os/Linux 2017. 4. 11. 23:26

echo $[100-$(vmstat 1 2|tail -1|awk '{print $15}')]


kctbiz@kctbiz-admin:~/http2https$ vmstat 1 2 | tail -l 

procs -----------memory---------- ---swap-- -----io---- -system-- ------cpu-----

 r  b   swpd   free   buff  cache   si   so    bi    bo   in   cs us sy id wa st

 1  1 318512  87080   3524 358176    2    6    24    15  306  587  6  5 89  1  0

 1  0 318512  87696   3524 358160    0    0    28     0 1021 1870 12  7 80  1  0

kctbiz@kctbiz-admin:~/http2https$ echo $[100-$(vmstat 1 2|tail -1|awk '{print $15}')]

24


posted by cskimair
:
os/Linux 2017. 3. 29. 14:48

20 small hacks after installing Lubuntu 14.04

http://www.circuidipity.com/lubuntu-trusty-hacks.html

posted by cskimair
:
os/Linux 2017. 3. 15. 15:30

http://logon.tistory.com/229

우분투 삼바 설정하기


기타 구글 검색:

https://www.google.com/search?q=%EC%9A%B0%EB%B6%84%ED%88%AC+%EC%82%BC%EB%B0%94+%EC%84%A4%EC%A0%95&ie=utf-8&oe=utf-8&client=firefox-b

posted by cskimair
:
os/Linux 2017. 2. 18. 15:24
Redirecting kernel messages (dmesg) out through your serial port
http://www.electronicsfaq.com/2013/04/redirecting-kernel-messages-dmesg-out.html
  1. Configure grub and change the kernel command line parameters:
    1. On the test PC issue the command: sudo gedit /etc/default/grub
    2. In that file change GRUB_CMDLINE_LINUX="" to GRUB_CMDLINE_LINUX="console=ttyS0,115200n8 ignore_loglevel"
    3. Also uncomment the line #GRUB_TERMINAL=console to GRUB_TERMINAL=console and add a line below it:
      GRUB_SERIAL_COMMAND="serial --speed=115200 --unit=0 --word=8 --parity=no --stop=1"
    4. Save the file and exit the editor
    5. Execute the command to update grub: sudo update-grub2
      The bootloader (GRUB2) will now configure the kernel to print the kernel messages on the console on every bootup



*. 정리내용:

1. toto grub.cfg  file modify

- /boot/grub/grub.cfg   add console setting



2. 시리얼포트 설정이 자동 재시작하게 설정.

- add /etc/init/ttyS0.conf   (initially not exist in toto terminal )
-> 원상복구시 ttyS0.conf 를 지워주어야 함.


posted by cskimair
:
os/Linux 2017. 2. 17. 22:29


How to Install A Minimal (And Non-Bloated) Ubuntu On Your Old Laptop

- https://www.maketecheasier.com/install-a-minimal-ubuntu-on-old-laptop/




11111
  • Ubuntu has always been said as the Linux distro for beginners and entry users. It comes with plenty of free software and most of the things will just work after you installed it. However, if you have noticed, the recent build of Ubuntu is getting more and more resource intensive (with more animation and effects) and also come bundled with plenty of software that you probably have no use for. In short, it is getting bloated and doesn’t run well on old laptop anymore (at least in my case). While you can install another distro like Linux Mint, another alternative is to strip off all the software and unnecessary stuff and install Ubuntu from scratch. Here is how you can install a minimal Ubuntu on your (old) PC.

    To get started, we can use either the Ubuntu Server edition or the Ubuntu minimal CD as the base install. Both come with the minimum packages to get the distro running and don’t come with any pre-installed software. The Ubuntu Server edition is more focus on server usage though. For this tutorial, we will be using the Ubuntu Minimal CD.

    1. Download Ubuntu Minimal (mini.iso) for your PC architecture. The file size is only less than 30MB.

    2. You won’t be able to create a USB startup disk with this iso file, so the only way is to burn it into a bootable CD.

    3. Make sure your PC/laptop is connected to a LAN network. Insert the CD into your CD-rom and boot up your computer from the ROM. This is what you will see. Select “Install”.

    minimal-ubuntu-bootup

    4. Select the language, follow by your location.

    minimal-ubuntu-install-choose-language

    5. Let it detect your keyboard. Optionally, you can select “No”, you can select from a list of keyboard layout (the most widely used is English (US)).

    minimal-ubuntu-install-detect-keyboard

    6. Next, the installer will proceed to configure some files for networking. When it is done, it will prompt you to enter the hostname. This will be what you will see in the terminal later, so change the hostname to something more personal, like “my-laptop“.

    minimal-ubuntu-install-set-hostname

    7. Select the mirror for Ubuntu archive that is closest to your location. This allows you to update your system and retrieve packages faster.

    minimal-ubuntu-install-select-mirror

    8. Unless you are using a proxy to connect to the outside world, leave the HTTP proxy field blank.

    9. The installer will now retrieve the necessary packages from the mirror site. Once it is done, it will prompt you to reformat your hard disk. I assume that you are going to use the whole hard disk, so in this case, select “Guided – use entire disk”. If not, you can select “Manual” and configure the partitioning accordingly. I won’t go into the detail here.

    minimal-ubuntu-install-partition

    When prompted, select “Yes” to confirm the partition setting.

    minimal-ubuntu-install-partition-confirm

    10. Now, sit back and let the installer do its work. Once it’s done, it will prompt you to enter your username, password and whether you want to encrypt your Home directory.

    minimal-ubuntu-install-set-username

    minimal-ubuntu-encrypt-home-dir

    11. Go grab a coffee while the installer do the final installation on your PC.

    12. When prompted on how you want the security update to be done, select “Install Security Update Automatically”.

    minimal-ubuntu-apply-update

    13. The next part is the important part. Here is where you can choose what to install on this machine. Personally, I want to choose what to install on this system, so I am going to select “Manual Package Selection”. You can do otherwise, though.

    minimal-ubuntu-select-package

    14. The last thing it will install is the GRUB loader. Select this if this is the only OS running in the machine and the GRUB loader does not interfere with other bootloader.

    minimal-ubuntu-grub-bootloader

    15. Finally. this is what you will see when the installation is completed. Remove the CD from the CD-rom and select “Continue” to restart the computer.

    minimal-ubuntu-finish-installation

    Now that you have finished the installation, it is only half the battle. You still need to install the desktop manager and several required applications.

