TLS Certificate Handling in Cluster Mode

I have two Ironport C370 in a cluster.  When I setup the inbound/outbound mail settings this is done in cluster mode and only lets me associate one cerfiticate to the configuration.  When a session hits the machine that doesn't match the certificate name they get a error unable to validate host name.  Is it possible to set this outside of cluster mode then re-enable?  We are currently on AsyncOS version 8.0.0 build 671.
Thanks,
Mike

Hi Mike,
You might find this KB entry #1765 answers your question.
https://ironport.custhelp.com/app/answers/detail/a_id/1765
Basically you have to go into machine mode for each appliance but ensure you use the same certificate profile name.

Similar Messages

  • OIM9.1.0.1 in Cluster mode installation issue

    Hello,
    I am facing some issues to setup OIM9.1.0.1 with JBoss Application Server (Cluster mode). After installation of OIM, when I try to start application server, then it is not getting stated. Below are the some initial JBoss AS errors
    2008-12-18 12:14:59,625 ERROR [org.apache.commons.digester.Digester] Begin event threw exception
    java.lang.ClassNotFoundException: No ClassLoaders found for: org.jboss.web.tomcat.tc5.sso.ClusteredSingleSignOn
         at org.jboss.mx.loading.LoadMgr3.beginLoadTask(LoadMgr3.java:212)
         at org.jboss.mx.loading.RepositoryClassLoader.loadClassImpl(RepositoryClassLoader.java:521)
    2008-12-18 12:15:00,656 ERROR [org.jboss.deployment.MainDeployer] Could not start deployment: file:/C:/thcOIMSetup/jboss-4.2.3.GA/server/all/deploy/jboss-web.deployer/ROOT.war/
    org.jboss.deployment.DeploymentException: URL file:/C:/thcOIMSetup/jboss-4.2.3.GA/server/all/deploy/jboss-web.deployer/ROOT.war/ deployment failed at org.jboss.web.tomcat.service.TomcatDeployer.performDeployInternal(TomcatDeployer.java:386)
    2008-12-18 12:15:00,703 ERROR [org.jboss.deployment.MainDeployer] DeploymentException while trying to deploy a package with a new deployer
    org.jboss.deployment.DeploymentException: URL file:/C:/thcOIMSetup/jboss-4.2.3.GA/server/all/deploy/jboss-web.deployer/ROOT.war/ deployment failed
    The environment details are
    •     OIM 9.1.0.1
    •     jdk1.6.0
    •     JBoss-4.2.3.GA
    •     Apache Web Server 2.2
    •     Oracle11g
    I am referring OIM 9.1.0 documentation; “Deploying in a Clustered JBoss Application Server Configuration“. I am not able to figure out the root cause of the problem. Please provide me some pointer to handle this problem.
    Any help would be greatly appreciated!
    Regards,
    Hardew

    Hi,
    I was able to resolve this issue, it looked like the main Tomcat deployer wasn't working i.e. the xlWebApp wasn't getting loaded, infact none of the webapps were getting loaded, i checked it out and found the classloader was trying to load the classes which jboss 4.2.3GA version doesn't even recognize at first place and hence the root.war deployment was failing and which triggered the failure for all the other deployment.
    I changed the classloader to load the classes which were right for jboss 4.2.3GA, for e.g.
    "org.jboss.web.tomcat.tc5.sso.ClusteredSingleSignOn" to "org.jboss.web.tomcat.service.sso.ClusteredSingleSignOn"
    "org.jboss.web.tomcat.tc5.jca.CachedConnectionValve" to "org.jboss.web.tomcat.service.jca.CachedConnectionValve"
    after changing this the main tomcat deployer worked and deployed Root.war and after that everything else got deployed.
    You can change this by changing these values in the jboss-web.deployer/server.xml or do the custom classloading using a separate custom classloader if you don't want to touch the jboss 4.2.3GA setup after OIM 9101 install.
    Thanks
    Shivam
    Edited by: Blue Divided on Jan 9, 2009 1:05 PM

  • When will BRE [Backup restartable Extensions] be available in Ontap Cluster mode ?

    Hi Folks, When will BRE [Backup restartable Extensions] be available in Ontap Cluster mode. With 7-mode there is no issue, we can suspend and restart backup from the checkpoint, however with Ontap cluster mode version 8.3 I am currently running, this is not possible [I guess all versions]. If the Job is suspended in cluster mode, session ID is lost and new session  ID is generated when the backup is resumed, in other words data backup starts from begining. Is this something will be available in Onap 8.4 cluster mode ? Thanks,
    -Ashwin 

    Hi, Yeah, you are right - 8.3RC1 is older than 8.3P1.
     8.3 Releases:
     8.3RC1 ----> old release [I already tested - dump restart does not work]
     8.3RC2
     8.3
     8.3P1 -----> Customer already is on higher update and it still dosent work
     8.3P2
     8.3.1RC1 ---> Latest release
    My confusion has only increased now as far as when this BUG is fixed Or if at all fixed?
    http://mysupport.netapp.com/NOW/cgi-bin/bol?Type=Detail&Display=1472 According to this BUG, this is already fixed in all versions of 8.3. I am currently running 8.3RC1 Simulator and suspending a Job is causing NDMP session ID to end. In 7-mode: When we suspend a Job from Backup Software, NDMP session ID is not lost and when you run Backup status command, it shows -> State : RESTARTABLEThe key word is 'RESTARTABLE' which dosent seem to work in cluster mode.
    The NDMP Backup Restart Extension (BRE) interface is a proprietary extension defined in class 0x2050
    According to NDMP.org:
    NDMP_BRE_RESTART_BACKUP:
    This request is used by the backup application (DMA) to instruct the Data Server to restart a previous backup operation at a specific point in the backup stream.  Request arguments include a handle to a previously created backup context, the restart point specified as an absolute offset within the backup stream, and a file history entry corresponding to the restart point.The backup restart mechanism requires that the Data Server generate file history information and that the Data Server implementation of file history generate fh_info values as absolute byte offsets within the backup stream. The backup application determines restart points by accessing the Tape Server NDMP_MOVER_GET_STATE bytes_moved value at appropriate ‘checkpoints’ during the original backup operation. A checkpoint represents a known good point in the backup operation. BRE extensions are bydefault disabled, I enabled by setting it 'true' yet its not working. CMODE83RC1::*> ndmp extensions show
      (vserver services ndmp extensions show)Is Extension 0x2050 Enabled: true Thanks,
    -Ashwin

  • Certificate handling

    I'm running into a couple of issues around iOS (or perhaps mobileSafari) certificate handling.
    I'm reasonably sure that there's a bug report or two looming, but I'd like to discuss these issues first.
    1) If you only load up a single client certificate through configuration utility as a credential, mobilesafari will send that certificate to any web site that requires a client certificate.  Most "desktop" browsers prompt the user to avoid silent personal information leakage.  Safari changed to the prompting behavior in Mac OS X 10.5.3: http://support.apple.com/kb/HT1679
    2) If you only put a client certificate in the ActiveSync page of configuration utility, then mobileSafari does not use that certificate when a web site requires a client certificate.  If you put the SAME certificate in the credentials page as well as the ActiveSync page, then mobileSafari prompts you on _every_ SSL/TLS negotiation, which of the two identical certificates to use.
    Has anyone else seen this behavior?   Before I open bugs and grab screenshots, etc, I was wondering if we're alone in seeing this behavior, or if it could be related to attributes in the certificates or...
    Thanks
    John

    Hi, You can use DMS module if implemented in to your system. I suppose engine must be having unique material code in the system. You can create DIR using CV01N and can attach the certificate there using material as object link.
    Anand

  • Java Webstart application problem with TLS certificate revocation checks (Java 1.7.0_76)

