Script started on Thu 02 Feb 2017 10:33:32 PM UTC ]0;root@localhost:/media/HSMFD[root@localhost HSMFD]# ping 192.168.0.2 PING 192.168.0.2 (192.168.0.2) 56(84) bytes of data. 64 bytes from 192.168.0.2: icmp_seq=1 ttl=255 time=1.45 ms 64 bytes from 192.168.0.2: icmp_seq=2 ttl=255 time=0.366 ms 64 bytes from 192.168.0.2: icmp_seq=3 ttl=255 time=0.480 ms 64 bytes from 192.168.0.2: icmp_seq=4 ttl=255 time=0.362 ms 64 bytes from 192.168.0.2: icmp_seq=5 ttl=255 time=0.352 ms 64 bytes from 192.168.0.2: icmp_seq=6 ttl=255 time=0.351 ms 64 bytes from 192.168.0.2: icmp_seq=7 ttl=255 time=0.352 ms --- 192.168.0.2 ping statistics --- 7 packets transmitted, 7 received, 0% packet loss, time 5999ms rtt min/avg/max/mdev = 0.351/0.531/1.457/0.380 ms ]0;root@localhost:/media/HSMFD[root@localhost HSMFD]# ksrsigner Kjqmt7v /media/KSR/ksr-root-2017-q2-0 xml [root@localhost HSMFD]# ksrsigner Kjqmt7v /media/KSR/ksr-root-2017-q2-0xml.xml Starting: ksrsigner Kjqmt7v /media/KSR/ksr-root-2017-q2-0.xml (at Thu Feb 2 22:52:02 2017 UTC) Use HSM /opt/dnssec/aep.hsmconfig? Activate HSM prior to accepting in the affirmative!! (y/N): y HSM /opt/dnssec/aep.hsmconfig activated. [debug] setenv KEYPER_LIBRARY_PATH=/opt/dnssec [debug] setenv PKCS11_LIBRARY_PATH=/opt/Keyper/PKCS11Provider/pkcs11.GCC4.0.2.so.4.07 Found 1 slots on HSM /opt/Keyper/PKCS11Provider/pkcs11.GCC4.0.2.so.4.07 HSM slot 0 included Loaded /opt/Keyper/PKCS11Provider/pkcs11.GCC4.0.2.so.4.07 Slot=0 HSM Information: Label: ICANNKSK ManufacturerID: AEP Networks Model: Keyper 9860-2 Serial: H1403033 Validating last SKR with HSM... # Inception Expiration ZSK Tags KSK Tag(CKA_LABEL) 1 2017-01-01T00:00:00 2017-01-22T00:00:00 61045,39291 19036 2 2017-01-11T00:00:00 2017-02-01T00:00:00 61045 19036 3 2017-01-21T00:00:00 2017-02-11T00:00:00 61045 19036 4 2017-01-31T00:00:00 2017-02-21T00:00:00 61045 19036 5 2017-02-10T00:00:00 2017-03-03T00:00:00 61045 19036 6 2017-02-20T00:00:00 2017-03-13T00:00:00 61045 19036 7 2017-03-02T00:00:00 2017-03-23T00:00:00 61045 19036 8 2017-03-12T00:00:00 2017-04-02T00:00:00 61045 19036 9 2017-03-21T00:00:00 2017-04-11T00:00:00 14796,61045 19036 ...VALIDATED. Validate and Process KSR /media/KSR/ksr-root-2017-q2-0.xml... # Inception Expiration ZSK Tags KSK Tag(CKA_LABEL) 1 2017-04-01T00:00:00 2017-04-22T00:00:00 61045,14796 2 2017-04-11T00:00:00 2017-05-02T00:00:00 14796 3 2017-04-21T00:00:00 2017-05-12T00:00:00 14796 4 2017-05-01T00:00:00 2017-05-22T00:00:00 14796 5 2017-05-11T00:00:00 2017-06-01T00:00:00 14796 6 2017-05-21T00:00:00 2017-06-11T00:00:00 14796 7 2017-05-31T00:00:00 2017-06-21T00:00:00 14796 8 2017-06-10T00:00:00 2017-07-01T00:00:00 14796 9 