    1. Restart the computer. Press “Alt + F1” when the grub loader appears. This will bring you to the command prompt. (If you didn’t press “Alt + F1, you will only see a blank screen).

    2. In the command prompt, first login with your username and password. Next, type the following:

    sudo apt-get install gdm network-manager

    This will install the gdm login manager and the network-manager. Optionally, you can replace the “gdm” with “lightdm” or “lxdm“. You can also use “wicd” as the alternative to network-manager.

    3. Next, choose your desktop manager. You can choose to use Gnome, Openbox, LXDE, Fluxbox, XFCE, WindowMaker, etc.

    For Gnome, installing the Gnome-core will install a whole bunch of Gnome library and several Gnome applications (including Synaptic). This is a good starting point for beginner.

    sudo apt-get install gnome-core

    For Openbox:

    sudo apt-get install openbox

    4. Lastly, start gdm

    sudo start gdm

    Note: I have problems getting lightdm to work with Openbox. It could be just my hardware problem, but since I can’t get it to work, I don’t recommend it here.

    That’s it. Restart your PC. Once you are logged back in to the desktop, you can proceed to install all the applications you want/need. If Synaptic is not installed, use the following command to install:

    sudo apt-get install synaptic

    Enjoy!

    This website uses cookies to ensure you get the best experience on our website. More info



    1111




    posted by cskimair
    :
    os/Linux 2016. 9. 13. 15:50
    1. let's encrypt 인증서 발급받기


    1.1 node.js 에서 키 발급받아서 테스트

    - 시도한 결과 사설인증서처럼 화면이 나옴(공인인증서처럼 처리가 목표인데 되지 않음)


    - 아래처럼 인증된 사이트로 나옴. (80 포트로 접근시 443 포트로 리다이렉션기능/설정도 필요함.) 


    1.2 nginx에 let's encrypt 인증서 발급받는 방법

    https://blog.outsider.ne.kr/1178


    1.3 certBot

    - Automatically enable HTTPS on your website with EFF's Certbot, deploying Let's Encrypt certificates.

    - link: https://certbot.eff.org/#ubuntutrusty-other


    1.4  error 

    https://stackoverflow.com/questions/26031160/importerror-no-module-named-datetime/42936297#42936297


    - 에러에 대한 조치방법:  아래와 같이 폴더를 삭제한다. 

    rm ~/.local/share/letsencrypt -R

    - 에러의 증상: 

    https://community.letsencrypt.org/t/certbot-missing-python-dependency-datetime/33884/2


    1.4.1 추가 에러 
    - https://github.com/certbot/certbot/issues/2516

    vim ~/.pip/pip.conf

    [global]
    index-url = https://pypi.tuna.tsinghua.edu.cn/simple
    # index-url = http://mirrors.aliyun.com/pypi/simple/
    
    [install]
    trusted-host=mirrors.aliyun.com



    *. 기타 커뮤니티 글

    https://www.xpressengine.com/forum/22962290


    Node.js에서 Let'sEncrypt에서 인증서(SSL)를 설치하는 방법

    http://justinmccandless.com/post/setting-up-https-on-node-for-free-with-lets-encrypt/



    -아래는 2018-07-30 다시 업데이트한 내용입니다. 

    2018-07-30 

    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$ ll *.sh

    -rw-rw-r-- 1 kctbiz2 kctbiz2 28 Mar 13  2017 run-cert.sh

    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$ ll

    total 116

    drwxrwxr-x  4 kctbiz2 kctbiz2  4096 Apr 25 09:16 ./

    -rwxrwxr-x  1 kctbiz2 kctbiz2 62829 Apr 25 09:16 letsencrypt-auto*

    drwxrwxr-x 20 kctbiz2 kctbiz2  4096 Oct 10  2017 ../

    -rw-rw-r--  1 kctbiz2 kctbiz2    28 Mar 13  2017 run-cert.sh

    drwxrwxr-x  3 kctbiz2 kctbiz2  4096 Sep 12  2016 pieces/

    drwxrwxr-x  4 kctbiz2 kctbiz2  4096 Sep 12  2016 tests/

    -rwxrwxr-x  1 kctbiz2 kctbiz2  1904 Sep 12  2016 build.py*

    -rw-rw-r--  1 kctbiz2 kctbiz2   473 Sep 12  2016 certbot-auto.asc

    -rw-rw-r--  1 kctbiz2 kctbiz2   839 Sep 12  2016 Dockerfile

    -rw-rw-r--  1 kctbiz2 kctbiz2   256 Sep 12  2016 letsencrypt-auto.sig

    -rwxrwxr-x  1 kctbiz2 kctbiz2 12795 Sep 12  2016 letsencrypt-auto.template*

    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$ history   | grep cert

     1092  cat run-cert.sh

     1093  sh run-cert.sh

     1993  history   | grep cert

    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$ cat run-cert.sh

    ./letsencrypt-auto certonly

    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$ sh run-cert.sh

    Requesting to rerun ./letsencrypt-auto with root privileges...

    [sudo] password for kctbiz2:

    Upgrading certbot-auto 0.23.0 to 0.26.1...

    Replacing certbot-auto...

    Creating virtual environment...

    Installing Python packages...

    Installation succeeded.

    Saving debug log to /var/log/letsencrypt/letsencrypt.log

    Failed to find executable apache2ctl in PATH: /usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/bin


    How would you like to authenticate with the ACME CA?

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    1: Spin up a temporary webserver (standalone)

    2: Place files in webroot directory (webroot)

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Select the appropriate number [1-2] then [enter] (press 'c' to cancel): 1

    Plugins selected: Authenticator standalone, Installer None

    Please enter in your domain name(s) (comma and/or space separated)  (Enter 'c'

    to cancel): titan.iptime.org

    Cert is due for renewal, auto-renewing...

    Renewing an existing certificate

    Performing the following challenges:

    tls-sni-01 challenge for titan.iptime.org

    Waiting for verification...