    We have a problem with our Java Web Start Application regarding the TLS certificate revocation check:
    The application is running on a server within a wide area network which is separated from the internet.
    The application users have access to the WAN, and also access to the internet over some corporate proxy/firewall.
    The user has to enter, for example "https://my-site.de/myapp/ma.jnlp" within a webbrowser or could also call  "javaws https://my-site.de/myapp/ma.jnlp" to start the application client.
    The webserver has a certificate from a trusted certificate authority. This certificate seems to be ok, the browser is even configured to perform OCSP status check.
    The application files are signed with a certificate from another trusted certificate authority. This certificate seems also to be ok. Regarding this certificate there
    are no problems with certificate revocation checks.
    The problem is, while starting the application client there is a message box which tell us something like "the connection to this website ist not trustworthy",
    "Website: https://my-site.de:80", and something about an invalid certificate, meaning the webserver certificate.
    Obviously the jvm runtime, which is executed on the users workstation, tries to perform a revocation check for the webservers certificate, but this fails because
    it cannot fetch the certificate under https://my-site.de:80.
    The application will execute without further problems after that message but the users are very concerned about the "invalid" certificate, so here are my questions:
    - Why is the application trying to get the webserver certificate over Port 80. Our application developers told me, there is no corresponding statement. Calling this address
      has to fail while "https://my-site.de:443" or "https://my-site.de" would not have a problem.
    - Is there a way to make the application go on without performing a tls revocation check? I mean, by adjusting the application sourcecode and not by configuring the users Java Control Panel.
      While disabling the TLS Certificate Revocation check in the Java Control Panel, the Webstart Application executes without a warning message, but this is not a workable solution for
      our users.
    It would be great if someone can help me with a hint so i can send our developers into the right direction;-)
    Many thanks!
    This is a part from a java console output after calling "javaws -verbose https://my-site.de/myapp/"
    (sorry for this is in german... and also my english above)
    network: Verbindung von http://ocsp.serverpass.telesec.de/ocspr mit Proxy=HTTP @ internet-proxy.***:80 wird hergestellt
    network: Verbindung von http://ocsp.serverpass.telesec.de/ocspr mit Proxy=HTTP @ internet-proxy.***:80 wird hergestellt
    security: OCSP Response: GOOD
    network: Verbindung von http://ocsp.serverpass.telesec.de/ocspr mit Proxy=HTTP @ internet-proxy.***:80 wird hergestellt
    security: UNAUTHORIZED
    security: Failing over to CRLs: java.security.cert.CertPathValidatorException: OCSP response error: UNAUTHORIZED
    network: Cacheeintrag gefunden [URL: http://crl.serverpass.telesec.de/rl/TeleSec_ServerPass_CA_1.crl, Version: null] prevalidated=false/0
    cache: Adding MemoryCache entry: http://crl.serverpass.telesec.de/rl/TeleSec_ServerPass_CA_1.crl
    cache: Resource http://crl.serverpass.telesec.de/rl/TeleSec_ServerPass_CA_1.crl has expired.
    network: Verbindung von http://crl.serverpass.telesec.de/rl/TeleSec_ServerPass_CA_1.crl mit Proxy=HTTP @ internet-proxy.***:80 wird hergestellt
    network: Verbindung von http://crl.serverpass.telesec.de/rl/TeleSec_ServerPass_CA_1.crl mit Proxy=HTTP @ internet-proxy.***:80 wird hergestellt
    network: ResponseCode für http://crl.serverpass.telesec.de/rl/TeleSec_ServerPass_CA_1.crl: 200
    network: Codierung für http://crl.serverpass.telesec.de/rl/TeleSec_ServerPass_CA_1.crl: null
    network: Verbindung mit http://crl.serverpass.telesec.de/rl/TeleSec_ServerPass_CA_1.crl trennen
    CacheEntry[http://crl.serverpass.telesec.de/rl/TeleSec_ServerPass_CA_1.crl]: updateAvailable=true,lastModified=Tue Mar 24 10:50:01 CET 2015,length=53241
    network: Verbindung von http://crl.serverpass.telesec.de/rl/TeleSec_ServerPass_CA_1.crl mit Proxy=HTTP @ internet-proxy.***:80 wird
    network: Verbindung von socket://ldap.serverpass.telesec.de:389 mit Proxy=DIRECT wird hergestellt
    security: Revocation Status Unknown
    com.sun.deploy.security.RevocationChecker$StatusUnknownException: java.security.cert.CertPathValidatorException: OCSP response error: UNAUTHORIZED
        at com.sun.deploy.security.RevocationChecker.checkOCSP(Unknown Source)
        at com.sun.deploy.security.RevocationChecker.check(Unknown Source)
        at com.sun.deploy.security.RevocationCheckHelper.doRevocationCheck(Unknown Source)
        at com.sun.deploy.security.RevocationCheckHelper.doRevocationCheck(Unknown Source)
        at com.sun.deploy.security.RevocationCheckHelper.checkRevocationStatus(Unknown Source)
        at com.sun.deploy.security.X509TrustManagerDelegate.checkTrusted(Unknown Source)
        at com.sun.deploy.security.X509Extended7DeployTrustManagerDelegate.checkServerTrusted(Unknown Source)
        at com.sun.deploy.security.X509Extended7DeployTrustManager.checkServerTrusted(Unknown Source)
        at sun.security.ssl.ClientHandshaker.serverCertificate(Unknown Source)
        at sun.security.ssl.ClientHandshaker.processMessage(Unknown Source)
        at sun.security.ssl.Handshaker.processLoop(Unknown Source)
        at sun.security.ssl.Handshaker.process_record(Unknown Source)
        at sun.security.ssl.SSLSocketImpl.readRecord(Unknown Source)
        at sun.security.ssl.SSLSocketImpl.performInitialHandshake(Unknown Source)
        at sun.security.ssl.SSLSocketImpl.startHandshake(Unknown Source)
        at sun.security.ssl.SSLSocketImpl.startHandshake(Unknown Source)
        at sun.net.www.protocol.https.HttpsClient.afterConnect(Unknown Source)
        at sun.net.www.protocol.https.AbstractDelegateHttpsURLConnection.connect(Unknown Source)
        at sun.net.www.protocol.http.HttpURLConnection.getInputStream(Unknown Source)
        at sun.net.www.protocol.https.HttpsURLConnectionImpl.getInputStream(Unknown Source)
        at com.sun.deploy.net.HttpUtils.followRedirects(Unknown Source)
        at com.sun.deploy.net.BasicHttpRequest.doRequest(Unknown Source)
        at com.sun.deploy.net.BasicHttpRequest.doGetRequestEX(Unknown Source)
        at com.sun.deploy.cache.ResourceProviderImpl.checkUpdateAvailable(Unknown Source)
        at com.sun.deploy.cache.ResourceProviderImpl.isUpdateAvailable(Unknown Source)
        at com.sun.deploy.cache.ResourceProviderImpl.getResource(Unknown Source)
        at com.sun.deploy.cache.ResourceProviderImpl.getResource(Unknown Source)
        at com.sun.deploy.model.ResourceProvider.getResource(Unknown Source)
        at com.sun.javaws.jnl.LaunchDescFactory._buildDescriptor(Unknown Source)
        at com.sun.javaws.jnl.LaunchDescFactory.buildDescriptor(Unknown Source)
        at com.sun.javaws.jnl.LaunchDescFactory.buildDescriptor(Unknown Source)
        at com.sun.javaws.Main.launchApp(Unknown Source)
        at com.sun.javaws.Main.continueInSecureThread(Unknown Source)
        at com.sun.javaws.Main.access$000(Unknown Source)
        at com.sun.javaws.Main$1.run(Unknown Source)
        at java.lang.Thread.run(Unknown Source)
        Suppressed: com.sun.deploy.security.RevocationChecker$StatusUnknownException
            at com.sun.deploy.security.RevocationChecker.checkCRLs(Unknown Source)
            ... 35 more
    Caused by: java.security.cert.CertPathValidatorException: OCSP response error: UNAUTHORIZED
        at sun.security.provider.certpath.OCSP.check(Unknown Source)
        at sun.security.provider.certpath.OCSP.check(Unknown Source)
        at sun.security.provider.certpath.OCSP.check(Unknown Source)
        ... 36 more
    security: Ungültiges Zertifikat vom HTTPS-Server
    network: Cacheeintrag nicht gefunden [URL: https://my-site.de:80, Version: null]

    Add the JSF Jars to the WEB-INF/lib directory of the application. If still getting error add to the CLASSPATH variable in the startWebLogic script in the domain/bin directory.

