
Metasploit mailing list archives
Metasploit SSL CA Updated
From: hdm at metasploit.com (H D Moore)
Date: Fri, 3 Jun 2005 03:51:45 -0500
On June 2nd, 2005 the metasploit.com SSL key expired. This key had an expiration of one year. Normally, we would just generate a new key using the securely-stored CA key. Unfortunately, the private key for the CA become mangled and we could not generate a new key. Since the msfupdate system depends on this CA key not changing, Metasploit Framework users will need to manually update the CA public key. The packages for version 2.4 have already been updated with the new key, but existing installations will no longer be able to use msfupdate until the key is updated. Updating the CA key can be accomplished in a couple different ways: 1) Download the new certificate from http://metasploit.com/metasploit.crt and overwrite the ./docs/7f8d5320.0 with it. On the Windows platform, this file is usually located at: C:\program files\metasploit framework\home\framework\docs\7f8d5320.0 You can verify the PGP signature and MD5 fingerprint of this certificate at http://metasploit.com/ssl.html. 2) Execute msfupdate and force it to use HTTP mode for the update. This can be accomplished by: $ msfupdate -u -f -x After the certificate file has been downloaded, msfupdate should work normally via SSL again. -HD -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: not available URL: <http://mail.metasploit.com/pipermail/framework/attachments/20050603/ae637ee9/attachment.pgp>
Current thread:
- Metasploit SSL CA Updated H D Moore (Jun 03)