2017-06-20T00:00:00 2017-07-11T00:00:00 15768,14796 ...PASSED. SHA256 hash of KSR: 7075069CFF6B88BDC276204014F32E8B70AB04A1F59F1769CD28EF7D16638CF4 >> guidance impartial afflict October Zulu Hamilton newborn quantity snapshot impetus bison Dakota baboon vertigo buzzard Medusa guidance Pegasus adrift outfielder vapor opulent banjo guitarist spindle cellulose uncut insincere backward Galveston offload Virginia << Is this correct (y/N)? y Generated new SKR in /media/KSR/skr-root-2017-q2-0.xml # Inception Expiration ZSK Tags KSK Tag(CKA_LABEL) 1 2017-04-01T00:00:00 2017-04-22T00:00:00 14796,61045 19036 2 2017-04-11T00:00:00 2017-05-02T00:00:00 14796 19036 3 2017-04-21T00:00:00 2017-05-12T00:00:00 14796 19036 4 2017-05-01T00:00:00 2017-05-22T00:00:00 14796 19036 5 2017-05-11T00:00:00 2017-06-01T00:00:00 14796 19036 6 2017-05-21T00:00:00 2017-06-11T00:00:00 14796 19036 7 2017-05-31T00:00:00 2017-06-21T00:00:00 14796 19036 8 2017-06-10T00:00:00 2017-07-01T00:00:00 14796 19036 9 2017-06-20T00:00:00 2017-07-11T00:00:00 14796,15768 19036 SHA256 hash of SKR: 739720869957DEC52F126A7F8A414DC6315B71534B6477261A9EED7D77E182E1 >> hockey mosquito bison letterhead prowler Eskimo tactics resistor cement backwater Geiger integrate Oakland decadence dreadful responsive chatter exodus hamlet enterprise dragnet getaway involve caretaker beehive onlooker tunnel insincere involve tolerance miser tolerance << Unloaded /opt/Keyper/PKCS11Provider/pkcs11.GCC4.0.2.so.4.07 Slot=0 ********** Log output in ./ksrsigner-20170202-225202.log ********** ]0;root@localhost:/media/HSMFD[root@localhost HSMFD]# for i in $(seq 15); do printlog ksrsigner-20170202-*.log; d one [ 2 pages * 1 copy ] sent to printer 3 lines were wrapped [ 2 pages * 1 copy ] sent to printer 3 lines were wrapped [ 2 pages * 1 copy ] sent to printer 3 lines were wrapped [ 2 pages * 1 copy ] sent to printer 3 lines were wrapped [ 2 pages * 1 copy ] sent to printer 3 lines were wrapped [ 2 pages * 1 copy ] sent to printer 3 lines were wrapped [ 2 pages * 1 copy ] sent to printer 3 lines were wrapped [ 2 pages * 1 copy ] sent to printer 3 lines were wrapped [ 2 pages * 1 copy ] sent to printer 3 lines were wrapped [ 2 pages * 1 copy ] sent to printer 3 lines were wrapped [ 2 pages * 1 copy ] sent to printer 3 lines were wrapped [ 2 pages * 1 copy ] sent to printer 3 lines were wrapped [ 2 pages * 1 copy ] sent to printer 3 lines were wrapped [ 2 pages * 1 copy ] sent to printer 3 lines were wrapped [ 2 pages * 1 copy ] sent to printer 3 lines were wrapped ]0;root@localhost:/media/HSMFD[root@localhost HSMFD]# cp -p /media/KSR/* . cp: overwrite `./skr.xml'? y ]0;root@localhost:/media/HSMFD[root@localhost