    Cleaning up challenges


    IMPORTANT NOTES:

     - Congratulations! Your certificate and chain have been saved at:

       /etc/letsencrypt/live/titan.iptime.org/fullchain.pem

       Your key file has been saved at:

       /etc/letsencrypt/live/titan.iptime.org/privkey.pem

       Your cert will expire on 2018-10-27. To obtain a new or tweaked

       version of this certificate in the future, simply run

       letsencrypt-auto again. To non-interactively renew *all* of your

       certificates, run "letsencrypt-auto renew"

     - If you like Certbot, please consider supporting our work by:


       Donating to ISRG / Let's Encrypt:   https://letsencrypt.org/donate

       Donating to EFF:                    https://eff.org/donate-le


    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$




    - 아래는 2018-01-08(월) letsencrypt 업데이트 한것입니다. (실행전에 node.js 의 실행을 정지시키고 아래 스크립트를 실행해야 합니다. node.js가 443포트를 점유하고 있기때문에 letsencrypt가 SSL인증서 업데이트 안됩니다.) 

    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$ cat run-cert.sh
    ./letsencrypt-auto certonly
    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$
    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$
    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$ sh run-cert.sh
    Requesting to rerun ./letsencrypt-auto with root privileges...
    [sudo] password for kctbiz2:
    Upgrading certbot-auto 0.19.0 to 0.20.0...
    Replacing certbot-auto...
    Creating virtual environment...
    Installing Python packages...
    Installation succeeded.
    Saving debug log to /var/log/letsencrypt/letsencrypt.log
    Failed to find executable apache2ctl in PATH: /usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/bin

    How would you like to authenticate with the ACME CA?
    -------------------------------------------------------------------------------
    1: Spin up a temporary webserver (standalone)
    2: Place files in webroot directory (webroot)
    -------------------------------------------------------------------------------
    Select the appropriate number [1-2] then [enter] (press 'c' to cancel): 1
    Plugins selected: Authenticator standalone, Installer None
    Please enter in your domain name(s) (comma and/or space separated)  (Enter 'c'
    to cancel): titan.iptime.org
    Cert is due for renewal, auto-renewing...
    Renewing an existing certificate
    Performing the following challenges:
    tls-sni-01 challenge for titan.iptime.org
    Cleaning up challenges
    Problem binding to port 443: Could not bind to IPv4 or IPv6.
    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$
    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$
    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$
    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$ sh run-cert.sh
    Requesting to rerun ./letsencrypt-auto with root privileges...
    Saving debug log to /var/log/letsencrypt/letsencrypt.log
    Failed to find executable apache2ctl in PATH: /usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/bin

    How would you like to authenticate with the ACME CA?
    -------------------------------------------------------------------------------
    1: Spin up a temporary webserver (standalone)
    2: Place files in webroot directory (webroot)
    -------------------------------------------------------------------------------
    Select the appropriate number [1-2] then [enter] (press 'c' to cancel): 1
    Plugins selected: Authenticator standalone, Installer None
    Please enter in your domain name(s) (comma and/or space separated)  (Enter 'c'
    to cancel): titan.iptime.org
    Cert is due for renewal, auto-renewing...
    Renewing an existing certificate
    Performing the following challenges:
    tls-sni-01 challenge for titan.iptime.org
    Waiting for verification...
    Cleaning up challenges

    IMPORTANT NOTES:
     - Congratulations! Your certificate and chain have been saved at:
       /etc/letsencrypt/live/titan.iptime.org/fullchain.pem
       Your key file has been saved at:
       /etc/letsencrypt/live/titan.iptime.org/privkey.pem
       Your cert will expire on 2018-04-08. To obtain a new or tweaked
       version of this certificate in the future, simply run
       letsencrypt-auto again. To non-interactively renew *all* of your
       certificates, run "letsencrypt-auto renew"
     - If you like Certbot, please consider supporting our work by:

       Donating to ISRG / Let's Encrypt:   https://letsencrypt.org/donate
       Donating to EFF:                    https://eff.org/donate-le

    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$
    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$
    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$ date
    Mon Jan  8 15:47:51 KST 2018


    -아래는 2018-04-25(수) letsencrypt 업데이트 한 것입니다.


    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$ date
    Wed Apr 25 09:16:03 KST 2018
    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$
    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$ cat run-cert.sh
    ./letsencrypt-auto certonly
    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$
    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$
    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$ sh run-cert.sh
    Requesting to rerun ./letsencrypt-auto with root privileges...
    [sudo] password for kctbiz2:
    Upgrading certbot-auto 0.20.0 to 0.23.0...
    Replacing certbot-auto...
    Creating virtual environment...
    Installing Python packages...
    Installation succeeded.
    Saving debug log to /var/log/letsencrypt/letsencrypt.log
    Failed to find executable apache2ctl in PATH: /usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/bin

    How would you like to authenticate with the ACME CA?
    -------------------------------------------------------------------------------
    1: Spin up a temporary webserver (standalone)
    2: Place files in webroot directory (webroot)
    -------------------------------------------------------------------------------
    Select the appropriate number [1-2] then [enter] (press 'c' to cancel): 1
    Plugins selected: Authenticator standalone, Installer None
    Please enter in your domain name(s) (comma and/or space separated)  (Enter 'c'
    to cancel): titan.iptime.org
    Cert is due for renewal, auto-renewing...
    Renewing an existing certificate
    Performing the following challenges:
    tls-sni-01 challenge for titan.iptime.org
    Cleaning up challenges
    Problem binding to port 443: Could not bind to IPv4 or IPv6.
    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$ sh run-cert.sh
    Requesting to rerun ./letsencrypt-auto with root privileges...
    Saving debug log to /var/log/letsencrypt/letsencrypt.log
    Failed to find executable apache2ctl in PATH: /usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/bin

    How would you like to authenticate with the ACME CA?
    -------------------------------------------------------------------------------
    1: Spin up a temporary webserver (standalone)
    2: Place files in webroot directory (webroot)
    -------------------------------------------------------------------------------
    Select the appropriate number [1-2] then [enter] (press 'c' to cancel): 1
    Plugins selected: Authenticator standalone, Installer None
    Please enter in your domain name(s) (comma and/or space separated)  (Enter 'c'
    to cancel): titan.iptime.org
    Cert is due for renewal, auto-renewing...
    Renewing an existing certificate
    Performing the following challenges:
    tls-sni-01 challenge for titan.iptime.org
    Waiting for verification...
    Cleaning up challenges

