd2ViIHBvcnRhbCA6CiAtIG1vcmUgdGhhbiA1IGF0dGVtcHRzCiAtIDEwIHNlY29uZHMgYmV0d2VlbiBlYWNoCgoK", + "content": "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", + "description": "Detect bruteforce on pfsense web interface", + "author": "crowdsecurity", + "labels": { + "behavior": "http:bruteforce", + "classification": [ + "attack.T1110" + ], + "confidence": 3, + "label": "pfSense GUI Bruteforce", + "remediation": true, + "service": "pfsense", + "spoofable": 0 + } + }, "crowdsecurity/pgsql-bf": { "path": "scenarios/crowdsecurity/pgsql-bf.yaml", "version": "0.2", @@ -9943,7 +10079,7 @@ }, "crowdsecurity/ssh-bf": { "path": "scenarios/crowdsecurity/ssh-bf.yaml", - "version": "0.2", + "version": "0.3", "versions": { "0.1": { "digest": "4441dcff07020f6690d998b7101e642359ba405c2abb83565bbbdcee36de280f", @@ -9952,10 +10088,14 @@ "0.2": { "digest": "94b1d6f04e9119ea1adb7fc70017fd108cede97bddbaf50b0b2bebdcc887ea28", "deprecated": false + }, + "0.3": { + "digest": "242f36684d66bbae3044e576b7cfffef62d5323465f3f74f87923167c6d93356", + "deprecated": false } }, "long_description": "RGV0ZWN0IGZhaWxlZCBzc2ggYXV0aGVudGljYXRpb25zIDoKCiAtIGxlYWtzcGVlZCBvZiAxMHMsIGNhcGFjaXR5IG9mIDUgb24gc2FtZSB0YXJnZXQgdXNlcgogLSBsZWFrc3BlZWQgb2YgMTBzLCBjYXBhY2l0eSBvZiA1IHVuaXF1ZSBkaXN0aW5jdCB1c2VycwogCg==", - "content": "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", + "content": "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", "description": "Detect ssh bruteforce", "author": "crowdsecurity", "references": [ @@ -9975,7 +10115,7 @@ }, "crowdsecurity/ssh-slow-bf": { "path": "scenarios/crowdsecurity/ssh-slow-bf.yaml", - "version": "0.3", + "version": "0.4", "versions": { "0.1": { "digest": "1b910bf7af59dab8dfbba8a735aafb3e4871d1237b29d56f53d7c0eece0381cf", @@ -9988,10 +10128,14 @@ "0.3": { "digest": "313b1dc11a05f8beb6718cdeefe79866122eca26394efe2b814d5d2e15c28f4d", "deprecated": false + }, + "0.4": { + "digest": "892f9a153c4dafb5392ba40d70616e88896571be8f4cc00996e7f5e8277c869e", + "deprecated": false } }, "long_description": "RGV0ZWN0IHNsb3cgc3NoIGJydXRlZm9yY2UgYXV0aGVudGljYXRpb25zIDoKCiAtIGxlYWtzcGVlZCBvZiA2MHMsIGNhcGFjaXR5IG9mIDEwIG9uIHNhbWUgdGFyZ2V0IHVzZXIKIC0gbGVha3NwZWVkIG9mIDYwcywgY2FwYWNpdHkgb2YgMTAgdW5pcXVlIGRpc3RpbmN0IHVzZXJzCiAK", - "content": "IyBzc2ggYnJ1dGVmb3JjZQp0eXBlOiBsZWFreQpuYW1lOiBjcm93ZHNlY3VyaXR5L3NzaC1zbG93LWJmCmRlc2NyaXB0aW9uOiAiRGV0ZWN0IHNsb3cgc3NoIGJydXRlZm9yY2UiCmZpbHRlcjogImV2dC5NZXRhLmxvZ190eXBlID09ICdzc2hfZmFpbGVkLWF1dGgnIgpsZWFrc3BlZWQ6ICI2MHMiCnJlZmVyZW5jZXM6CiAgLSBodHRwOi8vd2lraXBlZGlhLmNvbS9zc2gtYmYtaXMtYmFkCmNhcGFjaXR5OiAxMApncm91cGJ5OiBldnQuTWV0YS5zb3VyY2VfaXAKYmxhY2tob2xlOiAxbQpyZXByb2Nlc3M6IHRydWUKbGFiZWxzOgogIHNlcnZpY2U6IHNzaAogIHJlbWVkaWF0aW9uOiB0cnVlCiAgY29uZmlkZW5jZTogMwogIHNwb29mYWJsZTogMAogIGNsYXNzaWZpY2F0aW9uOgogICAgLSBhdHRhY2suVDExMTAKICBiZWhhdmlvcjogInNzaDpicnV0ZWZvcmNlIgogIGxhYmVsOiAiU1NIIEJydXRlZm9yY2UiCi0tLQojIHNzaCB1c2VyLWVudW0KdHlwZTogbGVha3kKbmFtZTogY3Jvd2RzZWN1cml0eS9zc2gtc2xvdy1iZl91c2VyLWVudW0KZGVzY3JpcHRpb246ICJEZXRlY3Qgc2xvdyBzc2ggdXNlciBlbnVtIGJydXRlZm9yY2UiCmZpbHRlcjogZXZ0Lk1ldGEubG9nX3R5cGUgPT0gJ3NzaF9mYWlsZWQtYXV0aCcKZ3JvdXBieTogZXZ0Lk1ldGEuc291cmNlX2lwCmRpc3RpbmN0OiBldnQuTWV0YS50YXJnZXRfdXNlcgpsZWFrc3BlZWQ6IDYwcwpjYXBhY2l0eTogMTAKYmxhY2tob2xlOiAxbQpsYWJlbHM6CiAgc2VydmljZTogc3NoCiAgcmVtZWRpYXRpb246IHRydWUKICBjb25maWRlbmNlOiAzCiAgc3Bvb2ZhYmxlOiAwCiAgY2xhc3NpZmljYXRpb246CiAgICAtIGF0dGFjay5UMTExMAogIGJlaGF2aW9yOiAic3NoOmJydXRlZm9yY2UiCiAgbGFiZWw6ICJTU0ggQnJ1dGVmb3JjZSIK", + "content": "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", "description": "Detect slow ssh bruteforce", "author": "crowdsecurity", "references": [ @@ -10003,7 +10147,7 @@ "attack.T1110" ], "confidence": 3, - "label": "SSH Bruteforce", + "label": "SSH Slow Bruteforce", "remediation": true, "service": "ssh", "spoofable": 0 diff --git a/crowdsec/hub/collections/crowdsecurity/http-cve.yaml b/crowdsec/hub/collections/crowdsecurity/http-cve.yaml index 9807935..754081b 100644 --- a/crowdsec/hub/collections/crowdsecurity/http-cve.yaml +++ b/crowdsec/hub/collections/crowdsecurity/http-cve.yaml @@ -23,6 +23,7 @@ scenarios: - crowdsecurity/CVE-2019-18935 - crowdsecurity/netgear_rce - crowdsecurity/CVE-2023-22515 + - crowdsecurity/CVE-2023-22518 author: crowdsecurity description: "Detect CVE exploitation in http logs" tags: diff --git a/crowdsec/hub/scenarios/crowdsecurity/CVE-2023-22518.yaml b/crowdsec/hub/scenarios/crowdsecurity/CVE-2023-22518.yaml new file mode 100644 index 0000000..19bf39b --- /dev/null +++ b/crowdsec/hub/scenarios/crowdsecurity/CVE-2023-22518.yaml @@ -0,0 +1,21 @@ +type: trigger +#debug: true +name: crowdsecurity/CVE-2023-22518 +description: "Detect CVE-2023-22518 exploits" +filter: | + Upper(evt.Meta.http_path) contains Upper('/json/setup-restore.action') && + Upper(evt.Parsed.verb) == 'POST' +blackhole: 1m +groupby: "evt.Meta.source_ip" +labels: + type: exploit + remediation: true + classification: + - attack.T1595 + - attack.T1190 + - cve.CVE-2023-22518 + spoofable: 0 + confidence: 1 + behavior: "http:exploit" + label: "Atlassian Confluence Server CVE-2023-22518" + service: Atlassian Confluence \ No newline at end of file diff --git a/crowdsec/hub/scenarios/crowdsecurity/ssh-bf.yaml b/crowdsec/hub/scenarios/crowdsecurity/ssh-bf.yaml index 84fab8c..0cb67f3 100644 --- a/crowdsec/hub/scenarios/crowdsecurity/ssh-bf.yaml +++ b/crowdsec/hub/scenarios/crowdsecurity/ssh-bf.yaml @@ -38,4 +38,4 @@ labels: classification: - attack.T1589 behavior: "ssh:bruteforce" - label: "SSH Bruteforce" + label: "SSH User Enumeration" diff --git a/crowdsec/hub/scenarios/crowdsecurity/ssh-slow-bf.yaml b/crowdsec/hub/scenarios/crowdsecurity/ssh-slow-bf.yaml index af3ba74..53c8967 100644 --- a/crowdsec/hub/scenarios/crowdsecurity/ssh-slow-bf.yaml +++ b/crowdsec/hub/scenarios/crowdsecurity/ssh-slow-bf.yaml @@ -18,7 +18,7 @@ labels: classification: - attack.T1110 behavior: "ssh:bruteforce" - label: "SSH Bruteforce" + label: "SSH Slow Bruteforce" --- # ssh user-enum type: leaky @@ -38,4 +38,4 @@ labels: classification: - attack.T1110 behavior: "ssh:bruteforce" - label: "SSH Bruteforce" + label: "SSH Slow User Enumeration" diff --git a/crowdsec/notifications/email.yaml b/crowdsec/notifications/email.yaml index 37ce2a9..512633c 100644 --- a/crowdsec/notifications/email.yaml +++ b/crowdsec/notifications/email.yaml @@ -15,12 +15,14 @@ timeout: 20s # Time to wait for response from the plugin before conside # The following template receives a list of models.Alert objects # The output goes in the email message body format: | +