HSMFD]# ls -ltr /dmedia/KSR total 80 -rwxr-xr-x 1 root root 20348 Oct 27 17:41 skr.xml.20170202225202 -rwxr-xr-x 1 root root 19556 Jan 4 14:33 ksr-root-2017-q2-0.xml -rwxr-xr-x 1 root root 20347 Feb 2 22:55 skr.xml -rwxr-xr-x 1 root root 20347 Feb 2 22:55 skr-root-2017-q2-0.xml ]0;root@localhost:/media/HSMFD[root@localhost HSMFD]# sync ]0;root@localhost:/media/HSMFD[root@localhost HSMFD]# umount /media/KSR ]0;root@localhost:/media/HSMFD[root@localhost HSMFD]# umount /media/KSRsyncls -ltr /media/KSRcp -p /media/KSR/* .for i in $(seq 15); do printlog ksrsigner-20170202-*.log; do oneksrsigner Kjqmt7v /media/KSR/ksr-root-2017-q2-0.xml  ping 192.168.0.2ksrsigner Kjqmt7v /media/KSR/ksr-root-2017-q2-0.xml for i in $(seq 15); do printlog ksrsigner-20170202-*.log; do onecp -p /media/KSR/* . ls -ltr /media/KSRsyncumount /media/KSRumount /media/KSRsyncls -ltr /media/KSRcp -p /media/KSR/* .for i in $(seq 15); do printlog ksrsigner-20170202-*.log; do oneksrsigner Kjqmt7v /media/KSR/ksr-root-2017-q2-0.xml  ping 192.168.0.2find -P /media/HSMFD_ -type f -print0 | sort -z | xargs -0 cat | sha256sum 1c668e831efca9059d4cdc69c7be1a0f2b042e84cd833566de040ba950894538 - ]0;root@localhost:/media/HSMFD[root@localhost HSMFD]# cp m-p /media/HSMFD_/KSKSlotDB.db . cp: overwrite `./KSKSlotDB.db'? y ]0;root@localhost:/media/HSMFD[root@localhost HSMFD]# cat file *.db KSKSlotDB.config.db: ASCII text KSKSlotDB.db: ASCII text, with very long lines ]0;root@localhost:/media/HSMFD[root@localhost HSMFD]# cat KSKSlotDB.db 1,256,@@,0,@@,2,1,0,0,0,@Kjqmt7v@,@4B6A716D743776@,@@,@@,@@,@@,@@,@@,0,0,0,0,0,0,1,1,0,1,1,1,0,0,0,@@,@A80020A95566BA42E886BB804CDA84E47EF56DBD7AEC612615552CEC906D2116D0EF207028C51554144DFEAFE7C7CB8F005DD18234133AC0710A81182CE1FD14AD2283BC83435F9DF2F6313251931A176DF0DA51E54F42E604860DFB359580250F559CC543C4FFD51CBE3DE8CFD06719237F9FC47EE729DA06835FA452E825E9A18EBC2ECBCF563474652C33CF56A9033BCDF5D973121797EC8089041B6E03A1B72D0A735B984E03687309332324F27C2DBA85E9DB15E83A0143382E974B0621C18E625ECEC907577D9E7BADE95241A81EBBE8A901D4D3276E40B114C0A2E6FC38D19C2E6AAB02644B2813F575FC21601E0DEE49CD9EE96A43103E524D62873D@,2048,@010001@,@@,@@,@@,@@,@@,@@,@@,@@,@@,0,0,@@ 2,256,@4558BFB273170EE8B093A1C4D76C973A28CCFDF08F546F7BE6A5A9E0751727745095BCD711823DB745021EF4D8860A85C2CD886FA6DCA41C2F5C3E3B68E478AB83E93BBFFEE7B886@,1,@@,3,1,0,0,1,@Kjqmt7v@,@4B6A716D743776@,@ @,@ @,@@,@@,@@,@@,0,1,1,1,0,0,0,0,0,0,1,1,0,1,1,@@,@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@,0,@010001@,@@,@@,@@,@@,@@,@@,@@,@@,@@,0,0,@@ 3,256,@@,0,@@,2,1,0,0,0,@Klajeyz@,@4B6C616A65797A@,@@,@@,@@,@@,@@,@@,0,0,0,0,0,0,1,1,0,1,1,1,0,0,0,@@,@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@,2048,@010001@,@@,@@,@@,@@,@@,@@,@@,@@,@@,0,0,@@ 