  • Tls certificate option is not visible in account information

    I am an internet service provider and we have changed our server settings recently.
    I'm trying to support a customer who is using Apple's Mail App for his email.
    We are both Running Mountain lion 10.8.2 and both running mail 6.2 (1499)
    On the Accounts panel in mail preferences in my Mail there is a pull down menue for  TLS certificate but
    there is none in his.
    I have verified every setting and he can recieve mail but not send it.
    The only difference that I can see is the missing TLS dertificate option in his Prefs.
    Any thoughts?
    Thank you!

    I have a similar problem. In the menu to chosse a TLS certificate the one I need to choose doesnt show up. The certificate is in my computer when I search in the keychain Accses and I have been asked to decide to Trust this certificate (which I accepted of course) but it doesnt show in the account configuration.

  • Installing Oracle 10g Forms and Reports in Cluster Mode

    Dear All,
    My OS version is RHEL 4
    In our current setup we have oracle 10g database two node  cluster and Application Server 10g to node cluster.
    Currently our report server has been configured to run in standalone mode
    I have been asked to configure oracle 10g forms and report server in cluster mode.
    Please provide me with the documentation link to configure oracle 10g reports server in cluster mode.
    Thanks and Regards
    Monoj Das

    my main goal is load balancing only
    Then what I've done in 2007 might be what you need. In that thread there is a link to Web Cache Administrator's Guide : there you'll find everything you need to configure the web cache as a load balancer, particularly chapter 8 Setup and Configuration.
    Anyway, here briefly some configurations : we have two machines, say MachineA and MachineB. The DNS resolves MachineA to a virtual address, which is normally assigned to MachineA; if MachineA crashes, it gets assigned to MachineB.
    Users URL looks like this : http://MachineA:<port>/forms/frmservlet?config=<some config>
    MachineA's web cache distributes connection requests between MachineA and MachineB.
    Of course we're now using 11g as well, but that's another thing.

  • 2xC350 in High Availability Mode (Cluster Mode)

    Hello all,
    first of all, i`m a newbie in ironport. So Sorry for my basic questions, but i can`t find anything in the manuals.
    I want to configure the two boxes in High Availability Mode (Cluster Mode) but i don`t understand the ironport cluster architecture.
    1) in machine mode i can configure IP-Adresses -> OK
    2) in Clustermode i can configure listeners and bind them to a IP-Address -> OK
    But how works the HA?
    A) Should i configure on both boxes the same IP to use one MX Record? And if one box is down the other takes over?
    B) Or should i configure different IPs and configure two MX Records?
    And if one box is down the second MX will be used.
    Thanks in advance
    Michael

    The ironport clustering is for policy distribution only - not for smtp load mgmt.
    A) Should i configure on both boxes the same IP to use one MX Record? And if one box is down the other takes over?
    Could do - using NAT'ing on the f/w but few large business take this approach today.
    Many/most large businesses use a HW loadbalancer like an F5, Foundry ServerIron, etc. The appliances themselves would be set up on seperate IP addresses. Depending on the implementation requirements, the internal IP address could be a public IP or a private IP.
    B) Or should i configure different IPs and configure two MX Records?
    And if one box is down the second MX will be used.
    If you set up two boxes, even with a different MX preference, mail will be delivered to both MX records. There are broken SMTP implementations that get the priority backwards, and many spammers will intentionally attempt to exploit less-restrictive accept rules on secondary MX recievers and will send to them first.

  • Getting a  BEA-000802   java.lang.ClassCastException: in cluster mode only

    Guys ,
              I get a <BEA-000802> java.lang.ClassCastException in cluster mode , but works fine on a local instance. Please take a look at the stack trace below .
              <Error> <Kernel> <BEA-000802> <ExecuteRequest failed
              java.lang.ClassCastException: cannot assign instance of com.ibm.ie.web.presentation.IEPresentationCommandProcessor_814_WLStub to field com.ibm.web.servlet.Environment.presentationCommandProcessor of type com.ibm.web.presentation.PresentationCommandProcessor in instance of com.ibm.ie.web.servlet.IEEnvironment.
              java.lang.ClassCastException: cannot assign instance of com.ibm.ie.web.presentation.IEPresentationCommandProcessor_814_WLStub to field com.ibm.web.servlet.Environment.presentationCommandProcessor of type com.ibm.web.presentation.PresentationCommandProcessor in instance of com.ibm.ie.web.servlet.IEEnvironment
                   at weblogic.rjvm.BasicOutboundRequest.sendReceive(BasicOutboundRequest.java:108)
                   at weblogic.rmi.internal.BasicRemoteRef.invoke(BasicRemoteRef.java:137)
                   at weblogic.cluster.replication.ReplicationManager_814_WLStub.update(Unknown Source)
                   at weblogic.cluster.replication.ReplicationManager.updateSecondary(ReplicationManager.java:775)
                   at weblogic.servlet.internal.session.ReplicatedSessionData.syncSession(ReplicatedSessionData.java:490)
                   at weblogic.servlet.internal.session.ReplicatedSessionContext.sync(ReplicatedSessionContext.java:183)
                   at weblogic.servlet.internal.ServletRequestImpl.syncSession(ServletRequestImpl.java:2484)
                   at weblogic.servlet.internal.ServletRequestImpl.syncSession(ServletRequestImpl.java:2469)
                   at weblogic.servlet.internal.WebAppServletContext.invokeServlet(WebAppServletContext.java:3782)
                   at weblogic.servlet.internal.ServletRequestImpl.execute(ServletRequestImpl.java:2644)
                   at weblogic.kernel.ExecuteThread.execute(ExecuteThread.java:219)
                   at weblogic.kernel.ExecuteThread.run(ExecuteThread.java:178)
              Caused by: java.lang.ClassCastException: cannot assign instance of com.ibm.ie.web.presentation.IEPresentationCommandProcessor_814_WLStub to field com.ibm.web.servlet.Environment.presentationCommandProcessor of type com.ibm.web.presentation.PresentationCommandProcessor in instance of com.ibm.ie.web.servlet.IEEnvironment
                   at java.io.ObjectStreamClass$FieldReflector.setObjFieldValues(ObjectStreamClass.java:1885)
                   at java.io.ObjectStreamClass.setObjFieldValues(ObjectStreamClass.java:1076)
                   at java.io.ObjectInputStream.defaultReadFields(ObjectInputStream.java:1851)
                   at java.io.ObjectInputStream.readSerialData(ObjectInputStream.java:1769)
                   at java.io.ObjectInputStream.readOrdinaryObject(ObjectInputStream.java:1646)
                   at java.io.ObjectInputStream.readObject0(ObjectInputStream.java:1274)
                   at java.io.ObjectInputStream.defaultReadFields(ObjectInputStream.java:1845)
                   at java.io.ObjectInputStream.readSerialData(ObjectInputStream.java:1769)
                   at java.io.ObjectInputStream.readOrdinaryObject(ObjectInputStream.java:1646)
                   at java.io.ObjectInputStream.readObject0(ObjectInputStream.java:1274)
                   at java.io.ObjectInputStream.readArray(ObjectInputStream.java:1603)
                   at java.io.ObjectInputStream.readObject0(ObjectInputStream.java:1271)
                   at java.io.ObjectInputStream.defaultReadFields(ObjectInputStream.java:1845)
                   at java.io.ObjectInputStream.readSerialData(ObjectInputStream.java:1769)
                   at java.io.ObjectInputStream.readOrdinaryObject(ObjectInputStream.java:1646)
                   at java.io.ObjectInputStream.readObject0(ObjectInputStream.java:1274)
                   at java.io.ObjectInputStream.defaultReadFields(ObjectInputStream.java:1845)
                   at java.io.ObjectInputStream.readSerialData(ObjectInputStream.java:1769)
                   at java.io.ObjectInputStream.readOrdinaryObject(ObjectInputStream.java:1646)
                   at java.io.ObjectInputStream.readObject0(ObjectInputStream.java:1274)
                   at java.io.ObjectInputStream.defaultReadFields(ObjectInputStream.java:1845)
                   at java.io.ObjectInputStream.readSerialData(ObjectInputStream.java:1769)
                   at java.io.ObjectInputStream.readOrdinaryObject(ObjectInputStream.java:1646)
                   at java.io.ObjectInputStream.readObject0(ObjectInputStream.java:1274)
                   at java.io.ObjectInputStream.defaultReadFields(ObjectInputStream.java:1845)
                   at java.io.ObjectInputStream.readSerialData(ObjectInputStream.java:1769)
                   at java.io.ObjectInputStream.readOrdinaryObject(ObjectInputStream.java:1646)
                   at java.io.ObjectInputStream.readObject0(ObjectInputStream.java:1274)
                   at java.io.ObjectInputStream.readObject(ObjectInputStream.java:324)
                   at java.util.HashMap.readObject(HashMap.java:1006)
                   at sun.reflect.GeneratedMethodAccessor10.invoke(Unknown Source)
                   at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25)
                   at java.lang.reflect.Method.invoke(Method.java:324)
                   at java.io.ObjectStreamClass.invokeReadObject(ObjectStreamClass.java:838)
                   at java.io.ObjectInputStream.readSerialData(ObjectInputStream.java:1746)
                   at java.io.ObjectInputStream.readOrdinaryObject(ObjectInputStream.java:1646)
                   at java.io.ObjectInputStream.readObject0(ObjectInputStream.java:1274)
                   at java.io.ObjectInputStream.defaultReadFields(ObjectInputStream.java:1845)
                   at java.io.ObjectInputStream.readSerialData(ObjectInputStream.java:1769)
                   at java.io.ObjectInputStream.readOrdinaryObject(ObjectInputStream.java:1646)
                   at java.io.ObjectInputStream.readObject0(ObjectInputStream.java:1274)
                   at java.io.ObjectInputStream.readObject(ObjectInputStream.java:324)
                   at weblogic.common.internal.ChunkedObjectInputStream.readObject(ChunkedObjectInputStream.java:120)
                   at weblogic.rjvm.MsgAbbrevInputStream.readObject(MsgAbbrevInputStream.java:120)
                   at weblogic.cluster.replication.ReplicationManager_WLSkel.invoke(Unknown Source)
                   at weblogic.rmi.internal.BasicServerRef.invoke(BasicServerRef.java:477)
                   at weblogic.rmi.internal.BasicServerRef$1.run(BasicServerRef.java:420)
                   at weblogic.security.acl.internal.AuthenticatedSubject.doAs(AuthenticatedSubject.java:363)
                   at weblogic.security.service.SecurityManager.runAs(SecurityManager.java:147)
                   at weblogic.rmi.internal.BasicServerRef.handleRequest(BasicServerRef.java:415)
                   at weblogic.rmi.internal.BasicExecuteRequest.execute(BasicExecuteRequest.java:30)
              Please advise , would be of help ..
              thanks a lot for taking a look
              s