    IMPORTANT NOTES:
     - Congratulations! Your certificate and chain have been saved at:
       /etc/letsencrypt/live/titan.iptime.org/fullchain.pem
       Your key file has been saved at:
       /etc/letsencrypt/live/titan.iptime.org/privkey.pem
       Your cert will expire on 2018-07-23. To obtain a new or tweaked
       version of this certificate in the future, simply run
       letsencrypt-auto again. To non-interactively renew *all* of your
       certificates, run "letsencrypt-auto renew"
     - If you like Certbot, please consider supporting our work by:

       Donating to ISRG / Let's Encrypt:   https://letsencrypt.org/donate
       Donating to EFF:                    https://eff.org/donate-le

    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$




    - 아래는 10월 10일(화) letsencrypt 업데이트 한 것입니다. 


    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$ date

    Tue Oct 10 10:01:01 KST 2017

    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$ time


    real    0m0.000s

    user    0m0.000s

    sys     0m0.000s

    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$

    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$

    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$ cat run-cert.sh

    ./letsencrypt-auto certonly

    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$

    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$ sh run-cert.sh

    Requesting to rerun ./letsencrypt-auto with root privileges...

    Saving debug log to /var/log/letsencrypt/letsencrypt.log

    Failed to find executable apache2ctl in PATH: /usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/bin


    How would you like to authenticate with the ACME CA?

    -------------------------------------------------------------------------------

    1: Spin up a temporary webserver (standalone)

    2: Place files in webroot directory (webroot)

    -------------------------------------------------------------------------------

    Select the appropriate number [1-2] then [enter] (press 'c' to cancel): 1

    Plugins selected: Authenticator standalone, Installer None

    Please enter in your domain name(s) (comma and/or space separated)  (Enter 'c'

    to cancel): titan.iptime.org

    Cert is due for renewal, auto-renewing...

    Renewing an existing certificate

    Performing the following challenges:

    tls-sni-01 challenge for titan.iptime.org

    Waiting for verification...

    Cleaning up challenges


    IMPORTANT NOTES:

     - Congratulations! Your certificate and chain have been saved at:

       /etc/letsencrypt/live/titan.iptime.org/fullchain.pem

       Your key file has been saved at:

       /etc/letsencrypt/live/titan.iptime.org/privkey.pem

       Your cert will expire on 2018-01-08. To obtain a new or tweaked

       version of this certificate in the future, simply run

       letsencrypt-auto again. To non-interactively renew *all* of your

       certificates, run "letsencrypt-auto renew"

     - If you like Certbot, please consider supporting our work by:


       Donating to ISRG / Let's Encrypt:   https://letsencrypt.org/donate

       Donating to EFF:                    https://eff.org/donate-le


    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$




    ///////////////////{{

    kctbiz2@kctbiz2:~$ cd letsencrypt/lets-auto
    -bash: cd: letsencrypt/lets-auto: No such file or directory
    kctbiz2@kctbiz2:~$ cd letsencrypt/letsencrypt-auto-source/
    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$ ll
    total 96
    drwxrwxr-x  4 kctbiz2 kctbiz2  4096 Feb 14 18:10 ./
    -rwxrwxr-x  1 kctbiz2 kctbiz2 46789 Feb 14 17:37 letsencrypt-auto*
    drwxrwxr-x 20 kctbiz2 kctbiz2  4096 Dec 12 09:17 ../
    drwxrwxr-x  3 kctbiz2 kctbiz2  4096 Sep 12 11:30 pieces/
    drwxrwxr-x  4 kctbiz2 kctbiz2  4096 Sep 12 11:30 tests/
    -rwxrwxr-x  1 kctbiz2 kctbiz2  1904 Sep 12 11:30 build.py*
    -rw-rw-r--  1 kctbiz2 kctbiz2   473 Sep 12 11:30 certbot-auto.asc
    -rw-rw-r--  1 kctbiz2 kctbiz2   839 Sep 12 11:30 Dockerfile
    -rw-rw-r--  1 kctbiz2 kctbiz2   256 Sep 12 11:30 letsencrypt-auto.sig
    -rwxrwxr-x  1 kctbiz2 kctbiz2 12795 Sep 12 11:30 letsencrypt-auto.template*
    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$ cat > run-cert.sh
    ./letsencrypt-auto certonly
    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$ cat run-cert.sh
    ./letsencrypt-auto certonly
    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$ sh run-cert.sh
    Upgrading certbot-auto 0.11.1 to 0.12.0...
    Replacing certbot-auto...
    [sudo] password for kctbiz2:
    Creating virtual environment...
    Installing Python packages...
    Installation succeeded.
    Requesting root privileges to run certbot...
      /home/kctbiz2/.local/share/letsencrypt/bin/letsencrypt certonly
    Saving debug log to /var/log/letsencrypt/letsencrypt.log
    Failed to find apache2ctl in PATH: /usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/bin

    How would you like to authenticate with the ACME CA?
    -------------------------------------------------------------------------------
    1: Place files in webroot directory (webroot)
    2: Spin up a temporary webserver (standalone)
    -------------------------------------------------------------------------------
    Select the appropriate number [1-2] then [enter] (press 'c' to cancel): 2
    Please enter in your domain name(s) (comma and/or space separated)  (Enter 'c'
    to cancel):titan.iptime.org , mcast.movipic.com

    -------------------------------------------------------------------------------
    You have an existing certificate that contains a portion of the domains you
    requested (ref: /etc/letsencrypt/renewal/mcast.movipic.com.conf)

    It contains these names: mcast.movipic.com

    You requested these names for the new certificate: titan.iptime.org,
    mcast.movipic.com.