4,256,@4558BFB273170EE8A2E2EA5FFBFD1CA8FBFB91F655C75210666DDBB97B3CCBEE469E2429168999952FF8F1B3184A83094F897A79FD81B9A01FF2CE1F58DE355BB12AA1D370D235BF@,1,@@,3,1,0,0,1,@Klajeyz@,@4B6C616A65797A@,@ @,@ @,@@,@@,@@,@@,0,1,1,1,0,0,0,0,0,0,1,1,0,1,1,@@,@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@,0,@010001@,@@,@@,@@,@@,@@,@@,@@,@@,@@,0,0,@@ ]0;root@localhost:/media/HSMFD[root@localhost HSMFD]# ]0;root@localhost:/media/HSMFD[root@localhost HSMFD]# sync ]0;root@localhost:/media/HSMFD[root@localhost HSMFD]# umount /media/HSMFD_ ]0;root@localhost:/media/HSMFD[root@localhost HSMFD]# ping 192.168.0.2\ > ]0;root@localhost:/media/HSMFD[root@localhost HSMFD]# ping 192.168.0.2\ PING 192.168.0.2 (192.168.0.2) 56(84) bytes of data. 64 bytes from 192.168.0.2: icmp_seq=1 ttl=255 time=1.80 ms 64 bytes from 192.168.0.2: icmp_seq=2 ttl=255 time=0.354 ms 64 bytes from 192.168.0.2: icmp_seq=3 ttl=255 time=0.358 ms 64 bytes from 192.168.0.2: icmp_seq=4 ttl=255 time=0.353 ms --- 192.168.0.2 ping statistics --- 4 packets transmitted, 4 received, 0% packet loss, time 3000ms rtt min/avg/max/mdev = 0.353/0.716/1.801/0.626 ms ]0;root@localhost:/media/HSMFD[root@localhost HSMFD]# keybackup -l -P 123456 Starting: keybackup -l -P 123456 (at Fri Feb 3 00:18:46 2017 UTC) 2 public keys: label:Klajeyz label:Kjqmt7v 2 private keys: label:Klajeyz label:Kjqmt7v ********** Log output in ./keybackup-20170203-001846.log ********** ]0;root@localhost:/media/HSMFD[root@localhost HSMFD]# kskgen Klajeyz Starting: kskgen Klajeyz (at Fri Feb 3 00:19:54 2017 UTC) Use HSM /opt/dnssec/aep.hsmconfig? Activate HSM prior to accepting in the affirmative!! (y/N): y HSM /opt/dnssec/aep.hsmconfig activated. [debug] setenv KEYPER_LIBRARY_PATH=/opt/dnssec [debug] setenv PKCS11_LIBRARY_PATH=/opt/Keyper/PKCS11Provider/pkcs11.GCC4.0.2.so.4.07 Found 1 slots on HSM /opt/Keyper/PKCS11Provider/pkcs11.GCC4.0.2.so.4.07 HSM slot 0 included Loaded /opt/Keyper/PKCS11Provider/pkcs11.GCC4.0.2.so.4.07 Slot=0 HSM Information: Label: ICANNKSK ManufacturerID: AEP Networks Model: Keyper 9860-2 Serial: H1403033 Looking for RSA keypair labeled "Klajeyz"... Found keypair labeled "Klajeyz" SHA256 DS resource record and hash: . IN DS 20326 8 2 E06D44B80B8F1D39A95C0B0D7C65D08458E880409BBC683457104237C7F8EC8D >> tapeworm hazardous crumpled provincial alone midsummer Belfast corporate revenge fascinate alone asteroid kiwi glossary stagnate Jupiter endorse typewriter merit Dakota puppy pyramid frighten confidence eightball autopsy crowfoot consensus soybean warranty tumor microscope << Created CSR file "Klajeyz.csr": O: Public Technical Identifiers OU: Cryptographic Business Operations CN: Root Zone KSK 2017-02-03T00:19:56+00:00 1.3.6.1.4.1.1000.53: . IN DS 20326 8 2 E06D44B80B8F1D39A95C0B0D7C65D08458E880409BBC683457104237C7F8EC8D Klajeyz.csr SHA256 thumbprint and hash: 2C607A014FD1C157532C600282EE2B3883665B6E2AD4C96169CD4D04AA13CDFF >> Burbank fortitude keyboard adviser dropper scavenger snapline Eskimo dwelling Chicago facial aftermath miser universe briefcase consulting Mohawk gossamer erase headwaters brickyard souvenir spearhead frequency gazelle sandalwood dreadful alkali reward barbecue spindle Yucatan << Unloaded /opt/Keyper/PKCS11Provider/pkcs11.GCC4.0.2.so.4.07 Slot=0 ********** Log output in ./kskgen-20170203-001954.log ********** ]0;root@localhost:/media/HSMFD[root@localhost HSMFD]# displaycsr Klajeyz.csr [?1049h[?1h= Certificate Request: Data: Version: 0 (0x0) Subject: O=Public Technical Identifiers, OU=Cryptographic Business Operatio ns, CN=Root Zone KSK 2017-02-03T00:19:56+00:00/1.3.6.1.4.1.1000.53=. IN DS 20326 8 2 E06D44B80B8F1D39A95C0B0D7C65D08458E880409BBC683457104237C7F8EC8D Subject Public Key Info: Public Key Algorithm: rsaEncryption RSA Public Key: (2048 bit) Modulus (2048 bit): 00:ac:ff:b4:09:bc:c9:39:f8:31:f7:a1:e5:ec:88: f7:a5:92:55:ec:53:04:0b:e4:32:02:73:90:a4:ce: 89:6d:6f:90:86:f3:c5:e1:77:fb:fe:11:81:63:aa: ec:7a:f1:46:2c:47:94:59:44:c4:e2:c0:26:be:5e: 98:bb:cd:ed:25:97:82:72:e1:e3:e0:79:c5:09:4d: 57:3f:0e:83:c9:2f:02:b3:2d:35:13:b1:55:0b:82: 69:29:c8:0d:d0:f9:2c:ac:96:6d:17:76:9f:d5:86: 7b:64:7c:3f:38:02:9a:bd:c4:81:52:eb:8f:20:71: 59:ec:c5:d2:32:c7:c1:53:7c:79:f4:b7:ac:28:ff: 11:68:2f:21:68:1b:f6:d6:ab:a5:55:03:2b:f6:f9: f0:36:be:b2:aa:a5:b3:77:8d:6e:eb:fb:a6:bf:9e: a1:91:be:4a:b0:ca:ea:75:9e:2f:77:3a:1f:90:29: c7:3e:cb:8d:57:35:b9:32:1d:b0:85:f1:b8:e2:d8: 03:8f:e2:94:19:92:54:8c:ee:0d:67:dd:45:47:e1: 1d:d6:3a:f9:c9:fc:1c:54:66:fb:68:4c:f0:09:d7: 19:7c:2c:f7:9e:79:2a:b5:01:e6:a8:a1:ca:51:9a: f2:cb:9b:5f:63:67:e9:4c:0d:47:50:24:51:35:7b: :  e1:b5 Exponent: 65537 (0x10001) Attributes: a0:00 Signature Algorithm: sha256WithRSAEncryption 25:35:b6:2d:84:69:79:ab:33:92:e2:7f:62:11:9a:57:a0:c1: 51:7b:ce:9a:b5:d3:9a:48:96:1c:66:ad:5e:d5:0d:af:d2:61: fa:2c:11:21:d5:c6:44:34:a5:61:03:d8:d6:0c:83:4e:db:5b: 18:9d:a1:e2:14:a8:3c:26:6d:c1:66:52:15:70:96:5e:47:fc: 9c:f1:01:77:78:2d:00:20:86:64:1c:0c:55:cb:15:bf:21:60: 70:fd:d4:9f:fb:c8:65:56:a5:ad:e8:1b:e1:88:c6:df:71:9d: 56:f1:58:e5:f7:9a:7c:dc:90:9e:af:76:65:67:fe:48:5f:c2: da:91:c5:8b:04:45:57:96:fd:ee:43:28:6a:3d:30:da:6d:f1: 05:57:15:e9:37:26:cf:ad:f5:f5:b8:53:65:23:85:9f:7b:c7: 64:6d:4f:b7:eb:72:8c:f0:5a:78:66:d6:04:b3:6e:42:1d:3e: 