    ####<Jan 19, 2007 2:55:00 AM CST> <Error> <Kernel> <bocephus.aus.lab.vignette.com> <Preview2DPMSrv> <ExecuteThread: '14' for queue: 'weblogic.kernel.Default'> <<WLS Kernel>> <> <BEA-000802> <ExecuteRequest failed
              java.lang.ClassCastException.
              java.lang.Throwable
                   at weblogic.servlet.internal.session.ReplicatedSessionContext.sync(ReplicatedSessionContext.java:175)
                   at weblogic.servlet.internal.ServletRequestImpl.syncSession(ServletRequestImpl.java:2581)
                   at weblogic.servlet.internal.ServletRequestImpl.syncSession(ServletRequestImpl.java:2566)
                   at weblogic.servlet.internal.WebAppServletContext.invokeServlet(WebAppServletContext.java:3920)
                   at weblogic.servlet.internal.ServletRequestImpl.execute(ServletRequestImpl.java:2773)
                   at weblogic.kernel.ExecuteThread.execute(ExecuteThread.java:224)
                   at weblogic.kernel.ExecuteThread.run(ExecuteThread.java:183)
              >
              ####<Jan 19, 2007 2:55:12 AM CST> <Error> <Kernel> <bocephus.aus.lab.vignette.com> <Preview2DPMSrv> <ExecuteThread: '14' for queue: 'weblogic.kernel.Default'> <<WLS Kernel>> <> <BEA-000802> <ExecuteRequest failed
              java.lang.ClassCastException.
              java.lang.Throwable
                   at weblogic.servlet.internal.session.ReplicatedSessionContext.sync(ReplicatedSessionContext.java:175)
                   at weblogic.servlet.internal.ServletRequestImpl.syncSession(ServletRequestImpl.java:2581)
                   at weblogic.servlet.internal.ServletRequestImpl.syncSession(ServletRequestImpl.java:2566)
                   at weblogic.servlet.internal.WebAppServletContext.invokeServlet(WebAppServletContext.java:3920)
                   at weblogic.servlet.internal.ServletRequestImpl.execute(ServletRequestImpl.java:2773)
                   at weblogic.kernel.ExecuteThread.execute(ExecuteThread.java:224)
                   at weblogic.kernel.ExecuteThread.run(ExecuteThread.java:183)
              I am getting these logs in domain.
              How to solve this problem.
              Thanks
              Somashekar

  • How to install EAP-TLS certificate?

    Hi All,
    Our wireless network requires EAP-TLS certificate installation.
    We use a MS 2003 server as a CA server.
    I tried to brows to the issuing website (http://CAserver/certsrv) but when I get to the section where I need to choose the strength of the key, somehow the phone's browser is not showing the options...
    So, I tried to issue a certificate from the issuing station and got a file called certnew.cer .
    From what I read this is the right certificate type, so I copied the file to the phone and tried to open it...
    But it only open it with the Notes application...
    Any help????
    10x in advanced,
    Naor. 

    The certificate needs to be in .der format. You probably have it in .cer (PEM) format right now.
    You can convert it using openssl. Change the filenames appropriately:
    openssl x509 -outform der -in MYCERT.pem -out MYCERT.der 
    Then send the .der file to the phone and open it. The phone should offer to install it as a certificate.
    Message Edited by sanjaymehta on 06-Aug-2009 09:22 PM
    Message Edited by sanjaymehta on 06-Aug-2009 09:23 PM
    Sanjay Mehta
    Motorola "Brickphone" circa 1996, Alcatel One Touch, Ericsson R380, Sony Ericsson T220, Sony Ericsson T630, Nokia E50, Nokia E61i, Nokia 9300i, Nokia E71,Nokia X6, Google Nexus S, iPhone 4S

  • SAP ERP 2005 installation in Cluster mode on Solaris Platform using LDoms

    Hello Gurus,
    We want to install SAP ERP 2005 (ECC 6.0 SR3) on Solaris 10, (Solaris cluster 3.2). Please let me know the procedure.
    What would be the basic steps or difference while performing installation. Also if anybody can give the mount point details in cluster mode will be the great help.
    The installation will active-passive like CI and DB will be in the different system.
    Also i would like to address that we will be using SUN's Logical domain i.e. we will install DB + Application 1 on one server and CI + Application 2 on second server.
    In that case DB + CI will be in cluster mode, and App 1 and App 2 will act as load balancing.
    Db is Oracle 10g and OS is Solaris 10.
    If any other details you guys want, i will be glad to put here.
    Thanks & Regards,
    Kshitiz Goyal

    > We want to install SAP ERP 2005 (ECC 6.0 SR3) on Solaris 10, (Solaris cluster 3.2). Please let me know the procedure.
    > What would be the basic steps or difference while performing installation. Also if anybody can give the mount point details in cluster mode will be the great help.
    I suggest you get a good Sun consultant on-site and discuss that with him. It would be a LOT to write here and there are always at least two possibilities of doing such an installation.
    The normal installation guides cover the differences between a normal installation and an HA installation, on top there is a lot of documentation available at Sun (http://docs.sun.com/app/docs/doc/820-2562) and also http://wikis.sun.com/display/BluePrints/UsingSolarisClusterandSunClusterGeographic+Edition
    Markus

