03 2023
|
update: 2023/03/30 16:34 | path: /pub/house
DATE TIME | IP-ADDRESS | DOMAIN-NAME | MAIL-FROM |
---|---|---|---|
Mar 21 01:43:42 | 133.18.220.190 | v133-18-220-190.vir.kagoya.net | hgsocclzq@direct.smtb.jp |
Mar 21 02:21:53 | 133.18.214.18 | v133-18-214-18.vir.kagoya.net | nllai@direct.smtb.jp |
Mar 21 03:23:42 | 133.18.215.83 | v133-18-215-83.vir.kagoya.net | cvfzfrb@direct.smtb.jp |
Mar 21 03:26:36 | 133.18.221.193 | v133-18-221-193.vir.kagoya.net | nkom@direct.smtb.jp |
Mar 21 03:52:30 | 133.18.213.177 | v133-18-213-177.vir.kagoya.net | dbjdgxqd@direct.smtb.jp |
Mar 21 04:35:14 | 133.18.212.129 | v133-18-212-129.vir.kagoya.net | fwk@direct.smtb.jp |
Mar 21 04:42:07 | 133.18.213.240 | v133-18-213-240.vir.kagoya.net | snil@direct.smtb.jp |
Mar 21 05:11:21 | 133.18.210.230 | v133-18-210-230.vir.kagoya.net | uw@direct.smtb.jp |
Mar 21 06:17:26 | 133.18.211.85 | v133-18-211-85.vir.kagoya.net | pumgviiwep@direct.smtb.jp |
Mar 21 06:25:52 | 133.18.220.177 | v133-18-220-177.vir.kagoya.net | dy@direct.smtb.jp |
Mar 21 06:27:33 | 133.18.215.40 | v133-18-215-40.vir.kagoya.net | gsu@direct.smtb.jp |
Mar 21 07:51:47 | 133.18.224.108 | v133-18-224-108.vir.kagoya.net | mte@direct.smtb.jp |
Mar 21 08:54:53 | 133.18.218.209 | v133-18-218-209.vir.kagoya.net | pqedhw@direct.smtb.jp |
Mar 22 07:14:50 | 133.18.218.159 | v133-18-218-159.vir.kagoya.net | jw@direct.smtb.jp |
Mar 22 07:45:36 | 133.18.207.254 | v133-18-207-254.vir.kagoya.net | pzie@direct.smtb.jp |
Mar 22 07:51:02 | 133.18.206.67 | v133-18-206-67.vir.kagoya.net | bymff@direct.smtb.jp |
Mar 22 08:37:01 | 133.18.224.13 | v133-18-224-13.vir.kagoya.net | qtqjsusznf@direct.smtb.jp |
Mar 22 08:37:04 | 133.18.220.109 | v133-18-220-109.vir.kagoya.net | ybvh@direct.smtb.jp |
Mar 22 09:25:17 | 133.18.210.113 | v133-18-210-113.vir.kagoya.net | owm@direct.smtb.jp |
昨日(3/21)と本日(3/22)に、KAGOYA様が管理している下記IPアドレスから、スパムメールを受信しました。 スパムメール送信されている状況の報告は、何処にすれば良いでしょうか? 133.18.220.190 133.18.214.18 133.18.215.83 133.18.221.193 133.18.213.177 133.18.212.129 133.18.213.240 133.18.210.230 133.18.211.85 133.18.220.177 133.18.215.40 133.18.224.108 133.18.218.209 133.18.218.159 133.18.207.254 133.18.206.67 133.18.224.13
update: 2023/03/23 11:28 | path: /pub/spam
共通名 | $(MYNAME1) |
---|---|
代替名 | $(MYNAME1), $(MYNAME2), $(MYNAME3), $(MYNAME4) |
$(MYEMAIL) |
$ sudo certbot certonly --apache --agree-tos -m $(MYEMAIL) -d $(MYNAME1) -d $(MYNAME2) -d $(MYNAME3) -d $(MYNAME4) Saving debug log to /var/log/letsencrypt/letsencrypt.log - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - You have an existing certificate that contains a portion of the domains you requested (ref: /etc/letsencrypt/renewal/$(MYDOMAIN1).conf) It contains these names: $(MYDOMAIN1), $(MYDOMAIN2) You requested these names for the new certificate: $(MYDOMAIN1), $(MYDOMAIN2), $(MYNAME3), $(MYNAME4) Do you want to expand and replace this existing certificate with the new certificate? - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - (E)xpand/(C)ancel: E Renewing an existing certificate for $(MYDOMAIN1) and 3 more domains Successfully received certificate. Certificate is saved at: /etc/letsencrypt/live/$(MYDOMAIN1)/fullchain.pem Key is saved at: /etc/letsencrypt/live/$(MYDOMAIN1)/privkey.pem This certificate expires on 20xx-xx-xx. These files will be updated when the certificate renews. Certbot has set up a scheduled task to automatically renew this certificate in the background. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - If you like Certbot, please consider supporting our work by: * Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate * Donating to EFF: https://eff.org/donate-le - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
$ sudo systemctl restart apache2
update: 2023/03/06 10:42 | path: /pub/software/ssl
共通名 | $(MYNAME1) |
---|---|
代替名 | $(MYNAME1), $(MYNAME2) |
$(MYEMAIL) |
$ sudo apt install snapd
$ sudo snap install core $ sudo snap refresh core
$ sudo snap install --classic certbot $ sudo ln -s /snap/bin/certbot /usr/bin/certbot
$ sudo certbot certonly --apache -d $(MYNAME1) -d $(MYNAME2) --agree-tos -m $(MYEMAIL) Saving debug log to /var/log/letsencrypt/letsencrypt.log - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Would you be willing, once your first certificate is successfully issued, to share your email address with the Electronic Frontier Foundation, a founding partner of the Let's Encrypt project and the non-profit organization that develops Certbot? We'd like to send you email about our work encrypting the web, EFF news, campaigns, and ways to support digital freedom. 最初の証明書が正常に発行されたら、Let's Encrypt プロジェクトの創設パートナーであり、 Certbot を開発する非営利団体である Electronic Frontier Foundation と電子メール アドレスを共有してもよろしいですか? ウェブを暗号化する取り組み、EFF ニュース、キャンペーン、デジタルの自由をサポートする方法についてメールでお知らせします。 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - (Y)es/(N)o: N Account registered. Requesting a certificate for $(MYNAME1) and 1 more domains Successfully received certificate. Certificate is saved at: /etc/letsencrypt/live/$(MYNAME1)/fullchain.pem Key is saved at: /etc/letsencrypt/live/$(MYNAME1)/privkey.pem This certificate expires on 20xx-xx-xx. These files will be updated when the certificate renews. Certbot has set up a scheduled task to automatically renew this certificate in the background. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - If you like Certbot, please consider supporting our work by: * Donating to ISRG / Let's Encrypt: https://letsencrypt.org/donate * Donating to EFF: https://eff.org/donate-le - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
... SSLCertificateFile /etc/letsencrypt/live/$(MYNAME1)/fullchain.pem SSLCertificateKeyFile /etc/letsencrypt/live/$(MYNAME1)/privkey.pem ...
$ sudo systemctl restart apache2
$ systemctl list-timers | grep certbot Fri 20xx-xx-xx 08:33:00 JST 16h left n/a n/a snap.certbot.renew.timer snap.certbot.renew.servicesystemdのファイルは /etc/systemd/system/snap.certbot.renew.service です。
update: 2023/03/06 10:36 | path: /pub/software/ssl
$ openssl x509 -text -noout -in FILENAME.pem
$ openssl rsa -text -noout -in FILENAME.pem
$ openssl req -text -noout -in FILENAME.pem
update: 2023/03/02 14:57 | path: /pub/software/ssl