    Do you want to expand and replace this existing certificate with the new
    certificate?
    -------------------------------------------------------------------------------
    (E)xpand/(C)ancel: e
    Renewing an existing certificate
    Performing the following challenges:
    tls-sni-01 challenge for titan.iptime.org
    tls-sni-01 challenge for mcast.movipic.com

    -------------------------------------------------------------------------------
    Could not bind TCP port 443 because it is already in use by another process on
    this system (such as a web server). Please stop the program in question and then
    try again.
    -------------------------------------------------------------------------------
    (R)etry/(C)ancel: r
    Waiting for verification...
    Cleaning up challenges
    Generating key (2048 bits): /etc/letsencrypt/keys/0003_key-certbot.pem
    Creating CSR: /etc/letsencrypt/csr/0003_csr-certbot.pem

    IMPORTANT NOTES:
     - Congratulations! Your certificate and chain have been saved at
       /etc/letsencrypt/live/mcast.movipic.com/fullchain.pem. Your cert
       will expire on 2017-06-10. To obtain a new or tweaked version of
       this certificate in the future, simply run letsencrypt-auto again.
       To non-interactively renew *all* of your certificates, run
       "letsencrypt-auto renew"
     - If you like Certbot, please consider supporting our work by:

       Donating to ISRG / Let's Encrypt:   https://letsencrypt.org/donate
       Donating to EFF:                    https://eff.org/donate-le

    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$ sh run-cert.sh
    Requesting root privileges to run certbot...
      /home/kctbiz2/.local/share/letsencrypt/bin/letsencrypt certonly
    Saving debug log to /var/log/letsencrypt/letsencrypt.log
    Failed to find apache2ctl in PATH: /usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/snap/bin

    How would you like to authenticate with the ACME CA?
    -------------------------------------------------------------------------------
    1: Place files in webroot directory (webroot)
    2: Spin up a temporary webserver (standalone)
    -------------------------------------------------------------------------------
    Select the appropriate number [1-2] then [enter] (press 'c' to cancel): 2
    Please enter in your domain name(s) (comma and/or space separated)  (Enter 'c'
    to cancel):titan.iptime.org
    Cert is due for renewal, auto-renewing...
    Renewing an existing certificate
    Performing the following challenges:
    tls-sni-01 challenge for titan.iptime.org
    Waiting for verification...
    Cleaning up challenges
    Generating key (2048 bits): /etc/letsencrypt/keys/0004_key-certbot.pem
    Creating CSR: /etc/letsencrypt/csr/0004_csr-certbot.pem

    IMPORTANT NOTES:
     - Congratulations! Your certificate and chain have been saved at
       /etc/letsencrypt/live/titan.iptime.org/fullchain.pem. Your cert
       will expire on 2017-06-10. To obtain a new or tweaked version of
       this certificate in the future, simply run letsencrypt-auto again.
       To non-interactively renew *all* of your certificates, run
       "letsencrypt-auto renew"
     - If you like Certbot, please consider supporting our work by:

       Donating to ISRG / Let's Encrypt:   https://letsencrypt.org/donate
       Donating to EFF:                    https://eff.org/donate-le

    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$ ls -al
    total 100
    drwxrwxr-x  4 kctbiz2 kctbiz2  4096 Mar 13 09:07 .
    drwxrwxr-x 20 kctbiz2 kctbiz2  4096 Dec 12 09:17 ..
    -rwxrwxr-x  1 kctbiz2 kctbiz2  1904 Sep 12 11:30 build.py
    -rw-rw-r--  1 kctbiz2 kctbiz2   473 Sep 12 11:30 certbot-auto.asc
    -rw-rw-r--  1 kctbiz2 kctbiz2   839 Sep 12 11:30 Dockerfile
    -rwxrwxr-x  1 kctbiz2 kctbiz2 46789 Mar 13 09:07 letsencrypt-auto
    -rw-rw-r--  1 kctbiz2 kctbiz2   256 Sep 12 11:30 letsencrypt-auto.sig
    -rwxrwxr-x  1 kctbiz2 kctbiz2 12795 Sep 12 11:30 letsencrypt-auto.template
    drwxrwxr-x  3 kctbiz2 kctbiz2  4096 Sep 12 11:30 pieces
    -rw-rw-r--  1 kctbiz2 kctbiz2    28 Mar 13 09:06 run-cert.sh
    drwxrwxr-x  4 kctbiz2 kctbiz2  4096 Sep 12 11:30 tests
    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$ cat run-cert.sh
    ./letsencrypt-auto certonly
    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$ ls -al tests
    total 40
    drwxrwxr-x 4 kctbiz2 kctbiz2  4096 Sep 12 11:30 .
    drwxrwxr-x 4 kctbiz2 kctbiz2  4096 Mar 13 09:07 ..
    -rw-rw-r-- 1 kctbiz2 kctbiz2 13678 Sep 12 11:30 auto_test.py
    drwxrwxr-x 4 kctbiz2 kctbiz2  4096 Sep 12 11:30 certs
    drwxrwxr-x 3 kctbiz2 kctbiz2  4096 Sep 12 11:30 fake-letsencrypt
    -rw-rw-r-- 1 kctbiz2 kctbiz2   140 Sep 12 11:30 __init__.py
    -rw-rw-r-- 1 kctbiz2 kctbiz2  1679 Sep 12 11:30 signing.key
    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$
    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$
    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$
    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$
    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$
    kctbiz2@kctbiz2:~/letsencrypt/letsencrypt-auto-source$

    ///////////////////}}

    ============



    kctbiz2@kctbiz2:~/testWebRTC$ ll  sudo ls -al  /etc/letsencrypt/live/titan.iptime.org/
    ls: cannot access sudo: No such file or directory
    ls: cannot access ls: No such file or directory
    ls: cannot access /etc/letsencrypt/live/titan.iptime.org/: Permission denied
    kctbiz2@kctbiz2:~/testWebRTC$ sudo ls -al  /etc/letsencrypt/live/titan.iptime.org/
    [sudo] password for kctbiz2:



    Sorry, try again.
    [sudo] password for kctbiz2:
    ^CSorry, try again.
    [sudo] password for kctbiz2:
    sudo: 2 incorrect password attempts
    kctbiz2@kctbiz2:~/testWebRTC$
    kctbiz2@kctbiz2:~/testWebRTC$
    kctbiz2@kctbiz2:~/testWebRTC$
    kctbiz2@kctbiz2:~/testWebRTC$ sudo ls -al  /etc/letsencrypt/live/titan.iptime.org/
    [sudo] password for kctbiz2:
    total 8
    drwxr-xr-x 2 root root 4096 Dec 12 09:18 .
    drwx------ 4 root root 4096 Feb 14 18:14 ..
    lrwxrwxrwx 1 root root   40 Dec 12 09:18 cert.pem -> ../../archive/titan.iptime.org/cert2.pem
    lrwxrwxrwx 1 root root   41 Dec 12 09:18 chain.pem -> ../../archive/titan.iptime.org/chain2.pem
    lrwxrwxrwx 1 root root   45 Dec 12 09:18 fullchain.pem -> ../../archive/titan.iptime.org/fullchain2.pem
    lrwxrwxrwx 1 root root   43 Dec 12 09:18 privkey.pem -> ../../archive/titan.iptime.org/privkey2.pem
    kctbiz2@kctbiz2:~/testWebRTC$
    kctbiz2@kctbiz2:~/testWebRTC$
    kctbiz2@kctbiz2:~/testWebRTC$
    kctbiz2@kctbiz2:~/testWebRTC$
    kctbiz2@kctbiz2:~/testWebRTC$ sudo ls -al  /etc/letsencrypt/archive/
    total 16
    drwx------ 4 root root 4096 Feb 14 18:14 .
    drwxr-xr-x 8 root root 4096 Sep 13 08:34 ..
    drwxr-xr-x 2 root root 4096 Mar 13 09:14 mcast.movipic.com
    drwxr-xr-x 2 root root 4096 Dec 12 09:18 titan.iptime.org
    kctbiz2@kctbiz2:~/testWebRTC$ sudo ls -al  /etc/letsencrypt/archive/titan.iptime.org
    total 40
    drwxr-xr-x 2 root root 4096 Dec 12 09:18 .
    drwx------ 4 root root 4096 Feb 14 18:14 ..
    -rw-r--r-- 1 root root 1801 Sep 13 08:34 cert1.pem
    -rw-r--r-- 1 root root 1801 Dec 12 09:18 cert2.pem
    -rw-r--r-- 1 root root 1647 Sep 13 08:34 chain1.pem
    -rw-r--r-- 1 root root 1647 Dec 12 09:18 chain2.pem
    -rw-r--r-- 1 root root 3448 Sep 13 08:34 fullchain1.pem
    -rw-r--r-- 1 root root 3448 Dec 12 09:18 fullchain2.pem
    -rw-r--r-- 1 root root 1704 Sep 13 08:34 privkey1.pem
    -rw-r--r-- 1 root root 1704 Dec 12 09:18 privkey2.pem
    kctbiz2@kctbiz2:~/testWebRTC$ sudo ls -al  /etc/letsencrypt/archive/
    total 16
    drwx------ 4 root root 4096 Feb 14 18:14 .
    drwxr-xr-x 8 root root 4096 Sep 13 08:34 ..
    drwxr-xr-x 2 root root 4096 Mar 13 09:14 mcast.movipic.com
    drwxr-xr-x 2 root root 4096 Dec 12 09:18 titan.iptime.org
    kctbiz2@kctbiz2:~/testWebRTC$ sudo ls -al  /etc/letsencrypt/archive/mcast.movipic.com
    total 40
    drwxr-xr-x 2 root root 4096 Mar 13 09:14 .
    drwx------ 4 root root 4096 Feb 14 18:14 ..
    -rw-r--r-- 1 root root 1801 Feb 14 18:14 cert1.pem
    -rw-r--r-- 1 root root 1826 Mar 13 09:14 cert2.pem
    -rw-r--r-- 1 root root 1647 Feb 14 18:14 chain1.pem
    -rw-r--r-- 1 root root 1647 Mar 13 09:14 chain2.pem
    -rw-r--r-- 1 root root 3448 Feb 14 18:14 fullchain1.pem
    -rw-r--r-- 1 root root 3473 Mar 13 09:14 fullchain2.pem
    -rw-r--r-- 1 root root 1704 Feb 14 18:14 privkey1.pem
    -rw-r--r-- 1 root root 1704 Mar 13 09:14 privkey2.pem
    kctbiz2@kctbiz2:~/testWebRTC$ sudo ls -al  /etc/letsencrypt/archive/titan.iptime.org
    total 56
    drwxr-xr-x 2 root root 4096 Mar 13 09:19 .
    drwx------ 4 root root 4096 Feb 14 18:14 ..
    -rw-r--r-- 1 root root 1801 Sep 13 08:34 cert1.pem
    -rw-r--r-- 1 root root 1801 Dec 12 09:18 cert2.pem
    -rw-r--r-- 1 root root 1801 Mar 13 09:19 cert3.pem
    -rw-r--r-- 1 root root 1647 Sep 13 08:34 chain1.pem
    -rw-r--r-- 1 root root 1647 Dec 12 09:18 chain2.pem
    -rw-r--r-- 1 root root 1647 Mar 13 09:19 chain3.pem
    -rw-r--r-- 1 root root 3448 Sep 13 08:34 fullchain1.pem
    -rw-r--r-- 1 root root 3448 Dec 12 09:18 fullchain2.pem
    -rw-r--r-- 1 root root 3448 Mar 13 09:19 fullchain3.pem
    -rw-r--r-- 1 root root 1704 Sep 13 08:34 privkey1.pem
    -rw-r--r-- 1 root root 1704 Dec 12 09:18 privkey2.pem
    -rw-r--r-- 1 root root 1704 Mar 13 09:19 privkey3.pem
    kctbiz2@kctbiz2:~/testWebRTC$ sudo ls -al  /etc/letsencrypt/live/titan.iptime.org/
    total 8
    drwxr-xr-x 2 root root 4096 Mar 13 09:19 .
    drwx------ 4 root root 4096 Feb 14 18:14 ..
    lrwxrwxrwx 1 root root   40 Mar 13 09:19 cert.pem -> ../../archive/titan.iptime.org/cert3.pem
    lrwxrwxrwx 1 root root   41 Mar 13 09:19 chain.pem -> ../../archive/titan.iptime.org/chain3.pem
    lrwxrwxrwx 1 root root   45 Mar 13 09:19 fullchain.pem -> ../../archive/titan.iptime.org/fullchain3.pem
    lrwxrwxrwx 1 root root   43 Mar 13 09:19 privkey.pem -> ../../archive/titan.iptime.org/privkey3.pem
    kctbiz2@kctbiz2:~/testWebRTC$
    kctbiz2@kctbiz2:~/testWebRTC$
    kctbiz2@kctbiz2:~/testWebRTC$ ls -al *.pem
    lrwxrwxrwx 1 kctbiz2 kctbiz2   47 Sep 13 08:43 cert-from_letsencrypt.pem -> /etc/letsencrypt/live/titan.iptime.org/cert.pem
    -rw-r--r-- 1 root    root    1801 Sep 13 08:43 cert_letsencrypt.pem
    -rw-rw-r-- 1 kctbiz2 kctbiz2 1801 Dec 27 15:48 cert.pem
    lrwxrwxrwx 1 kctbiz2 kctbiz2   46 Sep 13 08:42 key_from-letsencrypt.pem -> /etc/letsencrypt/live/titan.iptime.org/key.pem
    -rw-rw-r-- 1 kctbiz2 kctbiz2  887 Aug  9  2016 key.pem
    -rw-r--r-- 1 root    root    1704 Sep 13 08:45 privkey_letsencrypt.pem
    -rw-r--r-- 1 kctbiz2 kctbiz2 1704 Dec 27 15:48 privkey.pem
    kctbiz2@kctbiz2:~/testWebRTC$ grep -n   '.pem'  *
    grep: apprtc: Is a directory
    grep: bkup: Is a directory
    grep: cert-from_letsencrypt.pem: Permission denied
    gen-openssl-key.sh:1: openssl genrsa 1024 > key.pem
    gen-openssl-key.sh:2:openssl req -x509 -new -key key.pem > cert.pem
    grep: http2https: Is a directory
    grep: images: Is a directory