  • X86 sc3.1-0805 sol10-0606 - Doesn't boot in cluster mode

    Hi,
    i'm at my first experience with Sun Cluster on x86.
    I've already tried at home with two p4 whiteboxes and now repeating the experiment here at work with a similar conf.( i happily run 6 v490 in 3 clustered pair with 3510Fc and a test 2 u10 clustered pair with Multipack).
    no matter what i try i ever end up with the same results:
    nodes boot up outside of the cluster. Interconnects doesn't start and (i think maybe cause of that) global devices don't get initialized.
    I already tried many reinstall, already tried to add etc/cluster/nodeid to the filelist.ramdisk and update boot archive e reconfigure, like described in an infodoc to workaround a well known problem, but nothing changed
    This is the situation as i start either one of the nodes:
    mordor-nodo2 # svcs -x
    svc:/system/cluster/mountgfsys:default (Suncluster mountgfsys service)
    State: maintenance since Tue Aug 08 15:37:51 2006
    Reason: Restarter svc:/system/svc/restarter:default gave no explanation.
    See: http://sun.com/msg/SMF-8000-9C
    See: /var/svc/log/system-cluster-mountgfsys:default.log
    Impact: 13 dependent services are not running. (Use -v for list.)
    svc:/system/cluster/gdevsync:default (Suncluster gdevsync service)
    State: maintenance since Tue Aug 08 15:37:51 2006
    Reason: Restarter svc:/system/svc/restarter:default gave no explanation.
    See: http://sun.com/msg/SMF-8000-9C
    See: /var/svc/log/system-cluster-gdevsync:default.log
    Impact: 13 dependent services are not running. (Use -v for list.)
    svc:/network/multipath:cluster (Network Monitor Daemon)
    State: maintenance since Tue Aug 08 15:37:39 2006
    Reason: Maintenance requested by an administrator.
    See: http://sun.com/msg/SMF-8000-63
    See: in.mpathd(1M)
    See: /etc/svc/volatile/network-multipath:cluster.log
    Impact: This service is not running.
    Only the public interface is up in sc_ipmp0 group
    Cluster interconnects are 3com elxl interface in all two nodes and are connected with cross-cables elxl0->>elxl0 elxl1-->elxl1 (verified that it works)
    I've removed switches and put cross-cables while troubleshooting to have a simpler setup.
    /etc/vfstab - every fs is mirrored - metadb are in s7 , globalfs in s3
    /dev/md/dsk/d0 - - swap - no -
    /dev/md/dsk/d10 /dev/md/rdsk/d10 / ufs 1 no -
    /devices - /devices devfs - no -
    ctfs - /system/contract ctfs - no -
    objfs - /system/object objfs - no -
    swap - /tmp tmpfs - yes -
    #/dev/md/dsk/d20 /dev/md/rdsk/d20 /globaldevices ufs 2 yes -
    /dev/md/dsk/d20 /dev/md/rdsk/d20 /global/.devices/node@1 ufs 2 no global
    Planning to add a multipack for the multihost disks. But i'd like to solve this problem before
    Nothing useful appears on the logs.
    I only got the initial
    Not booting in cluster mode
    and nothing more
    Maybe missing something about versions of the software/hardware am using that for any reason can't work togheter?
    or some fix is needed?
    Any hint would be appreciated
    I stay at disposal for any kind of info
    thanks

    Hi,
    you should elaborate a bit on your hardware.
    Is it x64 or x32, what is your shared storage.
    The "not booting in cluster mode" appears in example if you want to install SC 3.1 and SC3.2 on x32 hardware. If this your goal, you should start with Solaris Express and Solaris Cluster express.
    Kind regards
    Detlef

  • Remove quorum in non-cluster mode

    Hello everybody!
    How can I remove the quorum device in non-cluster mode?
    Becouse I can't do this in cluster mode...
    Booting as part of a cluster
    NOTICE: CMM: Node nfl-node3 (nodeid = 1) with votecount = 1 added.
    NOTICE: CMM: Node nfl-node4 (nodeid = 2) with votecount = 1 added.
    NOTICE: CMM: Node nfl-node1 (nodeid = 3) with votecount = 1 added.
    NOTICE: CMM: Node nfl-node2 (nodeid = 4) with votecount = 1 added.
    NOTICE: CMM: Quorum device 1 (/dev/did/rdsk/d9s2) added; votecount = 3, bitmask of nodes with configured paths = 0xf.
    NOTICE: CMM: Quorum device 2 (/dev/did/rdsk/d12s2) added; votecount = 1, bitmask of nodes with configured paths = 0xf.
    NOTICE: clcomm: Adapter e1000g3 constructed
    NOTICE: CMM: Node nfl-node3: attempting to join cluster.
    NOTICE: CMM: Node nfl-node1 (nodeid: 3, incarnation #: 1234208626) has become reachable.
    NOTICE: clcomm: Path nfl-node3:e1000g3 - nfl-node1:ce1 online
    NOTICE: CMM: Node nfl-node2 (nodeid: 4, incarnation #: 1234208578) has become reachable.
    NOTICE: clcomm: Path nfl-node3:e1000g3 - nfl-node2:ce1 online
    NOTICE: CMM: Cluster doesn't have operational quorum yet; waiting for quorum.
    NOTICE: CMM: Node nfl-node4 (nodeid: 2, incarnation #: 1234260318) has become reachable.
    NOTICE: clcomm: Path nfl-node3:e1000g3 - nfl-node4:e1000g3 online
    NOTICE: CMM: Cluster doesn't have operational quorum yet; waiting for quorum.Thanks a lot.

    Solve:
    0) reboot -- -x (reboot node in non-cluster mode)
    1) cp /etc/cluster/ccr/global/infrastructure /etc/cluster/ccr/global/infrastructure.backup.`date +%d_%m`
    2) vi /etc/cluster/ccr/global/infrastructure
    remove second quorum cluster.quorum_devices.2
    change cluster.quorum_devices.1.properties.access_mode scsi3 to cluster.quorum_devices.1.properties.access_mode scsi2
    3) /usr/cluster/lib/sc/ccradm -o -i /etc/cluster/ccr/global/infrastructure (create checksums)
    4) reboot
    Our admin ( EMS SYMMETRIX ) can't set scsi3 bit reservation... :-(
    I don't know why. >:-( I hate him, very lazy man!
    P.S. Tim thank for you again! You man!

  • How to install sp2 for sql server 2012 , where sql server 2012 instnce is installed in cluster mode

    Hi Everyone,
    I want to install sp2 for sql server 2012, My sql server 2012 instance is installed in cluster mode.
    Please suggest the best practice to install sp2 , what are prerequisite and recommendation.
    Please share installation guide for sp2 in cluster instance, if any one have.
    Thanks All
    Aditya

    Did you searched a bit before posting question.
    Please read
    https://support.microsoft.com/kb/958734?wa=wsignin1.0
    http://blogs.msdn.com/b/john_daskalakis/archive/2014/09/05/how-to-install-a-service-pack-at-a-sql-server-2012-failover-instance-best-practices.aspx
    http://blogs.msdn.com/b/jason_howell/archive/2012/08/28/how-to-patch-sql-server-2012-setup-with-an-updated-setup-package-using-updatesource-to-get-a-smart-setup.aspx
    Please mark this reply as answer if it solved your issue or vote as helpful if it helped so that other forum members can benefit from it
    My Technet Wiki Article
    MVP

  • [Solved] Unacceptable TLS Certificate with Gnome Online Accounts

    Hi Guys,
    I am trying to add my Google account to the Gnome Online Accounts but I keep getting an error saying "Unacceptable TLS Certificate".  I am using Gnome 3.16 from Testing and this seems to be my only issue I am having. 
    EDIT: I almost forgot, Epiphany Browser keeps giving me this error every time I use Google to search:
    Look out!
    This might not be the real www.google.co.nz.
    When you try to connect securely, websites present identification to prove that your connection has not been maliciously intercepted. There is something wrong with this website’s identification:
    This website’s identification was not issued by a trusted organization.
    A third party may have hijacked your connection. You should continue only if you know there is a good reason why this website does not use trusted identification. Legitimate banks, stores, and other public sites will not ask you to do this.
    Load Anyway
    Anyone have any ideas on how to correct this error?
    Last edited by Dobbie03 (2015-04-06 17:10:43)

