Plesk 12.x / Linux :: Wildcard SSL Certificate On Subdomain - Connection Untrusted
Dec 16, 2014
I have a new Plesk 12 installation. I have configured a domain (example.com) with hosting that also requires wildcard subdomains.
To achieve this I had to create a vhost.conf file with...
ServerAlias *.example.com
This works and I can go to http://anything.example.com with no issue.
I purchased a wildcard SSL certificate for *.example.com and successfully installed it.
If I go to https://example.com it works perfectly and shows the correct certificate, however if I go to https://anything.example.com it tells me the connection is untrusted, when I view the certificate, it shows the Parallels Plesk self certified certificate and not my purchased certificate.
I created a vhost_ssl.conf with
ServerAlias *.example.com
ServerAlias *.example.com:443 #tried with and without this line
If I add an exception in the browser, then I am taken to the correct place, albeit with the incorrect certificate.
Of course I have executed httpdmng --reconfigure-domain example.com and also tried a full reboot.
In summary:
http://example.com - works
http://anything.example.com - works
https://example.com works with my certificate
https://anything.example.com has Parallels certificate but routes to correct page
I have a problem with Nginx on myPlesk 12 with wildcard dns.I want subdomains URl to be like root domain url. Exemple. URL...You can see a live exemple here: URL.... give error 404 instead of showing root domain file (URL....). It's the same for images.What specific rule I must add in plesk panel?
I am running a CentOS 6.5, 64-bit server with Plesk 12.0.18, and need to install a wildcard SSL for one of the domains/sub domains hosted on this server.
So you have the csr and private key installed (and domain.crt?), you just need to open..
I'm using my webhost providers ssl certificate and get this error:
"The server you are connected to is using a security certificate that could not be verified. A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider. "
This happens with every machine I use. The certificate is issued by rapidssl.
How can I fix this? Its not practical to ask every user to install the certificate on their local client.
I've written a script to send property data to rightmove.co.uk as part of their new automated data feed. However they require a secure connection to their systems when posting the data. They have provided me with a .pem file which is a security certificate. I need to install this on my plesk server but where to start as most certificates require a private key and the actual certificate. The private key I have been provided is only an 8 charter string, like a password.
A software developer has uncovered a bug in most versions of Linux that could allow untrusted users to gain complete control over the open-source operating system.
The null pointer dereference flaw was only fixed in the upcoming 2.6.32 release candidate of the Linux kernel, making virtually all production versions in use at the moment vulnerable. While attacks can be prevented by implementing a common feature known as mmap_min_addr, the RHEL distribution, short for Red Hat Enterprise Linux, doesn't properly implement that protection, Brad Spengler, who discovered the bug in mid October, told The Register.
Read the complete article at The Register. New kernels are available for Redhat and CentOS (obviously), and likely others who may be affected.
I want to run a script that will loop through all of the domains on a particular server and remove all MX records with mail.*.I am testing on a single test domain at the moment but I'm not sure how to do the wildcard./usr/local/psa/bin/dns -d example.com -mx '' -mailexchanger mail.*
The following example command is from: URL....To add an MX resource record mail3.example.com specifying domain name mail.example.com as the mail exchanger for the record, and setting the mail exchanger's priority to the DNS zone on the domain example.com to 15:
# ./dns -a example.com -mx mail3 -mailexchanger mail.example.com -priority 15..What does the mail3.example.com got to do with it? Isn't it just adding a MX record mail.example.com?
I have several domains configured in my Plesk, and one of them is set as the "Detault site" under Home >> Tools & Setings > IP address management.This has the unpleasant side effect that any domain I point to this IP renders content from the Default site unless it's setup. How can I configure the default site to render content from only one domain?
I have issue with qmail server. I want to update ssl certificate and for this i have replaced older servercert.pem with new servercert.pem file in /var / qmail/ control/. and restart service of qmail using qmailctl restart.But after updating this certificate my web browser still showing older certificate details.
I installed a new ssl certificate, changed it to be default and secure Plesk, switched the IP to use it. Now I wanted to remove the old one but it shows me that there is still one usage of this cert and I can't remove it. But how can I find what is using it?