{{range . -}} {{$alert := . -}} {{range .Decisions -}} -{{.Value}} will get {{.Type}} for next {{.Duration}} for triggering {{.Scenario}} on machine {{$alert.MachineID}}.
+{{.Value}} will get {{.Type}} for next {{.Duration}} for triggering {{.Scenario}} on machine {{$alert.MachineID}}.
{{end -}} {{end -}} + smtp_host: # example: smtp.gmail.com smtp_username: # Replace with your actual username @@ -35,7 +37,15 @@ receiver_emails: # - email2@gmail.com # One of "ssltls", "starttls", "none" -encryption_type: ssltls +encryption_type: "ssltls" + +# If you need to set the HELO hostname: +# helo_host: "localhost" + +# If the email server is hitting the default timeouts (10 seconds), you can increase them here +# +# connect_timeout: 10s +# send_timeout: 10s --- diff --git a/crowdsec/scenarios/CVE-2023-22518.yaml b/crowdsec/scenarios/CVE-2023-22518.yaml new file mode 120000 index 0000000..873318c --- /dev/null +++ b/crowdsec/scenarios/CVE-2023-22518.yaml @@ -0,0 +1 @@ +/etc/crowdsec/hub/scenarios/crowdsecurity/CVE-2023-22518.yaml \ No newline at end of file diff --git a/letsencrypt/archive/mail.898.ro/cert16.pem b/letsencrypt/archive/mail.898.ro/cert16.pem new file mode 100644 index 0000000..91106f7 --- /dev/null +++ b/letsencrypt/archive/mail.898.ro/cert16.pem @@ -0,0 +1,29 @@ +-----BEGIN CERTIFICATE----- +MIIE4jCCA8qgAwIBAgISA0799qGcVKerTdJdLp1OWeX2MA0GCSqGSIb3DQEBCwUA +MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD +EwJSMzAeFw0yMzExMTEyMTAwNTBaFw0yNDAyMDkyMTAwNDlaMBYxFDASBgNVBAMT +C21haWwuODk4LnJvMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA1ETM +6tFY32CnacrwKRdrFEVdVh7PUYhlZbd8DZJ5nF+zVav6DEk8I++mF+kPz2G9IPJU +JZ718GiJ3evKqUWeZ4sDYWS0bdLz/JhcScb//akhu2V0sL1IKfm5yl0FcmRu6gN1 +HDMJDj0Pmil+CmogB0QKVxOUETW1sIropAaQRkfmNyXXw1s9hajsQquGrNAvE2Da +AS5JEBxCse+bonjo6eke9HYKlDEoK6nkgyIiB23HkxRauRX9Y4WUAKS3OqJ2PUAi +OZV//bncZoGecKc3g/pVYqge3ctIMMT38x4MtxEtxk8dsfLgJEludekk2Wlk4i9r +9E1y8CgHjcC1AUCFMwIDAQABo4ICDDCCAggwDgYDVR0PAQH/BAQDAgWgMB0GA1Ud +JQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQW +BBRql+bTdtFFQtoKZWX0zGSfK42qFzAfBgNVHSMEGDAWgBQULrMXt1hWy65QCUDm +H6+dixTCxjBVBggrBgEFBQcBAQRJMEcwIQYIKwYBBQUHMAGGFWh0dHA6Ly9yMy5v +LmxlbmNyLm9yZzAiBggrBgEFBQcwAoYWaHR0cDovL3IzLmkubGVuY3Iub3JnLzAW +BgNVHREEDzANggttYWlsLjg5OC5ybzATBgNVHSAEDDAKMAgGBmeBDAECATCCAQMG +CisGAQQB1nkCBAIEgfQEgfEA7wB2AEiw42vapkc0D+VqAvqdMOscUgHLVt0sgdm7 +v6s52IRzAAABi8Bm440AAAQDAEcwRQIgNAIX/xiAU2kHaUbkyyoOfYyqMQHlsuf6 +DZbCpFD8K50CIQCnPGXAQ8890znq0LTefRfVGDntxlFV1cVwlxTIGil4DQB1ADtT +d3U+LbmAToswWwb+QDtn2E/D9Me9AA0tcm/h+tQXAAABi8Bm45YAAAQDAEYwRAIg +Pe4y6RAveoyeO21K7DVHAiLIE9t/0XsoWIv/td2th4kCIFAGNnl9gAEmgRoxxqkb +cAiJT/rQE4aQfu5Ytmqg7/SSMA0GCSqGSIb3DQEBCwUAA4IBAQB5o+h7aMk0lJvG +m+zZSa6S66w1AmpoeS58njgfYmZIiuZP0TdMnTgaO6q6wgYpyzvVAlawsp6MhsZ2 +JuCr/XzrtThXQFU0N5mrRUMqQjT5eVFRzbdtXsvyylUyd2B9O/bydq6nk9XXW26L +GntuxpDJU25CfK02NdOx1JFXG7fhuS8VFsQIHM2KUJ6D/MoVXmUeggR5+VaX27pB +hmZOqkIu71bu9LAdjhnYJIVkmmQBAj+bDcCp5z2eUp4SPvo8Ax/UeJO7zVbjzcm7 +RuFh7M38Zii0Ax2gs02hlayHvRUNnaUUyxuHUCbzGlf1zwvW5HsrmBVpaer3SaOY +j+uwUjaA +-----END CERTIFICATE----- diff --git a/letsencrypt/archive/mail.898.ro/chain16.pem b/letsencrypt/archive/mail.898.ro/chain16.pem new file mode 100644 index 0000000..43b222a --- /dev/null +++ b/letsencrypt/archive/mail.898.ro/chain16.pem @@ -0,0 +1,30 @@ +-----BEGIN CERTIFICATE----- +MIIFFjCCAv6gAwIBAgIRAJErCErPDBinU/bWLiWnX1owDQYJKoZIhvcNAQELBQAw +TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh +cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMjAwOTA0MDAwMDAw +WhcNMjUwOTE1MTYwMDAwWjAyMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNTGV0J3Mg +RW5jcnlwdDELMAkGA1UEAxMCUjMwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK +AoIBAQC7AhUozPaglNMPEuyNVZLD+ILxmaZ6QoinXSaqtSu5xUyxr45r+XXIo9cP +R5QUVTVXjJ6oojkZ9YI8QqlObvU7wy7bjcCwXPNZOOftz2nwWgsbvsCUJCWH+jdx +sxPnHKzhm+/b5DtFUkWWqcFTzjTIUu61ru2P3mBw4qVUq7ZtDpelQDRrK9O8Zutm +NHz6a4uPVymZ+DAXXbpyb/uBxa3Shlg9F8fnCbvxK/eG3MHacV3URuPMrSXBiLxg +Z3Vms/EY96Jc5lP/Ooi2R6X/ExjqmAl3P51T+c8B5fWmcBcUr2Ok/5mzk53cU6cG +/kiFHaFpriV1uxPMUgP17VGhi9sVAgMBAAGjggEIMIIBBDAOBgNVHQ8BAf8EBAMC +AYYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMBMBIGA1UdEwEB/wQIMAYB +Af8CAQAwHQYDVR0OBBYEFBQusxe3WFbLrlAJQOYfr52LFMLGMB8GA1UdIwQYMBaA +FHm0WeZ7tuXkAXOACIjIGlj26ZtuMDIGCCsGAQUFBwEBBCYwJDAiBggrBgEFBQcw +AoYWaHR0cDovL3gxLmkubGVuY3Iub3JnLzAnBgNVHR8EIDAeMBygGqAYhhZodHRw +Oi8veDEuYy5sZW5jci5vcmcvMCIGA1UdIAQbMBkwCAYGZ4EMAQIBMA0GCysGAQQB +gt8TAQEBMA0GCSqGSIb3DQEBCwUAA4ICAQCFyk5HPqP3hUSFvNVneLKYY611TR6W +PTNlclQtgaDqw+34IL9fzLdwALduO/ZelN7kIJ+m74uyA+eitRY8kc607TkC53wl +ikfmZW4/RvTZ8M6UK+5UzhK8jCdLuMGYL6KvzXGRSgi3yLgjewQtCPkIVz6D2QQz +CkcheAmCJ8MqyJu5zlzyZMjAvnnAT45tRAxekrsu94sQ4egdRCnbWSDtY7kh+BIm +lJNXoB1lBMEKIq4QDUOXoRgffuDghje1WrG9ML+Hbisq/yFOGwXD9RiX8F6sw6W4 +avAuvDszue5L3sz85K+EC4Y/wFVDNvZo4TYXao6Z0f+lQKc0t8DQYzk1OXVu8rp2 +yJMC6alLbBfODALZvYH7n7do1AZls4I9d1P4jnkDrQoxB3UqQ9hVl3LEKQ73xF1O +yK5GhDDX8oVfGKF5u+decIsH4YaTw7mP3GFxJSqv3+0lUFJoi5Lc5da149p90Ids +hCExroL1+7mryIkXPeFM5TgO9r0rvZaBFOvV2z0gp35Z0+L4WPlbuEjN/lxPFin+ +HlUjr8gRsI3qfJOQFy/9rKIJR0Y/8Omwt/8oTWgy1mdeHmmjk7j1nYsvC9JSQ6Zv +MldlTTKB3zhThV1+XWYp6rjd5JW1zbVWEkLNxE7GJThEUG3szgBVGP7pSWTUTsqX +nLRbwHOoq7hHwg== +-----END CERTIFICATE----- diff --git a/letsencrypt/archive/mail.898.ro/fullchain16.pem b/letsencrypt/archive/mail.898.ro/fullchain16.pem new file mode 100644 index 0000000..b65ae53 --- /dev/null +++ b/letsencrypt/archive/mail.898.ro/fullchain16.pem @@ -0,0 +1,59 @@ +-----BEGIN CERTIFICATE----- +MIIE4jCCA8qgAwIBAgISA0799qGcVKerTdJdLp1OWeX2MA0GCSqGSIb3DQEBCwUA +MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD +EwJSMzAeFw0yMzExMTEyMTAwNTBaFw0yNDAyMDkyMTAwNDlaMBYxFDASBgNVBAMT +C21haWwuODk4LnJvMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA1ETM +6tFY32CnacrwKRdrFEVdVh7PUYhlZbd8DZJ5nF+zVav6DEk8I++mF+kPz2G9IPJU +JZ718GiJ3evKqUWeZ4sDYWS0bdLz/JhcScb//akhu2V0sL1IKfm5yl0FcmRu6gN1 +HDMJDj0Pmil+CmogB0QKVxOUETW1sIropAaQRkfmNyXXw1s9hajsQquGrNAvE2Da +AS5JEBxCse+bonjo6eke9HYKlDEoK6nkgyIiB23HkxRauRX9Y4WUAKS3OqJ2PUAi +OZV//bncZoGecKc3g/pVYqge3ctIMMT38x4MtxEtxk8dsfLgJEludekk2Wlk4i9r +9E1y8CgHjcC1AUCFMwIDAQABo4ICDDCCAggwDgYDVR0PAQH/BAQDAgWgMB0GA1Ud +JQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjAMBgNVHRMBAf8EAjAAMB0GA1UdDgQW +BBRql+bTdtFFQtoKZWX0zGSfK42qFzAfBgNVHSMEGDAWgBQULrMXt1hWy65QCUDm +H6+dixTCxjBVBggrBgEFBQcBAQRJMEcwIQYIKwYBBQUHMAGGFWh0dHA6Ly9yMy5v +LmxlbmNyLm9yZzAiBggrBgEFBQcwAoYWaHR0cDovL3IzLmkubGVuY3Iub3JnLzAW +BgNVHREEDzANggttYWlsLjg5OC5ybzATBgNVHSAEDDAKMAgGBmeBDAECATCCAQMG +CisGAQQB1nkCBAIEgfQEgfEA7wB2AEiw42vapkc0D+VqAvqdMOscUgHLVt0sgdm7 +v6s52IRzAAABi8Bm440AAAQDAEcwRQIgNAIX/xiAU2kHaUbkyyoOfYyqMQHlsuf6 +DZbCpFD8K50CIQCnPGXAQ8890znq0LTefRfVGDntxlFV1cVwlxTIGil4DQB1ADtT +d3U+LbmAToswWwb+QDtn2E/D9Me9AA0tcm/h+tQXAAABi8Bm45YAAAQDAEYwRAIg +Pe4y6RAveoyeO21K7DVHAiLIE9t/0XsoWIv/td2th4kCIFAGNnl9gAEmgRoxxqkb +cAiJT/rQE4aQfu5Ytmqg7/SSMA0GCSqGSIb3DQEBCwUAA4IBAQB5o+h7aMk0lJvG +m+zZSa6S66w1AmpoeS58njgfYmZIiuZP0TdMnTgaO6q6wgYpyzvVAlawsp6MhsZ2 +JuCr/XzrtThXQFU0N5mrRUMqQjT5eVFRzbdtXsvyylUyd2B9O/bydq6nk9XXW26L +GntuxpDJU25CfK02NdOx1JFXG7fhuS8VFsQIHM2KUJ6D/MoVXmUeggR5+VaX27pB +hmZOqkIu71bu9LAdjhnYJIVkmmQBAj+bDcCp5z2eUp4SPvo8Ax/UeJO7zVbjzcm7 +RuFh7M38Zii0Ax2gs02hlayHvRUNnaUUyxuHUCbzGlf1zwvW5HsrmBVpaer3SaOY +j+uwUjaA +-----END CERTIFICATE----- +-----BEGIN CERTIFICATE----- +MIIFFjCCAv6gAwIBAgIRAJErCErPDBinU/bWLiWnX1owDQYJKoZIhvcNAQELBQAw +TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh +cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMjAwOTA0MDAwMDAw +WhcNMjUwOTE1MTYwMDAwWjAyMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNTGV0J3Mg +RW5jcnlwdDELMAkGA1UEAxMCUjMwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK +AoIBAQC7AhUozPaglNMPEuyNVZLD+ILxmaZ6QoinXSaqtSu5xUyxr45r+XXIo9cP +R5QUVTVXjJ6oojkZ9YI8QqlObvU7wy7bjcCwXPNZOOftz2nwWgsbvsCUJCWH+jdx +sxPnHKzhm+/b5DtFUkWWqcFTzjTIUu61ru2P3mBw4qVUq7ZtDpelQDRrK9O8Zutm +NHz6a4uPVymZ+DAXXbpyb/uBxa3Shlg9F8fnCbvxK/eG3MHacV3URuPMrSXBiLxg +Z3Vms/EY96Jc5lP/Ooi2R6X/ExjqmAl3P51T+c8B5fWmcBcUr2Ok/5mzk53cU6cG +/kiFHaFpriV1uxPMUgP17VGhi9sVAgMBAAGjggEIMIIBBDAOBgNVHQ8BAf8EBAMC +AYYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMBMBIGA1UdEwEB/wQIMAYB +Af8CAQAwHQYDVR0OBBYEFBQusxe3WFbLrlAJQOYfr52LFMLGMB8GA1UdIwQYMBaA +FHm0WeZ7tuXkAXOACIjIGlj26ZtuMDIGCCsGAQUFBwEBBCYwJDAiBggrBgEFBQcw +AoYWaHR0cDovL3gxLmkubGVuY3Iub3JnLzAnBgNVHR8EIDAeMBygGqAYhhZodHRw +Oi8veDEuYy5sZW5jci5vcmcvMCIGA1UdIAQbMBkwCAYGZ4EMAQIBMA0GCysGAQQB +gt8TAQEBMA0GCSqGSIb3DQEBCwUAA4ICAQCFyk5HPqP3hUSFvNVneLKYY611TR6W +PTNlclQtgaDqw+34IL9fzLdwALduO/ZelN7kIJ+m74uyA+eitRY8kc607TkC53wl +ikfmZW4/RvTZ8M6UK+5UzhK8jCdLuMGYL6KvzXGRSgi3yLgjewQtCPkIVz6D2QQz +CkcheAmCJ8MqyJu5zlzyZMjAvnnAT45tRAxekrsu94sQ4egdRCnbWSDtY7kh+BIm +lJNXoB1lBMEKIq4QDUOXoRgffuDghje1WrG9ML+Hbisq/yFOGwXD9RiX8F6sw6W4 +avAuvDszue5L3sz85K+EC4Y/wFVDNvZo4TYXao6Z0f+lQKc0t8DQYzk1OXVu8rp2 +yJMC6alLbBfODALZvYH7n7do1AZls4I9d1P4jnkDrQoxB3UqQ9hVl3LEKQ73xF1O +yK5GhDDX8oVfGKF5u+decIsH4YaTw7mP3GFxJSqv3+0lUFJoi5Lc5da149p90Ids +hCExroL1+7mryIkXPeFM5TgO9r0rvZaBFOvV2z0gp35Z0+L4WPlbuEjN/lxPFin+ +HlUjr8gRsI3qfJOQFy/9rKIJR0Y/8Omwt/8oTWgy1mdeHmmjk7j1nYsvC9JSQ6Zv +MldlTTKB3zhThV1+XWYp6rjd5JW1zbVWEkLNxE7GJThEUG3szgBVGP7pSWTUTsqX +nLRbwHOoq7hHwg== +-----END CERTIFICATE----- diff --git a/letsencrypt/archive/mail.898.ro/privkey16.pem b/letsencrypt/archive/mail.898.ro/privkey16.pem new file mode 100644 index 0000000..82d3a5c --- /dev/null +++ b/letsencrypt/archive/mail.898.ro/privkey16.pem @@ -0,0 +1,28 @@ +-----BEGIN PRIVATE KEY----- +MIIEvgIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQDURMzq0VjfYKdp +yvApF2sURV1WHs9RiGVlt3wNknmcX7NVq/oMSTwj76YX6Q/PYb0g8lQlnvXwaInd +68qpRZ5niwNhZLRt0vP8mFxJxv/9qSG7ZXSwvUgp+bnKXQVyZG7qA3UcMwkOPQ+a +KX4KaiAHRApXE5QRNbWwiuikBpBGR+Y3JdfDWz2FqOxCq4as0C8TYNoBLkkQHEKx +75uieOjp6R70dgqUMSgrqeSDIiIHbceTFFq5Ff1jhZQApLc6onY9QCI5lX/9udxm +gZ5wpzeD+lViqB7dy0gwxPfzHgy3ES3GTx2x8uAkSW516STZaWTiL2v0TXLwKAeN +wLUBQIUzAgMBAAECggEAdGTFeH0SnmoBYqFEz0NoE9V1OKPsSmjgMMZL36VRyc0w +KOoEUnhV4d6m1LWXVb/iVQ6L1ZU0hn7MGkQQ/ICQO3aeg+kUhqQF5Zwl/s5/0DfN +p1QaiE9CIsIsfipDslYf+3Gp5ayWaphQ1deqpUtMBK/qe5TgvA8XcZa5ujdfJSmH +zL39su1cP/RaE6gfmUK5jaI7xWENqtYs4qcL7b/w2r/tV/TcFhQG3zFrr74DQI+0 +RBPVEd5fAcbZQ7NbHWDIHMkkfgUw4Bm4a/gdN1taObiB0cCAjekuEU0Xxm+uyoUx +c4Le1TpVZbCFq70rcuPh9XzEn39oWTLONLfD42UjAQKBgQDzrFqOij71y0gn0olQ +ZvqWfck8iBTQObBEYcfbYJebn21NuuXsNQhWILNtAbXj1xuNQewoNPLYAwaf06jh +nb3UVgKjPnJQQBfDCmVds9ndxDIL04JHz3Ns5I750mTKmk3HeQ6UzdDqU8qGnMww ++A3pXNdSoJfEy7xXVorgnKIuzwKBgQDfAb+V7OSMtI+KtPZObUFJl+bg5Szw42Nj +zogTFkFIiqYpDC7dUzDSIkUJKgtzxQtpXS5mrbczSA/440Mx0Vpy9e9L3eO1D2VJ +a0QUoX/yVTD0ADMoypHJjlqhNWo7ivQ2QQaAg0xJBRzNNAyaLWMVq2wzka+yhrTP +nuPRAhM8XQKBgQCzzb84pOxWZL0GnYUzbfmEqKagYu2wxJC7tMdLqpfUfqyiCcJ1 +LKDNJO4hBn0X9XdgIX/IH2H+YSU3NHDOop4bm6fwmziw3Mpr4jTwErE1wfsH3Peq +U3qhpHmYAFbdZUT1Zu+Kf+CjuFaeQ/8sNy3Uv+wnDVdQIOIGNFbf7NSD4wKBgQCY +FGQoBR4zimsdZ51VDJLqcinkEsXcHOXJya3oflPU+aCo+4L2MmZn1zEHN+IJeEX4 ++6/KHAuEcE9cJvfLAH9TSL6BGXfRIQes0vbhruVHSKuSqpQ47DQRpP/PUlL4+iDi +4uNhPqkGXvMuSaGSfwNEYtvuKxsLf2vM7wljnqupjQKBgCOFWcjBy5iDtqoLqouG +00n0Fvj/q8pHqKXD6x2vIDDAJvVr6Mc+D9N91p9tl+H76uO37fmtWXRxSF0BPKJ1 +hjqJqMmJlkFRofNMsmvQk0iyBYKWIW4GwaUhwM5054ueZLzCwS737vqZ+/a58wBH +csOdp7JMWUf47+h8m+cJ9sGX +-----END PRIVATE KEY----- diff --git a/letsencrypt/archive/mail.anywhere.ro/cert17.pem b/letsencrypt/archive/mail.anywhere.ro/cert17.pem new file mode 100644 index 0000000..98d2f92 --- /dev/null +++ b/letsencrypt/archive/mail.anywhere.ro/cert17.pem @@ -0,0 +1,29 @@ +-----BEGIN CERTIFICATE----- +MIIE7DCCA9SgAwIBAgISBEX/eCW6+CCW3sbyV5gxpRnoMA0GCSqGSIb3DQEBCwUA +MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD +EwJSMzAeFw0yMzExMTEyMTAwNTVaFw0yNDAyMDkyMTAwNTRaMBsxGTAXBgNVBAMT +EG1haWwuYW55d2hlcmUucm8wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB +AQC92egejHU2SN/JmYt9ny4ovTB0vCqkL5gA9YUKNAPqZolTtGNkum3sVUPmCfhM +OjiuaQr+9aK/cz9JJVxHTuJbB8xdob5RL5E7WUtTkvaCEl+63CAYUV2TY4vrKx6a +78EnEiKajAndSqVhwu1ZgRsq0tjUgCABulzkvP+aXa3YbLXEf5f9MAnCg+hVGPMS +rGC9hL9f/6ZQKqxk9yxDktGMl4J+cdGYi4MDmWT/1kEDDqEtAP72rrIuTClyyCun +ZQ7ia69N2qy4/NiWHlSkVC0rD7w8+sE7UvS7wXpm+dlUokNMowodx7ddzRxFjdPz +fMrsyGf1uGZfd4orfvQsba4JAgMBAAGjggIRMIICDTAOBgNVHQ8BAf8EBAMCBaAw +HQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYD +VR0OBBYEFMJDpWmD7UbdF7HMN/B9P72Q3H1XMB8GA1UdIwQYMBaAFBQusxe3WFbL +rlAJQOYfr52LFMLGMFUGCCsGAQUFBwEBBEkwRzAhBggrBgEFBQcwAYYVaHR0cDov +L3IzLm8ubGVuY3Iub3JnMCIGCCsGAQUFBzAChhZodHRwOi8vcjMuaS5sZW5jci5v +cmcvMBsGA1UdEQQUMBKCEG1haWwuYW55d2hlcmUucm8wEwYDVR0gBAwwCjAIBgZn +gQwBAgEwggEDBgorBgEEAdZ5AgQCBIH0BIHxAO8AdgBIsONr2qZHNA/lagL6nTDr +HFIBy1bdLIHZu7+rOdiEcwAAAYvAZvhTAAAEAwBHMEUCIQDQVnhU42fhYl6+fGPd +YzTzxJ0LPIHmZHJrdV6kCGN39QIgezH/bB0o3xBqLbqQQpSybT7gLeF7E61sj21s +LYyOKDEAdQA7U3d1Pi25gE6LMFsG/kA7Z9hPw/THvQANLXJv4frUFwAAAYvAZvhR +AAAEAwBGMEQCIG2UbUC6liCrWkexDX6ZELD4etMz11VMI/tkBEMs1L1jAiAJPL50 +oBtvSkBF2YA74tJCiIT6oYF4rwGocsGtKR7LejANBgkqhkiG9w0BAQsFAAOCAQEA +a4w63FW1QZ2t9V/7BeQ868rcHCrvjpedZdRZfXWxM+YTFwGj67tCUoMlDC6CAqGB +xNRWGiotnFC8M8SEYFqE/57VLJozjVx5XpaY2vZbecCrED7L/UchdEoDwH4NBvsx +kO2hwrnKjTREOSDhybzOEHJrc0kprMtezF6vmNdVtvq4li0kUbw1mmckCUabyFqe +BqSJH0Mqto2+xdtflG90U9BN4OTUBW68zYHzK8ba24AuqcZLwUjyLYtY62kSuA4z +hmR0Jy1MvAEQKpPsSxaqsgG2//rIrvE5GLvZWS1seeGcyyPP0ZYaDJfGxCPrII+9 +zV94lR9lA1LkfKTMtNNWTw== +-----END CERTIFICATE----- diff --git a/letsencrypt/archive/mail.anywhere.ro/chain17.pem b/letsencrypt/archive/mail.anywhere.ro/chain17.pem new file mode 100644 index 0000000..43b222a --- /dev/null +++ b/letsencrypt/archive/mail.anywhere.ro/chain17.pem @@ -0,0 +1,30 @@ +-----BEGIN CERTIFICATE----- +MIIFFjCCAv6gAwIBAgIRAJErCErPDBinU/bWLiWnX1owDQYJKoZIhvcNAQELBQAw +TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh +cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMjAwOTA0MDAwMDAw +WhcNMjUwOTE1MTYwMDAwWjAyMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNTGV0J3Mg +RW5jcnlwdDELMAkGA1UEAxMCUjMwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK +AoIBAQC7AhUozPaglNMPEuyNVZLD+ILxmaZ6QoinXSaqtSu5xUyxr45r+XXIo9cP +R5QUVTVXjJ6oojkZ9YI8QqlObvU7wy7bjcCwXPNZOOftz2nwWgsbvsCUJCWH+jdx +sxPnHKzhm+/b5DtFUkWWqcFTzjTIUu61ru2P3mBw4qVUq7ZtDpelQDRrK9O8Zutm +NHz6a4uPVymZ+DAXXbpyb/uBxa3Shlg9F8fnCbvxK/eG3MHacV3URuPMrSXBiLxg +Z3Vms/EY96Jc5lP/Ooi2R6X/ExjqmAl3P51T+c8B5fWmcBcUr2Ok/5mzk53cU6cG +/kiFHaFpriV1uxPMUgP17VGhi9sVAgMBAAGjggEIMIIBBDAOBgNVHQ8BAf8EBAMC +AYYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMBMBIGA1UdEwEB/wQIMAYB +Af8CAQAwHQYDVR0OBBYEFBQusxe3WFbLrlAJQOYfr52LFMLGMB8GA1UdIwQYMBaA +FHm0WeZ7tuXkAXOACIjIGlj26ZtuMDIGCCsGAQUFBwEBBCYwJDAiBggrBgEFBQcw +AoYWaHR0cDovL3gxLmkubGVuY3Iub3JnLzAnBgNVHR8EIDAeMBygGqAYhhZodHRw +Oi8veDEuYy5sZW5jci5vcmcvMCIGA1UdIAQbMBkwCAYGZ4EMAQIBMA0GCysGAQQB +gt8TAQEBMA0GCSqGSIb3DQEBCwUAA4ICAQCFyk5HPqP3hUSFvNVneLKYY611TR6W +PTNlclQtgaDqw+34IL9fzLdwALduO/ZelN7kIJ+m74uyA+eitRY8kc607TkC53wl +ikfmZW4/RvTZ8M6UK+5UzhK8jCdLuMGYL6KvzXGRSgi3yLgjewQtCPkIVz6D2QQz +CkcheAmCJ8MqyJu5zlzyZMjAvnnAT45tRAxekrsu94sQ4egdRCnbWSDtY7kh+BIm +lJNXoB1lBMEKIq4QDUOXoRgffuDghje1WrG9ML+Hbisq/yFOGwXD9RiX8F6sw6W4 +avAuvDszue5L3sz85K+EC4Y/wFVDNvZo4TYXao6Z0f+lQKc0t8DQYzk1OXVu8rp2 +yJMC6alLbBfODALZvYH7n7do1AZls4I9d1P4jnkDrQoxB3UqQ9hVl3LEKQ73xF1O +yK5GhDDX8oVfGKF5u+decIsH4YaTw7mP3GFxJSqv3+0lUFJoi5Lc5da149p90Ids +hCExroL1+7mryIkXPeFM5TgO9r0rvZaBFOvV2z0gp35Z0+L4WPlbuEjN/lxPFin+ +HlUjr8gRsI3qfJOQFy/9rKIJR0Y/8Omwt/8oTWgy1mdeHmmjk7j1nYsvC9JSQ6Zv +MldlTTKB3zhThV1+XWYp6rjd5JW1zbVWEkLNxE7GJThEUG3szgBVGP7pSWTUTsqX +nLRbwHOoq7hHwg== +-----END CERTIFICATE----- diff --git a/letsencrypt/archive/mail.anywhere.ro/fullchain17.pem b/letsencrypt/archive/mail.anywhere.ro/fullchain17.pem new file mode 100644 index 0000000..6f49e41 --- /dev/null +++ b/letsencrypt/archive/mail.anywhere.ro/fullchain17.pem @@ -0,0 +1,59 @@ +-----BEGIN CERTIFICATE----- +MIIE7DCCA9SgAwIBAgISBEX/eCW6+CCW3sbyV5gxpRnoMA0GCSqGSIb3DQEBCwUA +MDIxCzAJBgNVBAYTAlVTMRYwFAYDVQQKEw1MZXQncyBFbmNyeXB0MQswCQYDVQQD +EwJSMzAeFw0yMzExMTEyMTAwNTVaFw0yNDAyMDkyMTAwNTRaMBsxGTAXBgNVBAMT +EG1haWwuYW55d2hlcmUucm8wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB +AQC92egejHU2SN/JmYt9ny4ovTB0vCqkL5gA9YUKNAPqZolTtGNkum3sVUPmCfhM +OjiuaQr+9aK/cz9JJVxHTuJbB8xdob5RL5E7WUtTkvaCEl+63CAYUV2TY4vrKx6a +78EnEiKajAndSqVhwu1ZgRsq0tjUgCABulzkvP+aXa3YbLXEf5f9MAnCg+hVGPMS +rGC9hL9f/6ZQKqxk9yxDktGMl4J+cdGYi4MDmWT/1kEDDqEtAP72rrIuTClyyCun +ZQ7ia69N2qy4/NiWHlSkVC0rD7w8+sE7UvS7wXpm+dlUokNMowodx7ddzRxFjdPz +fMrsyGf1uGZfd4orfvQsba4JAgMBAAGjggIRMIICDTAOBgNVHQ8BAf8EBAMCBaAw +HQYDVR0lBBYwFAYIKwYBBQUHAwEGCCsGAQUFBwMCMAwGA1UdEwEB/wQCMAAwHQYD +VR0OBBYEFMJDpWmD7UbdF7HMN/B9P72Q3H1XMB8GA1UdIwQYMBaAFBQusxe3WFbL +rlAJQOYfr52LFMLGMFUGCCsGAQUFBwEBBEkwRzAhBggrBgEFBQcwAYYVaHR0cDov +L3IzLm8ubGVuY3Iub3JnMCIGCCsGAQUFBzAChhZodHRwOi8vcjMuaS5sZW5jci5v +cmcvMBsGA1UdEQQUMBKCEG1haWwuYW55d2hlcmUucm8wEwYDVR0gBAwwCjAIBgZn +gQwBAgEwggEDBgorBgEEAdZ5AgQCBIH0BIHxAO8AdgBIsONr2qZHNA/lagL6nTDr +HFIBy1bdLIHZu7+rOdiEcwAAAYvAZvhTAAAEAwBHMEUCIQDQVnhU42fhYl6+fGPd +YzTzxJ0LPIHmZHJrdV6kCGN39QIgezH/bB0o3xBqLbqQQpSybT7gLeF7E61sj21s +LYyOKDEAdQA7U3d1Pi25gE6LMFsG/kA7Z9hPw/THvQANLXJv4frUFwAAAYvAZvhR +AAAEAwBGMEQCIG2UbUC6liCrWkexDX6ZELD4etMz11VMI/tkBEMs1L1jAiAJPL50 +oBtvSkBF2YA74tJCiIT6oYF4rwGocsGtKR7LejANBgkqhkiG9w0BAQsFAAOCAQEA +a4w63FW1QZ2t9V/7BeQ868rcHCrvjpedZdRZfXWxM+YTFwGj67tCUoMlDC6CAqGB +xNRWGiotnFC8M8SEYFqE/57VLJozjVx5XpaY2vZbecCrED7L/UchdEoDwH4NBvsx +kO2hwrnKjTREOSDhybzOEHJrc0kprMtezF6vmNdVtvq4li0kUbw1mmckCUabyFqe +BqSJH0Mqto2+xdtflG90U9BN4OTUBW68zYHzK8ba24AuqcZLwUjyLYtY62kSuA4z +hmR0Jy1MvAEQKpPsSxaqsgG2//rIrvE5GLvZWS1seeGcyyPP0ZYaDJfGxCPrII+9 +zV94lR9lA1LkfKTMtNNWTw== +-----END CERTIFICATE----- +-----BEGIN CERTIFICATE----- +MIIFFjCCAv6gAwIBAgIRAJErCErPDBinU/bWLiWnX1owDQYJKoZIhvcNAQELBQAw +TzELMAkGA1UEBhMCVVMxKTAnBgNVBAoTIEludGVybmV0IFNlY3VyaXR5IFJlc2Vh +cmNoIEdyb3VwMRUwEwYDVQQDEwxJU1JHIFJvb3QgWDEwHhcNMjAwOTA0MDAwMDAw +WhcNMjUwOTE1MTYwMDAwWjAyMQswCQYDVQQGEwJVUzEWMBQGA1UEChMNTGV0J3Mg +RW5jcnlwdDELMAkGA1UEAxMCUjMwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK +AoIBAQC7AhUozPaglNMPEuyNVZLD+ILxmaZ6QoinXSaqtSu5xUyxr45r+XXIo9cP +R5QUVTVXjJ6oojkZ9YI8QqlObvU7wy7bjcCwXPNZOOftz2nwWgsbvsCUJCWH+jdx +sxPnHKzhm+/b5DtFUkWWqcFTzjTIUu61ru2P3mBw4qVUq7ZtDpelQDRrK9O8Zutm +NHz6a4uPVymZ+DAXXbpyb/uBxa3Shlg9F8fnCbvxK/eG3MHacV3URuPMrSXBiLxg +Z3Vms/EY96Jc5lP/Ooi2R6X/ExjqmAl3P51T+c8B5fWmcBcUr2Ok/5mzk53cU6cG +/kiFHaFpriV1uxPMUgP17VGhi9sVAgMBAAGjggEIMIIBBDAOBgNVHQ8BAf8EBAMC +AYYwHQYDVR0lBBYwFAYIKwYBBQUHAwIGCCsGAQUFBwMBMBIGA1UdEwEB/wQIMAYB +Af8CAQAwHQYDVR0OBBYEFBQusxe3WFbLrlAJQOYfr52LFMLGMB8GA1UdIwQYMBaA +FHm0WeZ7tuXkAXOACIjIGlj26ZtuMDIGCCsGAQUFBwEBBCYwJDAiBggrBgEFBQcw +AoYWaHR0cDovL3gxLmkubGVuY3Iub3JnLzAnBgNVHR8EIDAeMBygGqAYhhZodHRw +Oi8veDEuYy5sZW5jci5vcmcvMCIGA1UdIAQbMBkwCAYGZ4EMAQIBMA0GCysGAQQB +gt8TAQEBMA0GCSqGSIb3DQEBCwUAA4ICAQCFyk5HPqP3hUSFvNVneLKYY611TR6W +PTNlclQtgaDqw+34IL9fzLdwALduO/ZelN7kIJ+m74uyA+eitRY8kc607TkC53wl +ikfmZW4/RvTZ8M6UK+5UzhK8jCdLuMGYL6KvzXGRSgi3yLgjewQtCPkIVz6D2QQz +CkcheAmCJ8MqyJu5zlzyZMjAvnnAT45tRAxekrsu94sQ4egdRCnbWSDtY7kh+BIm +lJNXoB1lBMEKIq4QDUOXoRgffuDghje1WrG9ML+Hbisq/yFOGwXD9RiX8F6sw6W4 +avAuvDszue5L3sz85K+EC4Y/wFVDNvZo4TYXao6Z0f+lQKc0t8DQYzk1OXVu8rp2 +yJMC6alLbBfODALZvYH7n7do1AZls4I9d1P4jnkDrQoxB3UqQ9hVl3LEKQ73xF1O +yK5GhDDX8oVfGKF5u+decIsH4YaTw7mP3GFxJSqv3+0lUFJoi5Lc5da149p90Ids +hCExroL1+7mryIkXPeFM5TgO9r0rvZaBFOvV2z0gp35Z0+L4WPlbuEjN/lxPFin+ +HlUjr8gRsI3qfJOQFy/9rKIJR0Y/8Omwt/8oTWgy1mdeHmmjk7j1nYsvC9JSQ6Zv +MldlTTKB3zhThV1+XWYp6rjd5JW1zbVWEkLNxE7GJThEUG3szgBVGP7pSWTUTsqX +nLRbwHOoq7hHwg== +-----END CERTIFICATE----- diff --git a/letsencrypt/archive/mail.anywhere.ro/privkey17.pem b/letsencrypt/archive/mail.anywhere.ro/privkey17.pem new file mode 100644 index 0000000..910d7d9 --- /dev/null +++ b/letsencrypt/archive/mail.anywhere.ro/privkey17.pem @@ -0,0 +1,28 @@ +-----BEGIN PRIVATE KEY----- +MIIEvQIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAAoIBAQC92egejHU2SN/J +mYt9ny4ovTB0vCqkL5gA9YUKNAPqZolTtGNkum3sVUPmCfhMOjiuaQr+9aK/cz9J +JVxHTuJbB8xdob5RL5E7WUtTkvaCEl+63CAYUV2TY4vrKx6a78EnEiKajAndSqVh +wu1ZgRsq0tjUgCABulzkvP+aXa3YbLXEf5f9MAnCg+hVGPMSrGC9hL9f/6ZQKqxk +9yxDktGMl4J+cdGYi4MDmWT/1kEDDqEtAP72rrIuTClyyCunZQ7ia69N2qy4/NiW +HlSkVC0rD7w8+sE7UvS7wXpm+dlUokNMowodx7ddzRxFjdPzfMrsyGf1uGZfd4or +fvQsba4JAgMBAAECggEAHWT2tnwizcPculcGrO2PdQlNzlUv+PnRfByHe7vv+0Pi +8U3VscvXpybQe3aBtjOxgPeMl0sq5p+OZeHd9sB09YkwkDKxx9ooj1rU+dygRCVa +IxFf+sPmTCK2kDO96llCu6zoJKuX/2ZGUuueWiROM4QvxD8ONZZIObY1kQ3+E6sE +9DLDHrGHHGeZ4LpX5cCzemYROmcwV72/5bMU2HtCJwtZaRttmSz6RJdGOV+U5AYa +YdrcUN65GjPOROgUw8VPPM3H53lyx55jO/W9MWltRcrFdQX8InRgHBpOWnel80+V +xQUDaA+BNvreV96Oh0kLahl0/MmSAa/9Ak1RHp3jPQKBgQDhxa4Dgp6Z1qfPtufp +qwZwZUyhgG/pfAm80AvQocs3P9A5t6yHnuQk3qLFPo6oDUYu7mGXk7esYy8Lyi/V +nY02Mn/bVRchyij52ZXwvEkjulKMj4dCzpNWR5RY1kPfNDFto2tSc3K9sXUvJYY1 +mUwvNLVeIHJm7Y5GYf1Fe6tuzwKBgQDXRQnbsGp9BFbanyUJgNy7DuO8EsQepMvl +yA8x3RDGxW/NrAgnUgRTbtISWsdTcEVFD3AlN6VBdlIpK5niI7nzH9zGCe+ckP8K +cyRT4dI0H1+7MyeGYtiH9mx+xHSsbAn5MY+0tjEeJG6ZXvqdkv3N699+O/Eh2dr3 +sFHWWjKLpwKBgQDSrurtAaZJPuPIVRHjnyJaHl29VCKbCpH3rVlpLqJ5g0YnpjwN +LvwNX+kbEX6EWibFQtS1YzaCWugbI2kx+V0+Vy+zGJuGf6VvSlm+laXW/ldsLb/2 +WtlpKVDI+eHKV2VMv7Q189/+HqyQ+35bZBuQ7anWFYdMf6BGE8kKXxaiRwKBgC6m +PV6oOkthN1klB6epjyvSLDPDdVCWscDXu8M4frw0aOgPEa1DrsBN0aQ8m9lPCRPQ +JqNKDbvD4kYdtrk0uMUg8HzSBmTNXxdqoEK1OxIkgmBU04nhvb6o/hXyiL4co4Sm +4tdsa/R2PKlr1a9z/SA0rzfx0W1egn8ObI2g+jcdAoGAZsS+h4BpoSObnxghoimH +Gn7pbFKQ9YAbzYdr2XFIMLaANPQD5aGdk/ZvGLGt6bcKSAOpPbDDmK52FM71oEAN +222ALeYbBhtb91CbPWv1pS22zCT1D0kFDoE5AhcZr5L1znIpPjxxsjfZliBE7FZc +Wm3LCC/w6h8Qrzle4KGM27M= +-----END PRIVATE KEY----- diff --git a/letsencrypt/csr/0546_csr-certbot.pem b/letsencrypt/csr/0546_csr-certbot.pem new file mode 100644 index 0000000..1587664 --- /dev/null +++ b/letsencrypt/csr/0546_csr-certbot.pem @@ -0,0 +1,16 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIICbjCCAVYCAQAwADCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANRE +zOrRWN9gp2nK8CkXaxRFXVYez1GIZWW3fA2SeZxfs1Wr+gxJPCPvphfpD89hvSDy +VCWe9fBoid3ryqlFnmeLA2FktG3S8/yYXEnG//2pIbtldLC9SCn5ucpdBXJkbuoD +dRwzCQ49D5opfgpqIAdEClcTlBE1tbCK6KQGkEZH5jcl18NbPYWo7EKrhqzQLxNg +2gEuSRAcQrHvm6J46OnpHvR2CpQxKCup5IMiIgdtx5MUWrkV/WOFlACktzqidj1A +IjmVf/253GaBnnCnN4P6VWKoHt3LSDDE9/MeDLcRLcZPHbHy4CRJbnXpJNlpZOIv +a/RNcvAoB43AtQFAhTMCAwEAAaApMCcGCSqGSIb3DQEJDjEaMBgwFgYDVR0RBA8w +DYILbWFpbC44OTgucm8wDQYJKoZIhvcNAQELBQADggEBAMvcatWoBdEfBcjNQTtB +7ksIsZ9g1EXZ2t3BE+o8UQAcMac4dqMf3Hp/I7jcMyGowPRF42vVrG5BvHfpnblT +a+5nuQOou6Gh6Qr2q0vZKkyWaARrADip2M03z/72LY7d0FC3+QwQcAURhaq47WWc +5ij1LZphb8GolbFvfi8Znm91mM9tO9OIR7zHhm9yBUSnpotouLBSAqv79int+KHU +5dRU/bLWjZ96CK4Pf8a1aMADoi1zBiRJcwW3XW+fthtwcsJMVobfz+GNS4Ji+aEl +uwEClWYpW3RomP0po3LLAFdMWPWV8nTQSbbKq5IYiKLKT2ZmiV46Ej+NyLB1zkdZ +U38= +-----END CERTIFICATE REQUEST----- diff --git a/letsencrypt/csr/0547_csr-certbot.pem b/letsencrypt/csr/0547_csr-certbot.pem new file mode 100644 index 0000000..23a70be --- /dev/null +++ b/letsencrypt/csr/0547_csr-certbot.pem @@ -0,0 +1,16 @@ +-----BEGIN CERTIFICATE REQUEST----- +MIICczCCAVsCAQAwADCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL3Z +6B6MdTZI38mZi32fLii9MHS8KqQvmAD1hQo0A+pmiVO0Y2S6bexVQ+YJ+Ew6OK5p +Cv71or9zP0klXEdO4lsHzF2hvlEvkTtZS1OS9oISX7rcIBhRXZNji+srHprvwScS +IpqMCd1KpWHC7VmBGyrS2NSAIAG6XOS8/5pdrdhstcR/l/0wCcKD6FUY8xKsYL2E +v1//plAqrGT3LEOS0YyXgn5x0ZiLgwOZZP/WQQMOoS0A/vausi5MKXLIK6dlDuJr +r03arLj82JYeVKRULSsPvDz6wTtS9LvBemb52VSiQ0yjCh3Ht13NHEWN0/N8yuzI +Z/W4Zl93iit+9CxtrgkCAwEAAaAuMCwGCSqGSIb3DQEJDjEfMB0wGwYDVR0RBBQw +EoIQbWFpbC5hbnl3aGVyZS5ybzANBgkqhkiG9w0BAQsFAAOCAQEAg50mVMVRHWK6 +FhVoNK6f72+0U584sVLBk8PUzfARTpkmPW4hV3ItoUNHjvhuua6Pll55GI5fpUIP +JV458Qw3cSg08mq1OHtVz2aFCIfWCZINUVvRqkJiDsadYEyoZjfVefMKlZkD4AB8 +b5E3NDtFVS9SSfiDqP79n8ZmfHyRaToUMNDZcAkNQVA6BS/4le816aesKhSNcwe1 +Yzp6XkBgx1u1+rSG+sprZ4Ct2u2zeOp2QZUW4rgZnz5Shh2aSlzP7GfOLT7xO8fV +Nu5ATro2ahX2jKzORPklZYlBg9Cul/oikiGm90L7dx2vKIKt56wUkbONn6hJ3UhU +LXB0wIumuw== +-----END CERTIFICATE REQUEST----- diff --git a/letsencrypt/keys/0546_key-certbot.pem b/letsencrypt/keys/0546_key-certbot.pem new file mode 100644 index 0000000..82d3a5c --- /dev/null +++ b/letsencrypt/keys/0546_key-certbot.pem @@ -0,0 +1,28 @@ +-----BEGIN PRIVATE KEY----- +MIIEvgIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQDURMzq0VjfYKdp +yvApF2sURV1WHs9RiGVlt3wNknmcX7NVq/oMSTwj76YX6Q/PYb0g8lQlnvXwaInd +68qpRZ5niwNhZLRt0vP8mFxJxv/9qSG7ZXSwvUgp+bnKXQVyZG7qA3UcMwkOPQ+a +KX4KaiAHRApXE5QRNbWwiuikBpBGR+Y3JdfDWz2FqOxCq4as0C8TYNoBLkkQHEKx +75uieOjp6R70dgqUMSgrqeSDIiIHbceTFFq5Ff1jhZQApLc6onY9QCI5lX/9udxm +gZ5wpzeD+lViqB7dy0gwxPfzHgy3ES3GTx2x8uAkSW516STZaWTiL2v0TXLwKAeN +wLUBQIUzAgMBAAECggEAdGTFeH0SnmoBYqFEz0NoE9V1OKPsSmjgMMZL36VRyc0w +KOoEUnhV4d6m1LWXVb/iVQ6L1ZU0hn7MGkQQ/ICQO3aeg+kUhqQF5Zwl/s5/0DfN +p1QaiE9CIsIsfipDslYf+3Gp5ayWaphQ1deqpUtMBK/qe5TgvA8XcZa5ujdfJSmH +zL39su1cP/RaE6gfmUK5jaI7xWENqtYs4qcL7b/w2r/tV/TcFhQG3zFrr74DQI+0 +RBPVEd5fAcbZQ7NbHWDIHMkkfgUw4Bm4a/gdN1taObiB0cCAjekuEU0Xxm+uyoUx +c4Le1TpVZbCFq70rcuPh9XzEn39oWTLONLfD42UjAQKBgQDzrFqOij71y0gn0olQ +ZvqWfck8iBTQObBEYcfbYJebn21NuuXsNQhWILNtAbXj1xuNQewoNPLYAwaf06jh +nb3UVgKjPnJQQBfDCmVds9ndxDIL04JHz3Ns5I750mTKmk3HeQ6UzdDqU8qGnMww ++A3pXNdSoJfEy7xXVorgnKIuzwKBgQDfAb+V7OSMtI+KtPZObUFJl+bg5Szw42Nj +zogTFkFIiqYpDC7dUzDSIkUJKgtzxQtpXS5mrbczSA/440Mx0Vpy9e9L3eO1D2VJ +a0QUoX/yVTD0ADMoypHJjlqhNWo7ivQ2QQaAg0xJBRzNNAyaLWMVq2wzka+yhrTP +nuPRAhM8XQKBgQCzzb84pOxWZL0GnYUzbfmEqKagYu2wxJC7tMdLqpfUfqyiCcJ1 +LKDNJO4hBn0X9XdgIX/IH2H+YSU3NHDOop4bm6fwmziw3Mpr4jTwErE1wfsH3Peq +U3qhpHmYAFbdZUT1Zu+Kf+CjuFaeQ/8sNy3Uv+wnDVdQIOIGNFbf7NSD4wKBgQCY +FGQoBR4zimsdZ51VDJLqcinkEsXcHOXJya3oflPU+aCo+4L2MmZn1zEHN+IJeEX4 ++6/KHAuEcE9cJvfLAH9TSL6BGXfRIQes0vbhruVHSKuSqpQ47DQRpP/PUlL4+iDi +4uNhPqkGXvMuSaGSfwNEYtvuKxsLf2vM7wljnqupjQKBgCOFWcjBy5iDtqoLqouG +00n0Fvj/q8pHqKXD6x2vIDDAJvVr6Mc+D9N91p9tl+H76uO37fmtWXRxSF0BPKJ1 +hjqJqMmJlkFRofNMsmvQk0iyBYKWIW4GwaUhwM5054ueZLzCwS737vqZ+/a58wBH +csOdp7JMWUf47+h8m+cJ9sGX +-----END PRIVATE KEY----- diff --git a/letsencrypt/keys/0547_key-certbot.pem