    heftig wrote:Please post the output of "ls -l /etc/ssl/certs" and "gnutls-cli www.google.co.nz </dev/null".
    total 1792
    lrwxrwxrwx 1 root root 64 Apr 5 08:50 00673b5b.0 -> ../../ca-certificates/extracted/cadir/thawte_Primary_Root_CA.pem
    lrwxrwxrwx 1 root root 83 Apr 5 08:50 02265526.0 -> ../../ca-certificates/extracted/cadir/Entrust_Root_Certification_Authority_-_G2.pem
    lrwxrwxrwx 1 root root 67 Apr 5 08:50 024dc131.0 -> ../../ca-certificates/extracted/cadir/Microsec_e-Szigno_Root_CA.pem
    lrwxrwxrwx 1 root root 69 Apr 5 08:50 02b73561.0 -> ../../ca-certificates/extracted/cadir/Comodo_Secure_Services_root.pem
    lrwxrwxrwx 1 root root 74 Apr 5 08:50 03179a64.0 -> ../../ca-certificates/extracted/cadir/Staat_der_Nederlanden_EV_Root_CA.pem
    lrwxrwxrwx 1 root root 63 Apr 5 08:50 034868d6.0 -> ../../ca-certificates/extracted/cadir/Swisscom_Root_EV_CA_2.pem
    lrwxrwxrwx 1 root root 88 Apr 5 08:50 039c618a.0 -> ../../ca-certificates/extracted/cadir/TURKTRUST_Certificate_Services_Provider_Root_2.pem
    lrwxrwxrwx 1 root root 54 Apr 5 08:50 03f2b8cf.0 -> ../../ca-certificates/extracted/cadir/WoSign_China.pem
    lrwxrwxrwx 1 root root 79 Apr 5 08:50 04f60c28.0 -> ../../ca-certificates/extracted/cadir/USERTrust_ECC_Certification_Authority.pem
    lrwxrwxrwx 1 root root 78 Apr 5 08:50 052e396b.0 -> ../../ca-certificates/extracted/cadir/AddTrust_Qualified_Certificates_Root.pem
    lrwxrwxrwx 1 root root 65 Apr 5 08:50 062cdee6.0 -> ../../ca-certificates/extracted/cadir/GlobalSign_Root_CA_-_R3.pem
    lrwxrwxrwx 1 root root 63 Apr 5 08:50 064e0aa9.0 -> ../../ca-certificates/extracted/cadir/QuoVadis_Root_CA_2_G3.pem
    lrwxrwxrwx 1 root root 58 Apr 5 08:50 080911ac.0 -> ../../ca-certificates/extracted/cadir/QuoVadis_Root_CA.pem
    lrwxrwxrwx 1 root root 72 Apr 5 08:50 0810ba98.0 -> ../../ca-certificates/extracted/cadir/Root_CA_Generalitat_Valenciana.pem
    lrwxrwxrwx 1 root root 87 Apr 5 08:50 08aef7bb.0 -> ../../ca-certificates/extracted/cadir/WellsSecure_Public_Root_Certificate_Authority.pem
    lrwxrwxrwx 1 root root 92 Apr 5 08:50 09789157.0 -> ../../ca-certificates/extracted/cadir/Starfield_Services_Root_Certificate_Authority_-_G2.pem
    lrwxrwxrwx 1 root root 54 Apr 5 08:50 0b1b94ef.0 -> ../../ca-certificates/extracted/cadir/CFCA_EV_ROOT.pem
    lrwxrwxrwx 1 root root 93 Apr 5 08:50 0b759015.0 -> ../../ca-certificates/extracted/cadir/E-Guven_Kok_Elektronik_Sertifika_Hizmet_Saglayicisi.pem
    lrwxrwxrwx 1 root root 72 Apr 5 08:50 0c4c9b6c.0 -> ../../ca-certificates/extracted/cadir/Global_Chambersign_Root_-_2008.pem
    lrwxrwxrwx 1 root root 93 Apr 5 08:50 0d188d89.0 -> ../../ca-certificates/extracted/cadir/E-Guven_Kok_Elektronik_Sertifika_Hizmet_Saglayicisi.pem
    lrwxrwxrwx 1 root root 69 Apr 5 08:50 0d69c7e1.0 -> ../../ca-certificates/extracted/cadir/GlobalSign_ECC_Root_CA_-_R4.pem
    lrwxrwxrwx 1 root root 92 Apr 5 08:50 10531352.0 -> ../../ca-certificates/extracted/cadir/Starfield_Services_Root_Certificate_Authority_-_G2.pem
    lrwxrwxrwx 1 root root 84 Apr 5 08:50 106f3e4d.0 -> ../../ca-certificates/extracted/cadir/Entrust_Root_Certification_Authority_-_EC1.pem
    lrwxrwxrwx 1 root root 65 Apr 5 08:50 111e6273.0 -> ../../ca-certificates/extracted/cadir/GlobalSign_Root_CA_-_R2.pem
    lrwxrwxrwx 1 root root 87 Apr 5 08:50 116bf586.0 -> ../../ca-certificates/extracted/cadir/GeoTrust_Primary_Certification_Authority_-_G2.pem
    lrwxrwxrwx 1 root root 49 Apr 5 08:50 119afc2e.0 -> ../../ca-certificates/extracted/cadir/Juur-SK.pem
    lrwxrwxrwx 1 root root 70 Apr 5 08:50 124bbd54.0 -> ../../ca-certificates/extracted/cadir/Comodo_Trusted_Services_root.pem
    lrwxrwxrwx 1 root root 73 Apr 5 08:50 128805a3.0 -> ../../ca-certificates/extracted/cadir/EE_Certification_Centre_Root_CA.pem
    lrwxrwxrwx 1 root root 56 Apr 5 08:50 12d55845.0 -> ../../ca-certificates/extracted/cadir/DST_Root_CA_X3.pem
    lrwxrwxrwx 1 root root 64 Apr 5 08:50 157753a5.0 -> ../../ca-certificates/extracted/cadir/AddTrust_External_Root.pem
    lrwxrwxrwx 1 root root 97 Apr 5 08:50 1636090b.0 -> ../../ca-certificates/extracted/cadir/Hellenic_Academic_and_Research_Institutions_RootCA_2011.pem
    lrwxrwxrwx 1 root root 104 Apr 5 08:50 1676090a.0 -> ../../ca-certificates/extracted/cadir/China_Internet_Network_Information_Center_EV_Certificates_Root.pem
    lrwxrwxrwx 1 root root 69 Apr 5 08:50 17b51fe6.0 -> ../../ca-certificates/extracted/cadir/Certplus_Class_2_Primary_CA.pem
    lrwxrwxrwx 1 root root 104 Apr 5 08:50 1874d4aa.0 -> ../../ca-certificates/extracted/cadir/China_Internet_Network_Information_Center_EV_Certificates_Root.pem
    lrwxrwxrwx 1 root root 61 Apr 5 08:50 18856ac4.0 -> ../../ca-certificates/extracted/cadir/SecureSign_RootCA11.pem
    lrwxrwxrwx 1 root root 69 Apr 5 08:50 1d3472b9.0 -> ../../ca-certificates/extracted/cadir/GlobalSign_ECC_Root_CA_-_R5.pem
    lrwxrwxrwx 1 root root 56 Apr 5 08:50 1dac3003.0 -> ../../ca-certificates/extracted/cadir/DST_ACES_CA_X6.pem
    lrwxrwxrwx 1 root root 53 Apr 5 08:50 1dcd6f4c.0 -> ../../ca-certificates/extracted/cadir/Taiwan_GRCA.pem
    lrwxrwxrwx 1 root root 72 Apr 5 08:50 1df5a75f.0 -> ../../ca-certificates/extracted/cadir/D-TRUST_Root_Class_3_CA_2_2009.pem
    lrwxrwxrwx 1 root root 73 Apr 5 08:50 1df5ec47.0 -> ../../ca-certificates/extracted/cadir/TC_TrustCenter_Universal_CA_III.pem
    lrwxrwxrwx 1 root root 75 Apr 5 08:50 1e08bfd1.0 -> ../../ca-certificates/extracted/cadir/IdenTrust_Public_Sector_Root_CA_1.pem