73:92:6c:f9:f7:2f:0e:6d:b8:d5:19:3d:39:8f:b0:d3:96:29: 6f:c3:80:01:4a:33:00:07:d8:2c:4c:4e:fd:e9:fc:44:e5:53: e7:a1:88:ee:9f:24:25:fd:85:1a:0b:5d:42:c7:b3:8c:15:37: 37:eb:8b:bd:d1:c8:5c:b2:4e:20:a8:47:fa:dc:88:26:4c:eb: 6b:fd:f1:12 (END)   (END)  [?1l>[?1049l]0;root@localhost:/media/HSMFD[root@localhost HSMFD]# ping 192.168.0.2 PING 192.168.0.2 (192.168.0.2) 56(84) bytes of data. 64 bytes from 192.168.0.2: icmp_seq=1 ttl=255 time=1.87 ms 64 bytes from 192.168.0.2: icmp_seq=2 ttl=255 time=0.499 ms 64 bytes from 192.168.0.2: icmp_seq=3 ttl=255 time=0.477 ms 64 bytes from 192.168.0.2: icmp_seq=4 ttl=255 time=0.490 ms --- 192.168.0.2 ping statistics --- 4 packets transmitted, 4 received, 0% packet loss, time 3000ms rtt min/avg/max/mdev = 0.477/0.835/1.875/0.600 ms ]0;root@localhost:/media/HSMFD[root@localhost HSMFD]# keybackup -l -P 123456 Starting: keybackup -l -P 123456 (at Fri Feb 3 00:38:25 2017 UTC) 2 public keys: label:Klajeyz label:Kjqmt7v 2 private keys: label:Klajeyz label:Kjqmt7v ********** Log output in ./keybackup-20170203-003825.log ********** ]0;root@localhost:/media/HSMFD[root@localhost HSMFD]# cd /tmp ]0;root@localhost:/tmp[root@localhost tmp]# kskgen Klajeyz Starting: kskgen Klajeyz (at Fri Feb 3 00:39:18 2017 UTC) Use HSM /opt/dnssec/aep.hsmconfig? Activate HSM prior to accepting in the affirmative!! (y/N): y HSM /opt/dnssec/aep.hsmconfig activated. [debug] setenv KEYPER_LIBRARY_PATH=/opt/dnssec [debug] setenv PKCS11_LIBRARY_PATH=/opt/Keyper/PKCS11Provider/pkcs11.GCC4.0.2.so.4.07 Found 1 slots on HSM /opt/Keyper/PKCS11Provider/pkcs11.GCC4.0.2.so.4.07 HSM slot 0 included Loaded /opt/Keyper/PKCS11Provider/pkcs11.GCC4.0.2.so.4.07 Slot=0 HSM Information: Label: ICANNKSK ManufacturerID: AEP Networks Model: Keyper 9860-2 Serial: H1411006 Looking for RSA keypair labeled "Klajeyz"... Found keypair labeled "Klajeyz" SHA256 DS resource record and hash: . IN DS 20326 8 2 E06D44B80B8F1D39A95C0B0D7C65D08458E880409BBC683457104237C7F8EC8D >> tapeworm hazardous crumpled provincial alone midsummer Belfast corporate revenge fascinate alone asteroid kiwi glossary stagnate Jupiter endorse typewriter merit Dakota puppy pyramid frighten confidence eightball autopsy crowfoot consensus soybean warranty tumor microscope << Created CSR file "Klajeyz.csr": O: Public Technical Identifiers OU: Cryptographic Business Operations CN: Root Zone KSK 2017-02-03T00:39:23+00:00 1.3.6.1.4.1.1000.53: . IN DS 20326 8 2 E06D44B80B8F1D39A95C0B0D7C65D08458E880409BBC683457104237C7F8EC8D Klajeyz.csr SHA256 thumbprint and hash: 8C3EAB815051814EF455C213E9E4C2E0F27987E07C0FD5FEAA28D2229C2D1578 >> offload cumbersome rhythm inventive drumbeat enchanting minnow