I was using the langui sh to set up my cert and this is what I got when following his steps and this was only creating it. Any idea how i can get the Trailers.der file?
Windows 7 64bit OS
Python 2.7.6
Plex 0.9.8.10
ATV3 6.0
ip 198.168.2.11
router 198.168.2.1
DNS 198.168.2.27
Microsoft Windows [Version 6.1.7601]
Copyright (c) 2009 Microsoft Corporation. All rights reserved.
C:\windows\system32>set OPENSSL_CONF=c:\[PATH TO YOUR OPENSSL DIRECTORY]\bin\ope
nssl.cfgC:\OpenSSL-Win32\bin\openssl.exe req -new -nodes -newkey rsa:2048 -out C
: railers.pem -keyout C: railers.key -x509 -days 7300 -subj "/C=US/CN=trailers
.apple.com" -config C:\OpenSSL-Win32\bin\openssl.cfg
Microsoft Windows [Version 6.1.7601]
Copyright (c) 2009 Microsoft Corporation. All rights reserved.
C:\windows\system32>C:\OpenSSL-Win32\bin\openssl.exe req -new -nodes -newkey rsa
:2048 -out C: railers.pem -keyout C: railers.key -x509 -days 7300 -subj "/C=US
/CN=trailers.apple.com" -config C:\OpenSSL-Win32\bin\openssl.cfg
WARNING: can't open config file: /usr/local/ssl/openssl.cnf
Loading 'screen' into random state - done
Generating a 2048 bit RSA private key
................................................................................
................................................................................
...............................+++
...............+++
writing new private key to 'C: railers.key'
-----
C:\windows\system32>C:\OpenSSL-Win32\bin\openssl.exe x509 -in C: railers.pem -o
utform der -out C: railers.certype C: railers.key >> C: railers.pem
WARNING: can't open config file: /usr/local/ssl/openssl.cnf
unknown option C: railers.key
usage: x509 args
-inform arg - input format - default PEM (one of DER, NET or PEM)
-outform arg - output format - default PEM (one of DER, NET or PEM)
-keyform arg - private key format - default PEM
-CAform arg - CA format - default PEM
-CAkeyform arg - CA key format - default PEM
-in arg - input file - default stdin
-out arg - output file - default stdout
-passin arg - private key password source
-serial - print serial number value
-subject_hash - print subject hash value
-subject_hash_old - print old-style (MD5) subject hash value
-issuer_hash - print issuer hash value
-issuer_hash_old - print old-style (MD5) issuer hash value
-hash - synonym for -subject_hash
-subject - print subject DN
-issuer - print issuer DN
-email - print email address(es)
-startdate - notBefore field
-enddate - notAfter field
-purpose - print out certificate purposes
-dates - both Before and After dates
-modulus - print the RSA key modulus
-pubkey - output the public key
-fingerprint - print the certificate fingerprint
-alias - output certificate alias
-noout - no certificate output
-ocspid - print OCSP hash values for the subject name and public key
-ocsp_uri - print OCSP Responder URL(s)
-trustout - output a "trusted" certificate
-clrtrust - clear all trusted purposes
-clrreject - clear all rejected purposes
-addtrust arg - trust certificate for a given purpose
-addreject arg - reject certificate for a given purpose
-setalias arg - set certificate alias
-days arg - How long till expiry of a signed certificate - def 30 days
-checkend arg - check whether the cert expires in the next arg seconds
exit 1 if so, 0 if not
-signkey arg - self sign cert with arg
-x509toreq - output a certification request object
-req - input is a certificate request, sign and output.
-CA arg - set the CA certificate, must be PEM format.
-CAkey arg - set the CA key, must be PEM format
missing, it is assumed to be in the CA file.
-CAcreateserial - create serial number file if it does not exist
-CAserial arg - serial file
-set_serial - serial number to use
-text - print the certificate in text form
-C - print out C code forms
-md2/-md5/-sha1/-mdc2 - digest to use
-extfile - configuration file with X509V3 extensions to add
-extensions - section from config file with X509V3 extensions to add
-clrext - delete extensions before signing and input certificate
-nameopt arg - various certificate name options
-engine e - use engine e, possibly a hardware device.
-certopt arg - various certificate text options
right now I have the cert text document it seems to come with the newest connect, my trailer.pem file and I have my security certification in the certification folders. My dns on the atv3 is the same as my pcs ip. Now on firewalls I have 2 inbound python.exe one tcp the other udp both dont have spifict ports I dont have any outbound. now my pms only has one inbound and 0 outbound.