    grep: key_from-letsencrypt.pem: Permission denied
    grep: new: Is a directory
    grep: node_modules: Is a directory
    server2_2017_01_05.js:67:       // help: view cert info: keytool -printcert -file cert.pem
    server2_2017_01_05.js:68:    key: fs_key.readFileSync('./privkey.pem'),
    server2_2017_01_05.js:69:    cert: fs_key.readFileSync('./cert.pem')
    server2.js:67:  // help: view cert info: keytool -printcert -file cert.pem
    server2.js:68:    key: fs_key.readFileSync('./privkey.pem'),
    server2.js:69:    cert: fs_key.readFileSync('./cert.pem')
    grep: temp: Is a directory
    grep: temp.webrtc: Is a directory
    kctbiz2@kctbiz2:~/testWebRTC$
    kctbiz2@kctbiz2:~/testWebRTC$
    kctbiz2@kctbiz2:~/testWebRTC$
    kctbiz2@kctbiz2:~/testWebRTC$
    kctbiz2@kctbiz2:~/testWebRTC$ ls -al *.pem
    lrwxrwxrwx 1 kctbiz2 kctbiz2   47 Sep 13 08:43 cert-from_letsencrypt.pem -> /etc/letsencrypt/live/titan.iptime.org/cert.pem
    -rw-r--r-- 1 root    root    1801 Sep 13 08:43 cert_letsencrypt.pem
    -rw-rw-r-- 1 kctbiz2 kctbiz2 1801 Dec 27 15:48 cert.pem
    lrwxrwxrwx 1 kctbiz2 kctbiz2   46 Sep 13 08:42 key_from-letsencrypt.pem -> /etc/letsencrypt/live/titan.iptime.org/key.pem
    -rw-rw-r-- 1 kctbiz2 kctbiz2  887 Aug  9  2016 key.pem
    -rw-r--r-- 1 root    root    1704 Sep 13 08:45 privkey_letsencrypt.pem
    -rw-r--r-- 1 kctbiz2 kctbiz2 1704 Dec 27 15:48 privkey.pem
    kctbiz2@kctbiz2:~/testWebRTC$ mv cert.pem cert.pem-bkup170313
    kctbiz2@kctbiz2:~/testWebRTC$ cp cert-from_letsencrypt.pem  cert.pem  -v
    cp: cannot stat ‘cert-from_letsencrypt.pem’: Permission denied
    kctbiz2@kctbiz2:~/testWebRTC$ sudo cp cert-from_letsencrypt.pem  cert.pem  -v
    ‘cert-from_letsencrypt.pem’ -> ‘cert.pem’
    kctbiz2@kctbiz2:~/testWebRTC$ ls -al cert.pem
    -rw-r--r-- 1 root root 1801 Mar 13 09:26 cert.pem
    kctbiz2@kctbiz2:~/testWebRTC$ chown kctbiz2:kctbiz2  cert.pem
    chown: changing ownership of ‘cert.pem’: Operation not permitted
    kctbiz2@kctbiz2:~/testWebRTC$ sudo chown kctbiz2:kctbiz2  cert.pem
    kctbiz2@kctbiz2:~/testWebRTC$ ls -al cert.pem
    -rw-r--r-- 1 kctbiz2 kctbiz2 1801 Mar 13 09:26 cert.pem
    kctbiz2@kctbiz2:~/testWebRTC$ mv privkey.pem privkey.pem-170313
    kctbiz2@kctbiz2:~/testWebRTC$ sudo cp  key_from-letsencrypt.pem  privkey.pem  -v
    cp: cannot stat ‘key_from-letsencrypt.pem’: No such file or directory
    kctbiz2@kctbiz2:~/testWebRTC$ sudo cp  key_from-letsencrypt.pem  privkey.pem
    cp: cannot stat ‘key_from-letsencrypt.pem’: No such file or directory
    kctbiz2@kctbiz2:~/testWebRTC$ sudo ls -al  /etc/letsencrypt/live/titan.iptime.org/
    total 8
    drwxr-xr-x 2 root root 4096 Mar 13 09:19 .
    drwx------ 4 root root 4096 Feb 14 18:14 ..
    lrwxrwxrwx 1 root root   40 Mar 13 09:19 cert.pem -> ../../archive/titan.iptime.org/cert3.pem
    lrwxrwxrwx 1 root root   41 Mar 13 09:19 chain.pem -> ../../archive/titan.iptime.org/chain3.pem
    lrwxrwxrwx 1 root root   45 Mar 13 09:19 fullchain.pem -> ../../archive/titan.iptime.org/fullchain3.pem
    lrwxrwxrwx 1 root root   43 Mar 13 09:19 privkey.pem -> ../../archive/titan.iptime.org/privkey3.pem
    kctbiz2@kctbiz2:~/testWebRTC$ sudo cp   /etc/letsencrypt/live/titan.iptime.org/privkey.pem  . -v
    ‘/etc/letsencrypt/live/titan.iptime.org/privkey.pem’ -> ‘./privkey.pem’
    kctbiz2@kctbiz2:~/testWebRTC$ ls -al *.pem
    lrwxrwxrwx 1 kctbiz2 kctbiz2   47 Sep 13 08:43 cert-from_letsencrypt.pem -> /etc/letsencrypt/live/titan.iptime.org/cert.pem
    -rw-r--r-- 1 root    root    1801 Sep 13 08:43 cert_letsencrypt.pem
    -rw-r--r-- 1 kctbiz2 kctbiz2 1801 Mar 13 09:26 cert.pem
    lrwxrwxrwx 1 kctbiz2 kctbiz2   46 Sep 13 08:42 key_from-letsencrypt.pem -> /etc/letsencrypt/live/titan.iptime.org/key.pem
    -rw-rw-r-- 1 kctbiz2 kctbiz2  887 Aug  9  2016 key.pem
    -rw-r--r-- 1 root    root    1704 Sep 13 08:45 privkey_letsencrypt.pem
    -rw-r--r-- 1 root    root    1704 Mar 13 09:28 privkey.pem
    kctbiz2@kctbiz2:~/testWebRTC$ sudo chown kctbiz2:kctbiz2 privkey.pem
    kctbiz2@kctbiz2:~/testWebRTC$ ls -al *.pem
    lrwxrwxrwx 1 kctbiz2 kctbiz2   47 Sep 13 08:43 cert-from_letsencrypt.pem -> /etc/letsencrypt/live/titan.iptime.org/cert.pem
    -rw-r--r-- 1 root    root    1801 Sep 13 08:43 cert_letsencrypt.pem
    -rw-r--r-- 1 kctbiz2 kctbiz2 1801 Mar 13 09:26 cert.pem
    lrwxrwxrwx 1 kctbiz2 kctbiz2   46 Sep 13 08:42 key_from-letsencrypt.pem -> /etc/letsencrypt/live/titan.iptime.org/key.pem
    -rw-rw-r-- 1 kctbiz2 kctbiz2  887 Aug  9  2016 key.pem
    -rw-r--r-- 1 root    root    1704 Sep 13 08:45 privkey_letsencrypt.pem
    -rw-r--r-- 1 kctbiz2 kctbiz2 1704 Mar 13 09:28 privkey.pem
    kctbiz2@kctbiz2:~/testWebRTC$
    kctbiz2@kctbiz2:~/testWebRTC$
    kctbiz2@kctbiz2:~/testWebRTC$
    kctbiz2@kctbiz2:~/testWebRTC$
    kctbiz2@kctbiz2:~/testWebRTC$
    kctbiz2@kctbiz2:~/testWebRTC$ ls -al *.pem
    lrwxrwxrwx 1 kctbiz2 kctbiz2   47 Sep 13 08:43 cert-from_letsencrypt.pem -> /etc/letsencrypt/live/titan.iptime.org/cert.pem
    -rw-r--r-- 1 root    root    1801 Sep 13 08:43 cert_letsencrypt.pem
    -rw-r--r-- 1 kctbiz2 kctbiz2 1801 Mar 13 09:26 cert.pem
    lrwxrwxrwx 1 kctbiz2 kctbiz2   46 Sep 13 08:42 key_from-letsencrypt.pem -> /etc/letsencrypt/live/titan.iptime.org/key.pem
    -rw-rw-r-- 1 kctbiz2 kctbiz2  887 Aug  9  2016 key.pem
    -rw-r--r-- 1 root    root    1704 Sep 13 08:45 privkey_letsencrypt.pem
    -rw-r--r-- 1 kctbiz2 kctbiz2 1704 Mar 13 09:28 privkey.pem
    kctbiz2@kctbiz2:~/testWebRTC$