distortion upshot equipment snapshot barbecue treadmill tradition snapshot tobacco uproot inertia Neptune tobacco kiwi atmosphere sterling yesteryear reward cellulose standard candidate python clergyman backfield indigo << Unloaded /opt/Keyper/PKCS11Provider/pkcs11.GCC4.0.2.so.4.07 Slot=0 ********** Log output in ./kskgen-20170203-003918.log ********** ]0;root@localhost:/tmp[root@localhost tmp]# displaycsr Klajeyz.csr [?1049h[?1h= Certificate Request: Data: Version: 0 (0x0) Subject: O=Public Technical Identifiers, OU=Cryptographic Business Operatio ns, CN=Root Zone KSK 2017-02-03T00:39:23+00:00/1.3.6.1.4.1.1000.53=. IN DS 20326 8 2 E06D44B80B8F1D39A95C0B0D7C65D08458E880409BBC683457104237C7F8EC8D Subject Public Key Info: Public Key Algorithm: rsaEncryption RSA Public Key: (2048 bit) Modulus (2048 bit): 00:ac:ff:b4:09:bc:c9:39:f8:31:f7:a1:e5:ec:88: f7:a5:92:55:ec:53:04:0b:e4:32:02:73:90:a4:ce: 89:6d:6f:90:86:f3:c5:e1:77:fb:fe:11:81:63:aa: ec:7a:f1:46:2c:47:94:59:44:c4:e2:c0:26:be:5e: 98:bb:cd:ed:25:97:82:72:e1:e3:e0:79:c5:09:4d: 57:3f:0e:83:c9:2f:02:b3:2d:35:13:b1:55:0b:82: 69:29:c8:0d:d0:f9:2c:ac:96:6d:17:76:9f:d5:86: 7b:64:7c:3f:38:02:9a:bd:c4:81:52:eb:8f:20:71: 59:ec:c5:d2:32:c7:c1:53:7c:79:f4:b7:ac:28:ff: 11:68:2f:21:68:1b:f6:d6:ab:a5:55:03:2b:f6:f9: f0:36:be:b2:aa:a5:b3:77:8d:6e:eb:fb:a6:bf:9e: a1:91:be:4a:b0:ca:ea:75:9e:2f:77:3a:1f:90:29: c7:3e:cb:8d:57:35:b9:32:1d:b0:85:f1:b8:e2:d8: 03:8f:e2:94:19:92:54:8c:ee:0d:67:dd:45:47:e1: 1d:d6:3a:f9:c9:fc:1c:54:66:fb:68:4c:f0:09:d7: 19:7c:2c:f7:9e:79:2a:b5:01:e6:a8:a1:ca:51:9a: f2:cb:9b:5f:63:67:e9:4c:0d:47:50:24:51:35:7b: :  e1:b5 Exponent: 65537 (0x10001) Attributes: a0:00 Signature Algorithm: sha256WithRSAEncryption 53:49:23:92:58:55:47:37:c7:2f:e3:26:87:fc:32:36:11:42: 30:9f:72:af:f8:b4:4d:79:65:3e:3f:d9:7a:dd:7d:35:db:f1: 2b:c3:a9:04:9a:3e:f3:ca:17:36:76:fb:62:27:fd:cf:b1:b3: 3e:53:18:4b:31:3c:d8:de:b9:64:3f:88:3c:6e:ce:54:2c:dc: 7b:24:c3:c5:1e:a8:6d:14:81:8e:90:36:7f:8e:0c:88:2b:93: e9:fe:69:7a:15:a5:e8:a8:f2:d3:b8:71:55:57:5f:33:fc:65: 7f:b6:02:21:e6:9e:50:b8:51:b4:59:4d:33:1b:85:c5:d5:67: cf:ff:c8:c2:06:02:74:40:3c:09:46:70:a1:b8:7e:c9:90:e7: f2:45:11:4b:57:a5:a4:15:44:04:f1:bd:e1:88:29:72:fe:c4: 64:af:82:2d:60:1d:be:1f:88:9b:af:f3:25:2b:92:05:7e:d7: 72:71:2f:1f:fa:8f:8b:e9:5a:97:63:e9:87:a2:7f:6e:09:1c: 51:18:b7:49:fc:79:74:3e:9d:b4:ca:94:91:70:60:71:02:6c: bf:6d:eb:a2:e4:c7:90:c0:7e:d2:76:d9:39:74:82:bb:22:cb: 13:76:35:23:31:87:2b:3f:d4:1b:e7:69:09:8b:8c:35:ab:07: 2e:03:e8:b0 (END)  [?1l>[?1049l]0;root@localhost:/tmp[root@localhost tmp]# cd /media/HSMFD ]0;root@localhost:/media/HSMFD[root@localhost HSMFD]# exit exit Script done on Fri 03 Feb 2017 01:03:28 AM UTC