b/letsencrypt/keys/0547_key-certbot.pem new file mode 100644 index 0000000..910d7d9 --- /dev/null +++ b/letsencrypt/keys/0547_key-certbot.pem @@ -0,0 +1,28 @@ +-----BEGIN PRIVATE KEY----- +MIIEvQIBADANBgkqhkiG9w0BAQEFAASCBKcwggSjAgEAAoIBAQC92egejHU2SN/J +mYt9ny4ovTB0vCqkL5gA9YUKNAPqZolTtGNkum3sVUPmCfhMOjiuaQr+9aK/cz9J +JVxHTuJbB8xdob5RL5E7WUtTkvaCEl+63CAYUV2TY4vrKx6a78EnEiKajAndSqVh +wu1ZgRsq0tjUgCABulzkvP+aXa3YbLXEf5f9MAnCg+hVGPMSrGC9hL9f/6ZQKqxk +9yxDktGMl4J+cdGYi4MDmWT/1kEDDqEtAP72rrIuTClyyCunZQ7ia69N2qy4/NiW +HlSkVC0rD7w8+sE7UvS7wXpm+dlUokNMowodx7ddzRxFjdPzfMrsyGf1uGZfd4or +fvQsba4JAgMBAAECggEAHWT2tnwizcPculcGrO2PdQlNzlUv+PnRfByHe7vv+0Pi +8U3VscvXpybQe3aBtjOxgPeMl0sq5p+OZeHd9sB09YkwkDKxx9ooj1rU+dygRCVa +IxFf+sPmTCK2kDO96llCu6zoJKuX/2ZGUuueWiROM4QvxD8ONZZIObY1kQ3+E6sE +9DLDHrGHHGeZ4LpX5cCzemYROmcwV72/5bMU2HtCJwtZaRttmSz6RJdGOV+U5AYa +YdrcUN65GjPOROgUw8VPPM3H53lyx55jO/W9MWltRcrFdQX8InRgHBpOWnel80+V +xQUDaA+BNvreV96Oh0kLahl0/MmSAa/9Ak1RHp3jPQKBgQDhxa4Dgp6Z1qfPtufp +qwZwZUyhgG/pfAm80AvQocs3P9A5t6yHnuQk3qLFPo6oDUYu7mGXk7esYy8Lyi/V +nY02Mn/bVRchyij52ZXwvEkjulKMj4dCzpNWR5RY1kPfNDFto2tSc3K9sXUvJYY1 +mUwvNLVeIHJm7Y5GYf1Fe6tuzwKBgQDXRQnbsGp9BFbanyUJgNy7DuO8EsQepMvl +yA8x3RDGxW/NrAgnUgRTbtISWsdTcEVFD3AlN6VBdlIpK5niI7nzH9zGCe+ckP8K +cyRT4dI0H1+7MyeGYtiH9mx+xHSsbAn5MY+0tjEeJG6ZXvqdkv3N699+O/Eh2dr3 +sFHWWjKLpwKBgQDSrurtAaZJPuPIVRHjnyJaHl29VCKbCpH3rVlpLqJ5g0YnpjwN +LvwNX+kbEX6EWibFQtS1YzaCWugbI2kx+V0+Vy+zGJuGf6VvSlm+laXW/ldsLb/2 +WtlpKVDI+eHKV2VMv7Q189/+HqyQ+35bZBuQ7anWFYdMf6BGE8kKXxaiRwKBgC6m +PV6oOkthN1klB6epjyvSLDPDdVCWscDXu8M4frw0aOgPEa1DrsBN0aQ8m9lPCRPQ +JqNKDbvD4kYdtrk0uMUg8HzSBmTNXxdqoEK1OxIkgmBU04nhvb6o/hXyiL4co4Sm +4tdsa/R2PKlr1a9z/SA0rzfx0W1egn8ObI2g+jcdAoGAZsS+h4BpoSObnxghoimH +Gn7pbFKQ9YAbzYdr2XFIMLaANPQD5aGdk/ZvGLGt6bcKSAOpPbDDmK52FM71oEAN +222ALeYbBhtb91CbPWv1pS22zCT1D0kFDoE5AhcZr5L1znIpPjxxsjfZliBE7FZc +Wm3LCC/w6h8Qrzle4KGM27M= +-----END PRIVATE KEY----- diff --git a/letsencrypt/live/mail.898.ro/cert.pem b/letsencrypt/live/mail.898.ro/cert.pem index bc216c2..f99d3ec 120000 --- a/letsencrypt/live/mail.898.ro/cert.pem +++ b/letsencrypt/live/mail.898.ro/cert.pem @@ -1 +1 @@ -../../archive/mail.898.ro/cert15.pem \ No newline at end of file +../../archive/mail.898.ro/cert16.pem \ No newline at end of file diff --git a/letsencrypt/live/mail.898.ro/chain.pem b/letsencrypt/live/mail.898.ro/chain.pem index 180c3c8..571a72d 120000 --- a/letsencrypt/live/mail.898.ro/chain.pem +++ b/letsencrypt/live/mail.898.ro/chain.pem @@ -1 +1 @@ -../../archive/mail.898.ro/chain15.pem \ No newline at end of file +../../archive/mail.898.ro/chain16.pem \ No newline at end of file diff --git a/letsencrypt/live/mail.898.ro/fullchain.pem b/letsencrypt/live/mail.898.ro/fullchain.pem index 84d88f3..e99a8ec 120000 --- a/letsencrypt/live/mail.898.ro/fullchain.pem +++ b/letsencrypt/live/mail.898.ro/fullchain.pem @@ -1 +1 @@ -../../archive/mail.898.ro/fullchain15.pem \ No newline at end of file +../../archive/mail.898.ro/fullchain16.pem \ No newline at end of file diff --git a/letsencrypt/live/mail.898.ro/privkey.pem b/letsencrypt/live/mail.898.ro/privkey.pem index 7c5bee3..f24e5de 120000 --- a/letsencrypt/live/mail.898.ro/privkey.pem +++ b/letsencrypt/live/mail.898.ro/privkey.pem @@ -1 +1 @@ -../../archive/mail.898.ro/privkey15.pem \ No newline at end of file +../../archive/mail.898.ro/privkey16.pem \ No newline at end of file diff --git a/letsencrypt/live/mail.anywhere.ro/cert.pem b/letsencrypt/live/mail.anywhere.ro/cert.pem index 27aef02..ca0d599 120000 --- a/letsencrypt/live/mail.anywhere.ro/cert.pem +++ b/letsencrypt/live/mail.anywhere.ro/cert.pem @@ -1 +1 @@ -../../archive/mail.anywhere.ro/cert16.pem \ No newline at end of file +../../archive/mail.anywhere.ro/cert17.pem \ No newline at end of file diff --git a/letsencrypt/live/mail.anywhere.ro/chain.pem b/letsencrypt/live/mail.anywhere.ro/chain.pem index 7b39706..d129bb5 120000 --- a/letsencrypt/live/mail.anywhere.ro/chain.pem +++ b/letsencrypt/live/mail.anywhere.ro/chain.pem @@ -1 +1 @@ -../../archive/mail.anywhere.ro/chain16.pem \ No newline at end of file +../../archive/mail.anywhere.ro/chain17.pem \ No newline at end of file diff --git a/letsencrypt/live/mail.anywhere.ro/fullchain.pem b/letsencrypt/live/mail.anywhere.ro/fullchain.pem index 54fa125..2f44d36 120000 --- a/letsencrypt/live/mail.anywhere.ro/fullchain.pem +++ b/letsencrypt/live/mail.anywhere.ro/fullchain.pem @@ -1 +1 @@ -../../archive/mail.anywhere.ro/fullchain16.pem \ No newline at end of file +../../archive/mail.anywhere.ro/fullchain17.pem \ No newline at end of file diff --git a/letsencrypt/live/mail.anywhere.ro/privkey.pem b/letsencrypt/live/mail.anywhere.ro/privkey.pem index 3dd2e25..2fadf3b 120000 --- a/letsencrypt/live/mail.anywhere.ro/privkey.pem +++ b/letsencrypt/live/mail.anywhere.ro/privkey.pem @@ -1 +1 @@ -../../archive/mail.anywhere.ro/privkey16.pem \ No newline at end of file +../../archive/mail.anywhere.ro/privkey17.pem \ No newline at end of file diff --git a/mock/opensuse-leap-15.3-aarch64.cfg b/mock/eol/opensuse-leap-15.3-aarch64.cfg similarity index 74% rename from mock/opensuse-leap-15.3-aarch64.cfg rename to mock/eol/opensuse-leap-15.3-aarch64.cfg index 90b7957..194adf7 100644 --- a/mock/opensuse-leap-15.3-aarch64.cfg +++ b/mock/eol/opensuse-leap-15.3-aarch64.cfg @@ -1,4 +1,4 @@ -include('templates/opensuse-leap-15.3.tpl') +include('eol/templates/opensuse-leap-15.3.tpl') config_opts['root'] = 'opensuse-leap-15.3-aarch64' config_opts['target_arch'] = 'aarch64' diff --git a/mock/opensuse-leap-15.3-ppc64le.cfg b/mock/eol/opensuse-leap-15.3-ppc64le.cfg similarity index 74% rename from mock/opensuse-leap-15.3-ppc64le.cfg rename to mock/eol/opensuse-leap-15.3-ppc64le.cfg index c9286f3..ffcbc7a 100644 --- a/mock/opensuse-leap-15.3-ppc64le.cfg +++ b/mock/eol/opensuse-leap-15.3-ppc64le.cfg @@ -1,4 +1,4 @@ -include('templates/opensuse-leap-15.3.tpl') +include('eol/templates/opensuse-leap-15.3.tpl') config_opts['root'] = 'opensuse-leap-15.3-ppc64le' config_opts['target_arch'] = 'ppc64le' diff --git a/mock/opensuse-leap-15.3-s390x.cfg b/mock/eol/opensuse-leap-15.3-s390x.cfg similarity index 73% rename from mock/opensuse-leap-15.3-s390x.cfg rename to mock/eol/opensuse-leap-15.3-s390x.cfg index 6a036ae..8276d60 100644 --- a/mock/opensuse-leap-15.3-s390x.cfg +++ b/mock/eol/opensuse-leap-15.3-s390x.cfg @@ -1,4 +1,4 @@ -include('templates/opensuse-leap-15.3.tpl') +include('eol/templates/opensuse-leap-15.3.tpl') config_opts['root'] = 