I tried to remove the ssl certificate but although I have removed it from the IP I'm getting an error that it is still assigned to it. The solution in [URL] .... didn't work cause the Certificate field is grey out in my case.
I am replacing the default certificate in Plesk so that customers do not get a certificate warning when visiting the panel login page.
I've created the certificate in the "SSL Certificates" section made it default and used it to secure Plesk. However I've still got all the existing domains using the old default certificate, how can I do a mass changeover so that all existing domains are now using the new certificate?
I've updated the IP's to use the new certificate. When I go to "SSL Certificates" in "Tools and Settings", it seems that there are some domains now using the new certificate but quite a lot of the other are still not, how can I get these over too?
I’ve read the documentations of (PBAS, Plesk, and Securing Websites).how to add SSL Certificate to our Webmail? In addition, I need to know, how to request CSR key and install SSL for our mail server in order for us to protect our emails and to use the SSL Protocol in mail softwares such as Outlook? I will explain the scenario in details:
1- We have (www.example.com) which is our "Plesk Server hostname" and a subscription in our "Plesk Server". 2- We have (pbas.example.com) which is our "PBAS Server hostname" and it's not a subscription in our "Plesk Server". 3- We have (account.example.com) which is a "Subscription" in our "Plesk Server".
Here are the DNS records of our domain and subdomains: Host-Type-Data -A-192.168.1.30 www-A-192.168.1.30 mail-A-192.168.1.30 pbas-A-192.168.1.31 account-A-192.168.1.32 -MX-example.com.
how to generate CSR key for each domain/subdomain and how to install the SSL for it? Our "Plesk" is 11.5 and installed on CentOS 6.4.
When using `plesk bin --update domain.example.com -certificate-name 'certificate'`, Plesk always returns `Unable to find certificate`, I have verified the certificate exists using `plesk bin certificate -l -admin` and the spelling of the certificate name is correct. I can use the WebUI to associate the certificate to the site and have verified it works, however I need to automate this task.
Also, the online documentation for the `plesk bin site` command does not mention the `-certificate-name` option, however it is listed when running `plesk bin site -h`.
The documentation missing the information is found here: [URL] ....
I'm running Parallels Plesk 12 on Debian GNU/Linux 7.6...I have a valid certificate for my mail server : mail.mydomain.tld but I don't find the place in Plesk 12 to put it.
My System: Ubuntu 12.04 Plesk 12.0.18 Update #18 Only Webserver no mail
What I want: I have an old sha1 certificate and I would change this for the whole server.
What I have done so far: I have already uploaded the new sha256 certificate with a new private key to plesk (I can not simply replace the old one, plesk does not allow me to upload a new private key).
Then I set the new certificate as standard certificate and pressed the "secure pannel" button.
After that the panel uses the new certificate.
Then I set in "Tools & Settings -> IP Addresses" on both IP addresses the new certificate.
Reboot
But now the "Tools & Settings -> SSL Certificates" shows me that the old certificate is still used 2 times somewhere. But the Interface does not show where it is used. How can I find out where this certificate is used? I want to remove the old certificate from the server.
I've got an issue with the intermediate certificate, I need to provide additional to my certificate. As usual, I created a cert bundle with certs in following order:
- key data (BEGIN RSA PRIVATE KEY) - crt data (BEGIN CERTIFICATE - intermediate data (BEGIN CERTIFICATE)
And uploaded it successful to Plesk 12 certificate management. In Chrome, it's working. In Firefox not (as the intermediate cert is not provided by Plesk 12, and Firefox requires it).
How to inject the intermediate certificate for Plesk 12?
I am developing new module and installed SSL certificate using following API call.
Request call: <packet> <certificate> <install>
[Code]....
But when i checked this domain by open in browser. the certificate is not installed. After lots of R&D i found that there are option of select SSL in hosting setting screen. The default selected SSL is "default certificate".
I have changed this option to "not selected".
After this changes i have installed certificate again and it is working fine. So is it bug in plesk or it is default behavior Plesk Panel?