    lrwxrwxrwx 1 root root 70 Apr 5 08:50 1e09d511.0 -> ../../ca-certificates/extracted/cadir/T-TeleSec_GlobalRoot_Class_2.pem
    lrwxrwxrwx 1 root root 70 Apr 5 08:50 1e1eab7c.0 -> ../../ca-certificates/extracted/cadir/T-TeleSec_GlobalRoot_Class_3.pem
    lrwxrwxrwx 1 root root 65 Apr 5 08:50 1e8e7201.0 -> ../../ca-certificates/extracted/cadir/GlobalSign_Root_CA_-_R3.pem
    lrwxrwxrwx 1 root root 74 Apr 5 08:50 1eb37bdf.0 -> ../../ca-certificates/extracted/cadir/Chambers_of_Commerce_Root_-_2008.pem
    lrwxrwxrwx 1 root root 102 Apr 5 08:50 1ec4d31a.0 -> ../../ca-certificates/extracted/cadir/Verisign_Class_3_Public_Primary_Certification_Authority_-_G2.pem
    lrwxrwxrwx 1 root root 63 Apr 5 08:50 1f58a078.0 -> ../../ca-certificates/extracted/cadir/QuoVadis_Root_CA_2_G3.pem
    lrwxrwxrwx 1 root root 87 Apr 5 08:50 201cada0.0 -> ../../ca-certificates/extracted/cadir/America_Online_Root_Certification_Authority_2.pem
    lrwxrwxrwx 1 root root 61 Apr 5 08:50 20d096ba.0 -> ../../ca-certificates/extracted/cadir/ValiCert_Class_1_VA.pem
    lrwxrwxrwx 1 root root 58 Apr 5 08:50 21855f49.0 -> ../../ca-certificates/extracted/cadir/CA_Disig_Root_R1.pem
    lrwxrwxrwx 1 root root 61 Apr 5 08:50 219d9499.0 -> ../../ca-certificates/extracted/cadir/Go_Daddy_Class_2_CA.pem
    lrwxrwxrwx 1 root root 60 Apr 5 08:50 2251b13a.0 -> ../../ca-certificates/extracted/cadir/ComSign_Secured_CA.pem
    lrwxrwxrwx 1 root root 62 Apr 5 08:50 23f4c490.0 -> ../../ca-certificates/extracted/cadir/Starfield_Class_2_CA.pem
    lrwxrwxrwx 1 root root 76 Apr 5 08:50 244b5494.0 -> ../../ca-certificates/extracted/cadir/DigiCert_High_Assurance_EV_Root_CA.pem
    lrwxrwxrwx 1 root root 87 Apr 5 08:50 27af790d.0 -> ../../ca-certificates/extracted/cadir/GeoTrust_Primary_Certification_Authority_-_G2.pem
    lrwxrwxrwx 1 root root 69 Apr 5 08:50 2add47b6.0 -> ../../ca-certificates/extracted/cadir/GlobalSign_ECC_Root_CA_-_R5.pem
    lrwxrwxrwx 1 root root 58 Apr 5 08:50 2ae6433e.0 -> ../../ca-certificates/extracted/cadir/CA_Disig_Root_R2.pem
    lrwxrwxrwx 1 root root 70 Apr 5 08:50 2afc57aa.0 -> ../../ca-certificates/extracted/cadir/TC_TrustCenter_Class_2_CA_II.pem
    lrwxrwxrwx 1 root root 64 Apr 5 08:50 2b349938.0 -> ../../ca-certificates/extracted/cadir/AffirmTrust_Commercial.pem
    lrwxrwxrwx 1 root root 60 Apr 5 08:50 2c543cd1.0 -> ../../ca-certificates/extracted/cadir/GeoTrust_Global_CA.pem
    lrwxrwxrwx 1 root root 65 Apr 5 08:50 2d9dafe4.0 -> ../../ca-certificates/extracted/cadir/Buypass_Class_3_Root_CA.pem
    lrwxrwxrwx 1 root root 64 Apr 5 08:50 2e4eed3c.0 -> ../../ca-certificates/extracted/cadir/thawte_Primary_Root_CA.pem
    lrwxrwxrwx 1 root root 56 Apr 5 08:50 2e5ac55d.0 -> ../../ca-certificates/extracted/cadir/DST_Root_CA_X3.pem
    lrwxrwxrwx 1 root root 81 Apr 5 08:50 2fa87019.0 -> ../../ca-certificates/extracted/cadir/Network_Solutions_Certificate_Authority.pem
    lrwxrwxrwx 1 root root 87 Apr 5 08:50 2fb1850a.0 -> ../../ca-certificates/extracted/cadir/America_Online_Root_Certification_Authority_2.pem
    lrwxrwxrwx 1 root root 74 Apr 5 08:50 33815e15.0 -> ../../ca-certificates/extracted/cadir/StartCom_Certification_Authority.pem
    lrwxrwxrwx 1 root root 76 Apr 5 08:50 33815e15.1 -> ../../ca-certificates/extracted/cadir/StartCom_Certification_Authority.1.pem
    lrwxrwxrwx 1 root root 64 Apr 5 08:50 343eb6cb.0 -> ../../ca-certificates/extracted/cadir/Cybertrust_Global_Root.pem
    lrwxrwxrwx 1 root root 48 Apr 5 08:50 349f2832.0 -> ../../ca-certificates/extracted/cadir/EC-ACC.pem
    lrwxrwxrwx 1 root root 79 Apr 5 08:50 35105088.0 -> ../../ca-certificates/extracted/cadir/USERTrust_RSA_Certification_Authority.pem
    lrwxrwxrwx 1 root root 65 Apr 5 08:50 3513523f.0 -> ../../ca-certificates/extracted/cadir/DigiCert_Global_Root_CA.pem
    lrwxrwxrwx 1 root root 55 Apr 5 08:50 381ce4dd.0 -> ../../ca-certificates/extracted/cadir/ACEDICOM_Root.pem
    lrwxrwxrwx 1 root root 65 Apr 5 08:50 399e7759.0 -> ../../ca-certificates/extracted/cadir/DigiCert_Global_Root_CA.pem
    lrwxrwxrwx 1 root root 73 Apr 5 08:50 3a3b02ce.0 -> ../../ca-certificates/extracted/cadir/OISTE_WISeKey_Global_Root_GA_CA.pem
    lrwxrwxrwx 1 root root 67 Apr 5 08:50 3ad48a91.0 -> ../../ca-certificates/extracted/cadir/Baltimore_CyberTrust_Root.pem
    lrwxrwxrwx 1 root root 116 Apr 5 08:50 3b2716e5.0 -> ../../ca-certificates/extracted/cadir/EBG_Elektronik_Sertifika_Hizmet_Sa_xC4_x9Flay_xc4_xb1_x63_xc4_xb1s_xc4_xb1.pem
    lrwxrwxrwx 1 root root 99 Apr 5 08:50 3bde41ac.0 -> ../../ca-certificates/extracted/cadir/Autoridad_de_Certificacion_Firmaprofesional_CIF_A62634068.pem
    lrwxrwxrwx 1 root root 64 Apr 5 08:50 3c58f906.0 -> ../../ca-certificates/extracted/cadir/AddTrust_External_Root.pem
    lrwxrwxrwx 1 root root 74 Apr 5 08:50 3c6676aa.0 -> ../../ca-certificates/extracted/cadir/Staat_der_Nederlanden_EV_Root_CA.pem
    lrwxrwxrwx 1 root root 64 Apr 5 08:50 3c860d51.0 -> ../../ca-certificates/extracted/cadir/SwissSign_Gold_CA_-_G2.pem
    lrwxrwxrwx 1 root root 51 Apr 5 08:50 3c9a4d3b.0 -> ../../ca-certificates/extracted/cadir/ACCVRAIZ1.pem
    lrwxrwxrwx 1 root root 76 Apr 5 08:50 3d441de8.0 -> ../../ca-certificates/extracted/cadir/Staat_der_Nederlanden_Root_CA_-_G2.pem
    lrwxrwxrwx 1 root root 65 Apr 5 08:50 3e45d192.0 -> ../../ca-certificates/extracted/cadir/Hongkong_Post_Root_CA_1.pem
    lrwxrwxrwx 1 root root 83 Apr 5 08:50 3e7271e8.0 -> ../../ca-certificates/extracted/cadir/Entrust.net_Premium_2048_Secure_Server_CA.pem