'opensuse-leap-15.3-s390x' config_opts['target_arch'] = 's390x' diff --git a/mock/opensuse-leap-15.3-x86_64.cfg b/mock/eol/opensuse-leap-15.3-x86_64.cfg similarity index 73% rename from mock/opensuse-leap-15.3-x86_64.cfg rename to mock/eol/opensuse-leap-15.3-x86_64.cfg index 4cc4db6..482d2d2 100644 --- a/mock/opensuse-leap-15.3-x86_64.cfg +++ b/mock/eol/opensuse-leap-15.3-x86_64.cfg @@ -1,4 +1,4 @@ -include('templates/opensuse-leap-15.3.tpl') +include('eol/templates/opensuse-leap-15.3.tpl') config_opts['root'] = 'opensuse-leap-15.3-x86_64' config_opts['target_arch'] = 'x86_64' diff --git a/mock/templates/opensuse-leap-15.3.tpl b/mock/eol/templates/opensuse-leap-15.3.tpl similarity index 100% rename from mock/templates/opensuse-leap-15.3.tpl rename to mock/eol/templates/opensuse-leap-15.3.tpl diff --git a/mock/mageia-10-aarch64.cfg b/mock/mageia-10-aarch64.cfg new file mode 120000 index 0000000..849dccd --- /dev/null +++ b/mock/mageia-10-aarch64.cfg @@ -0,0 +1 @@ +mageia-cauldron-aarch64.cfg \ No newline at end of file diff --git a/mock/mageia-10-armv7hl.cfg b/mock/mageia-10-armv7hl.cfg new file mode 120000 index 0000000..e93ddf2 --- /dev/null +++ b/mock/mageia-10-armv7hl.cfg @@ -0,0 +1 @@ +mageia-cauldron-armv7hl.cfg \ No newline at end of file diff --git a/mock/mageia-10-i586.cfg b/mock/mageia-10-i586.cfg new file mode 120000 index 0000000..59ad0cb --- /dev/null +++ b/mock/mageia-10-i586.cfg @@ -0,0 +1 @@ +mageia-cauldron-i586.cfg \ No newline at end of file diff --git a/mock/mageia-10-x86_64.cfg b/mock/mageia-10-x86_64.cfg new file mode 120000 index 0000000..c540a9e --- /dev/null +++ b/mock/mageia-10-x86_64.cfg @@ -0,0 +1 @@ +mageia-cauldron-x86_64.cfg \ No newline at end of file diff --git a/mock/mageia-9-aarch64.cfg b/mock/mageia-9-aarch64.cfg deleted file mode 120000 index 849dccd..0000000 --- a/mock/mageia-9-aarch64.cfg +++ /dev/null @@ -1 +0,0 @@ -mageia-cauldron-aarch64.cfg \ No newline at end of file diff --git a/mock/mageia-9-aarch64.cfg b/mock/mageia-9-aarch64.cfg new file mode 100644 index 0000000..5803929 --- /dev/null +++ b/mock/mageia-9-aarch64.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '9' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) + +include('templates/mageia-branched.tpl') diff --git a/mock/mageia-9-armv7hl.cfg b/mock/mageia-9-armv7hl.cfg deleted file mode 120000 index e93ddf2..0000000 --- a/mock/mageia-9-armv7hl.cfg +++ /dev/null @@ -1 +0,0 @@ -mageia-cauldron-armv7hl.cfg \ No newline at end of file diff --git a/mock/mageia-9-armv7hl.cfg b/mock/mageia-9-armv7hl.cfg new file mode 100644 index 0000000..ec3f33f --- /dev/null +++ b/mock/mageia-9-armv7hl.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '9' +config_opts['target_arch'] = 'armv7hl' +config_opts['legal_host_arches'] = ('armv7l', 'armv7hl', 'armv8l', 'armv8hl', 'aarch64') + +include('templates/mageia-branched.tpl') diff --git a/mock/mageia-9-i586.cfg b/mock/mageia-9-i586.cfg deleted file mode 120000 index 59ad0cb..0000000 --- a/mock/mageia-9-i586.cfg +++ /dev/null @@ -1 +0,0 @@ -mageia-cauldron-i586.cfg \ No newline at end of file diff --git a/mock/mageia-9-i586.cfg b/mock/mageia-9-i586.cfg new file mode 100644 index 0000000..435d5fa --- /dev/null +++ b/mock/mageia-9-i586.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '9' +config_opts['target_arch'] = 'i586' +config_opts['legal_host_arches'] = ('i386', 'i586', 'i686', 'x86_64') + +include('templates/mageia-branched.tpl') diff --git a/mock/mageia-9-x86_64.cfg b/mock/mageia-9-x86_64.cfg deleted file mode 120000 index c540a9e..0000000 --- a/mock/mageia-9-x86_64.cfg +++ /dev/null @@ -1 +0,0 @@ -mageia-cauldron-x86_64.cfg \ No newline at end of file diff --git a/mock/mageia-9-x86_64.cfg b/mock/mageia-9-x86_64.cfg new file mode 100644 index 0000000..8be7643 --- /dev/null +++ b/mock/mageia-9-x86_64.cfg @@ -0,0 +1,5 @@ +config_opts['releasever'] = '9' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) + +include('templates/mageia-branched.tpl') diff --git a/mock/opensuse-leap-15.5-aarch64.cfg b/mock/opensuse-leap-15.5-aarch64.cfg new file mode 100644 index 0000000..e4686b1 --- /dev/null +++ b/mock/opensuse-leap-15.5-aarch64.cfg @@ -0,0 +1,5 @@ +include('templates/opensuse-leap-15.5.tpl') + +config_opts['root'] = 'opensuse-leap-15.5-aarch64' +config_opts['target_arch'] = 'aarch64' +config_opts['legal_host_arches'] = ('aarch64',) diff --git a/mock/opensuse-leap-15.5-ppc64le.cfg b/mock/opensuse-leap-15.5-ppc64le.cfg new file mode 100644 index 0000000..07132f6 --- /dev/null +++ b/mock/opensuse-leap-15.5-ppc64le.cfg @@ -0,0 +1,5 @@ +include('templates/opensuse-leap-15.5.tpl') + +config_opts['root'] = 'opensuse-leap-15.5-ppc64le' +config_opts['target_arch'] = 'ppc64le' +config_opts['legal_host_arches'] = ('ppc64le',) diff --git a/mock/opensuse-leap-15.5-s390x.cfg b/mock/opensuse-leap-15.5-s390x.cfg new file mode 100644 index 0000000..2928729 --- /dev/null +++ b/mock/opensuse-leap-15.5-s390x.cfg @@ -0,0 +1,5 @@ +include('templates/opensuse-leap-15.5.tpl') + +config_opts['root'] = 'opensuse-leap-15.5-s390x' +config_opts['target_arch'] = 's390x' +config_opts['legal_host_arches'] = ('s390x',) diff --git a/mock/opensuse-leap-15.5-x86_64.cfg b/mock/opensuse-leap-15.5-x86_64.cfg new file mode 100644 index 0000000..9d8b212 --- /dev/null +++ b/mock/opensuse-leap-15.5-x86_64.cfg @@ -0,0 +1,5 @@ +include('templates/opensuse-leap-15.5.tpl') + +config_opts['root'] = 'opensuse-leap-15.5-x86_64' +config_opts['target_arch'] = 'x86_64' +config_opts['legal_host_arches'] = ('x86_64',) diff --git a/mock/templates/fedora-eln.tpl b/mock/templates/fedora-eln.tpl index 1f5ea78..23ca3c0 100644 --- a/mock/templates/fedora-eln.tpl +++ b/mock/templates/fedora-eln.tpl @@ -13,7 +13,10 @@ config_opts['chroot_setup_cmd'] = 'install bash bzip2 coreutils cpio diffutils f config_opts['dist'] = 'eln' # only useful for --resultdir variable subst config_opts['extra_chroot_dirs'] = [ '/run/lock', ] config_opts['package_manager'] = 'dnf' -config_opts['bootstrap_image'] = 'fedora:latest' + +# Per https://github.com/fedora-eln/eln/issues/164 updated up to 4 times a day. +# Docs: https://docs.fedoraproject.org/en-US/eln/deliverables/#_container_image +config_opts['bootstrap_image'] = 'quay.io/fedoraci/fedora:eln' config_opts['dnf.conf'] = """ [main] diff --git a/mock/templates/mageia-cauldron.tpl b/mock/templates/mageia-cauldron.tpl index bddaa04..195830b 100644 --- a/mock/templates/mageia-cauldron.tpl +++ b/mock/templates/mageia-cauldron.tpl @@ -2,7 +2,7 @@ config_opts['root'] = 'mageia-cauldron-{{ target_arch }}' config_opts['chroot_setup_cmd'] = 'install basesystem-minimal-core rpm-build rpm-mageia-setup rpm-mageia-setup-build' config_opts['dist'] = 'cauldron' # only useful for --resultdir variable subst config_opts['extra_chroot_dirs'] = [ '/run/lock', ] -config_opts['releasever'] = '9' +config_opts['releasever'] = '10' config_opts['macros']['%distro_section'] = 'core' config_opts['package_manager'] = 'dnf' config_opts['bootstrap_image'] = 'docker.io/library/mageia:cauldron' diff --git a/mock/templates/opensuse-leap-15.5.tpl b/mock/templates/opensuse-leap-15.5.tpl new file mode 100644 index 0000000..a1a4748 --- /dev/null +++ b/mock/templates/opensuse-leap-15.5.tpl @@ -0,0 +1,85 @@ +config_opts['chroot_setup_cmd'] = 'install patterns-devel-base-devel_rpm_build' +config_opts['dist'] = 'suse.lp155' # only useful for --resultdir variable subst +config_opts['extra_chroot_dirs'] = [ '/run/lock', ] +config_opts['releasever'] = '15.5' +config_opts['macros']['%dist'] = '.suse.lp155' +config_opts['package_manager'] = 'dnf' +config_opts['bootstrap_image'] = 'registry.opensuse.org/opensuse/leap-dnf:15.5' +config_opts['ssl_ca_bundle_path'] = '/var/lib/ca-certificates/ca-bundle.pem' +config_opts['description'] = 'openSUSE Leap {{ releasever }}' + +# Due to the nature of the OpenSUSE mirroring system, we can not use +# metalinks easily and also we can not rely on the fact that baseurl's +# always work (issue #553) -- by design we need to expect a one minute +# repository problems (configured four attempts means 3 periods of 20s). +config_opts['package_manager_max_attempts'] = 4 +config_opts['package_manager_attempt_delay'] = 20 + +config_opts['dnf.conf'] = """ +[main] +keepcache=1 +debuglevel=2 +reposdir=/dev/null +logfile=/var/log/yum.log +retries=20 +obsoletes=1 +gpgcheck=0 +assumeyes=1 +syslog_ident=mock +syslog_device= +install_weak_deps=0 +metadata_expire=0 +best=1 +{% if target_arch == 'x86_64' %} +excludepkgs=*.i586,*.i686,*.ppc,*.ppc64,*.ppc64le,*.s390x +{% elif target_arch == 'i586' %} +excludepkgs=*.x86_64,*.ppc,*.ppc64,*.ppc64le,*.s390x +{% elif target_arch == 'ppc64le' %} +excludepkgs=*.ppc,*.ppc64,*.x86_64,*.i586,*.i686,*.s390x +{% elif target_arch == 'ppc64' %} +excludepkgs=*.ppc,*.ppc64le,*.x86_64,*.i586,*.i686,*.s390x +{% elif target_arch == 's390x' %} +excludepkgs=*.ppc,*.ppc64,*.ppc64le,*.x86_64,*.i586,*.i686 +{% endif %} + +protected_packages= +user_agent={{ user_agent }} + +# repos + +[opensuse-leap-oss] +name=openSUSE Leap $releasever - {{ target_arch }} - OSS +baseurl=https://download.opensuse.org/distribution/leap/$releasever/repo/oss/ +#metalink=https://download.opensuse.org/distribution/leap/$releasever/repo/oss/repodata/repomd.xml.metalink +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/opensuse/RPM-GPG-KEY-openSUSE-2022 + file:///usr/share/distribution-gpg-keys/opensuse/RPM-GPG-KEY-openSUSE-Backports-2023 + file:///usr/share/distribution-gpg-keys/suse/RPM-GPG-KEY-SuSE-SLE-15 + file:///usr/share/distribution-gpg-keys/suse/RPM-GPG-KEY-SuSE-SLE-Main-2023 +gpgcheck=1 + +[opensuse-leap-oss-update] +name=openSUSE Leap $releasever - {{ target_arch }} - OSS - Updates +baseurl=https://download.opensuse.org/update/leap/$releasever/oss/ +#metalink=https://download.opensuse.org/update/leap/$releasever/oss/repodata/repomd.xml.metalink +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/opensuse/RPM-GPG-KEY-openSUSE-2022 +gpgcheck=1 + +[opensuse-leap-sle-update] +name=openSUSE Leap $releasever - {{ target_arch }} - Updates from SUSE Linux Enterprise +baseurl=https://download.opensuse.org/update/leap/$releasever/sle/ +#metalink=https://download.opensuse.org/update/leap/$releasever/sle/repodata/repomd.xml.metalink +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/suse/RPM-GPG-KEY-SuSE-SLE-Main-2023 +gpgcheck=1 + +[opensuse-leap-sle-backports-update] +name=openSUSE Leap $releasever - {{ target_arch }} - Updates from Backports for SUSE Linux Enterprise +baseurl=https://download.opensuse.org/update/leap/$releasever/backports/ +#metalink=https://download.opensuse.org/update/leap/$releasever/backports/repodata/repomd.xml.metalink +enabled=1 +gpgkey=file:///usr/share/distribution-gpg-keys/opensuse/RPM-GPG-KEY-openSUSE-Backports-2023 +gpgcheck=1 + +""" diff --git a/rspamd/composites.conf b/rspamd/composites.conf index e598f73..fe89808 100644 --- a/rspamd/composites.conf +++ b/rspamd/composites.conf @@ -16,6 +16,12 @@ composites { + SHORT_PART_BAD_HEADERS { + expression = "MISSING_ESSENTIAL_HEADERS & SINGLE_SHORT_PART"; + group = "blankspam"; + policy = "leave"; + score = 7.0; + } FORGED_RECIPIENTS_MAILLIST { expression = "FORGED_RECIPIENTS & -MAILLIST"; } diff --git a/rspamd/lang_detection.inc b/rspamd/lang_detection.inc index 50c62ad..16bfa3f 100644 --- a/rspamd/lang_detection.inc +++ b/rspamd/lang_detection.inc @@ -9,7 +9,7 @@ # parameters defined inside this section # Path to the languages shared data -# languages = "${RSPAMD_SHAREDIR}/languages" +# languages = "${SHAREDIR}/languages" # Limit in words to treat text as short for language detection # short_text_limit = 10 @@ -21,7 +21,7 @@ # languages_disable = ["fr", "es"] # Use the following fasttext model for language detection (if Fasttext support is compiled in) -# fasttext_model = "${RSPAMD_SHAREDIR}/languages/fasttext_model.ftz" +# fasttext_model = "${SHAREDIR}/languages/fasttext_model.ftz" # Prefer fasttext over all other methods # prefer_fasttext = true; diff --git a/rspamd/modules.d/rbl.conf b/rspamd/modules.d/rbl.conf index c1ef6af..dcb5661 100644 --- a/rspamd/modules.d/rbl.conf +++ b/rspamd/modules.d/rbl.conf @@ -105,6 +105,7 @@ rbl { ipv6 = true; checks = ['from', 'received']; is_whitelist = true; + returncodes_matcher = "luapattern"; whitelist_exception = "RCVD_IN_DNSWL"; whitelist_exception = "RCVD_IN_DNSWL_NONE"; whitelist_exception = "RCVD_IN_DNSWL_LOW"; @@ -152,6 +153,7 @@ rbl { rbl = "dwl.dnswl.org"; checks = ['dkim']; ignore_whitelist = true; + returncodes_matcher = "luapattern"; unknown = false; returncodes { @@ -222,6 +224,7 @@ rbl { selector = "specific_urls_filter_map('surbl_hashbl_map', {limit = 10}).apply_methods('get_host', 'get_path').join_tables('/')", hash = 'md5'; hash_len = 32; + returncodes_matcher = "luapattern"; returncodes = { SURBL_HASHBL_PHISH = "127.0.0.8"; SURBL_HASHBL_MALWARE = "127.0.0.16";