    2. StartSSL 인증서

    - 제일 좋은 SSL인증서 발급  StartSSL 

    - 무료가 아님.

    https://www.startssl.com/


    (무료, 1년후 무료 연장가능)



    스타SSL 무료인증서 발급받기

    https://www.xetown.com/slope/135905



    https://blog.elpo.net/get-wosign-multidomain-certificate/



    인증서 확인 사이트

    ->  https://elpo.xyz



    3. Wosign 무료 멀티도메인 SSL인증서 발급받기


    - 1차 시도시 웹인증 메뉴가 블로그에 소개된 글과 달리 나오지 않음(메뉴가 사라진것 같음)




    4.무료인증서

    http://studyforus.tistory.com/41#at_pco=smlwn-1.0&at_si=57dfb390ddc7e6c3&at_ab=per-2&at_pos=0&at_tot=1



    4.1 SSL 무료인증서  - 경고 없애기 

    https://nas.moe/archives/736



    5. EasyRTC

    https://easyrtc.com/features/


    서버와 도메인 연결 방법

    > http://studyforus.tistory.com/246


    A.1 기타 - SSL보안 인증이란

    https://www.comodossl.co.kr/Certificate/SSL-Website-Security.aspx



    https://www.kicassl.com/sslcert/sslcert/formSslCert.sg


    A.2


    - 구글 검색: free SSL for node.js


    A.3. 기타 :  getusermedia problem in webview

    https://www.google.co.kr/search?q=getusermedia+problem+in+webview+&ie=utf-8&oe=utf-8&client=firefox-b&gfe_rd=cr&ei=g_3QV6uxAq_f8Aexx7rQBA



    A.4 안드로이드 WebView 관련


    http://charlie0301.blogspot.kr/2014/10/android-chrome-based-webview.html

    < What You Need to Know About the WebView in L >

    https://gauntface.com/blog/2014/10/17/what-you-need-to-know-about-the-webview-in-l


    A.5 공인IP/사설IP 알아내기

    https://nas.moe/archives/12



    posted by cskimair
    :