    lrwxrwxrwx 1 root root 47 Apr 5 08:50 3ee7e181.0 -> ../../ca-certificates/extracted/cadir/IGC_A.pem
    lrwxrwxrwx 1 root root 60 Apr 5 08:50 3efd4dc0.0 -> ../../ca-certificates/extracted/cadir/Swisscom_Root_CA_2.pem
    lrwxrwxrwx 1 root root 72 Apr 5 08:50 40547a79.0 -> ../../ca-certificates/extracted/cadir/COMODO_Certification_Authority.pem
    lrwxrwxrwx 1 root root 97 Apr 5 08:50 40dc992e.0 -> ../../ca-certificates/extracted/cadir/Hellenic_Academic_and_Research_Institutions_RootCA_2011.pem
    lrwxrwxrwx 1 root root 97 Apr 5 08:50 415660c1.0 -> ../../ca-certificates/extracted/cadir/Verisign_Class_3_Public_Primary_Certification_Authority.pem
    lrwxrwxrwx 1 root root 99 Apr 5 08:50 415660c1.1 -> ../../ca-certificates/extracted/cadir/Verisign_Class_3_Public_Primary_Certification_Authority.1.pem
    lrwxrwxrwx 1 root root 167 Apr 5 08:50 418595b9.0 -> ../../ca-certificates/extracted/cadir/T_xc3_x9c_x42_xC4_xB0TAK_UEKAE_K_xC3_xB6k_Sertifika_Hizmet_Sa_xC4_x9Flay_xc4_xb1_x63_xc4_xb1s_xc4_xb1_-_S_xC3_xBCr_xC3_xBCm_3.pem
    lrwxrwxrwx 1 root root 81 Apr 5 08:50 4304c5e5.0 -> ../../ca-certificates/extracted/cadir/Network_Solutions_Certificate_Authority.pem
    lrwxrwxrwx 1 root root 56 Apr 5 08:50 442adcac.0 -> ../../ca-certificates/extracted/cadir/Certum_Root_CA.pem
    lrwxrwxrwx 1 root root 60 Apr 5 08:50 450c6e38.0 -> ../../ca-certificates/extracted/cadir/Swisscom_Root_CA_2.pem
    lrwxrwxrwx 1 root root 83 Apr 5 08:50 455f1b52.0 -> ../../ca-certificates/extracted/cadir/Entrust_Root_Certification_Authority_-_G2.pem
    lrwxrwxrwx 1 root root 82 Apr 5 08:50 480720ec.0 -> ../../ca-certificates/extracted/cadir/GeoTrust_Primary_Certification_Authority.pem
    lrwxrwxrwx 1 root root 75 Apr 5 08:50 4881cc08.0 -> ../../ca-certificates/extracted/cadir/USERTrust_Legacy_Secure_Server_CA.pem
    lrwxrwxrwx 1 root root 52 Apr 5 08:50 48a195d8.0 -> ../../ca-certificates/extracted/cadir/Izenpe.com.pem
    lrwxrwxrwx 1 root root 67 Apr 5 08:50 48bec511.0 -> ../../ca-certificates/extracted/cadir/Certum_Trusted_Network_CA.pem
    lrwxrwxrwx 1 root root 65 Apr 5 08:50 4a6481c9.0 -> ../../ca-certificates/extracted/cadir/GlobalSign_Root_CA_-_R2.pem
    lrwxrwxrwx 1 root root 75 Apr 5 08:50 4be590e0.0 -> ../../ca-certificates/extracted/cadir/IdenTrust_Public_Sector_Root_CA_1.pem
    lrwxrwxrwx 1 root root 83 Apr 5 08:50 4bfab552.0 -> ../../ca-certificates/extracted/cadir/Starfield_Root_Certificate_Authority_-_G2.pem
    lrwxrwxrwx 1 root root 80 Apr 5 08:50 4d241d64.0 -> ../../ca-certificates/extracted/cadir/VeriSign_Class_3_Secure_Server_CA_-_G2.pem
    lrwxrwxrwx 1 root root 68 Apr 5 08:50 4d654d1d.0 -> ../../ca-certificates/extracted/cadir/GTE_CyberTrust_Global_Root.pem
    lrwxrwxrwx 1 root root 68 Apr 5 08:50 4e18c148.0 -> ../../ca-certificates/extracted/cadir/Deutsche_Telekom_Root_CA_2.pem
    lrwxrwxrwx 1 root root 64 Apr 5 08:50 4f316efb.0 -> ../../ca-certificates/extracted/cadir/SwissSign_Gold_CA_-_G2.pem
    lrwxrwxrwx 1 root root 66 Apr 5 08:50 4fbd6bfa.0 -> ../../ca-certificates/extracted/cadir/UTN_DATACorp_SGC_Root_CA.pem
    lrwxrwxrwx 1 root root 71 Apr 5 08:50 5021a0a2.0 -> ../../ca-certificates/extracted/cadir/TC_TrustCenter_Universal_CA_I.pem
    lrwxrwxrwx 1 root root 66 Apr 5 08:50 5046c355.0 -> ../../ca-certificates/extracted/cadir/SwissSign_Silver_CA_-_G2.pem
    lrwxrwxrwx 1 root root 89 Apr 5 08:50 524d9b43.0 -> ../../ca-certificates/extracted/cadir/VeriSign_Universal_Root_Certification_Authority.pem
    lrwxrwxrwx 1 root root 73 Apr 5 08:50 5273a94c.0 -> ../../ca-certificates/extracted/cadir/E-Tugra_Certification_Authority.pem
    lrwxrwxrwx 1 root root 63 Apr 5 08:50 52b525c7.0 -> ../../ca-certificates/extracted/cadir/QuoVadis_Root_CA_1_G3.pem
    lrwxrwxrwx 1 root root 70 Apr 5 08:50 5443e9e3.0 -> ../../ca-certificates/extracted/cadir/T-TeleSec_GlobalRoot_Class_3.pem
    lrwxrwxrwx 1 root root 65 Apr 5 08:50 54657681.0 -> ../../ca-certificates/extracted/cadir/Buypass_Class_2_Root_CA.pem
    lrwxrwxrwx 1 root root 61 Apr 5 08:50 55a10908.0 -> ../../ca-certificates/extracted/cadir/ValiCert_Class_2_VA.pem
    lrwxrwxrwx 1 root root 70 Apr 5 08:50 56657bde.0 -> ../../ca-certificates/extracted/cadir/Comodo_Trusted_Services_root.pem
    lrwxrwxrwx 1 root root 88 Apr 5 08:50 56b8a0b6.0 -> ../../ca-certificates/extracted/cadir/TURKTRUST_Certificate_Services_Provider_Root_2.pem
    lrwxrwxrwx 1 root root 62 Apr 5 08:50 57692373.0 -> ../../ca-certificates/extracted/cadir/GeoTrust_Global_CA_2.pem
    lrwxrwxrwx 1 root root 76 Apr 5 08:50 57b0f75e.0 -> ../../ca-certificates/extracted/cadir/UTN-USERFirst-Network_Applications.pem
    lrwxrwxrwx 1 root root 77 Apr 5 08:50 57bbd831.0 -> ../../ca-certificates/extracted/cadir/ApplicationCA_-_Japanese_Government.pem
    lrwxrwxrwx 1 root root 66 Apr 5 08:50 57bcb2da.0 -> ../../ca-certificates/extracted/cadir/SwissSign_Silver_CA_-_G2.pem
    lrwxrwxrwx 1 root root 47 Apr 5 08:50 58a44af1.0 -> ../../ca-certificates/extracted/cadir/IGC_A.pem
    lrwxrwxrwx 1 root root 61 Apr 5 08:50 590d426f.0 -> ../../ca-certificates/extracted/cadir/CAcert_Class_3_Root.pem
    lrwxrwxrwx 1 root root 91 Apr 5 08:50 592c0a9a.0 -> ../../ca-certificates/extracted/cadir/TURKTRUST_Certificate_Services_Provider_Root_2007.pem
    lrwxrwxrwx 1 root root 76 Apr 5 08:50 5a250ea7.0 -> ../../ca-certificates/extracted/cadir/Staat_der_Nederlanden_Root_CA_-_G3.pem
    lrwxrwxrwx 1 root root 72 Apr 5 08:50 5a3f0ff8.0 -> ../../ca-certificates/extracted/cadir/COMODO_Certification_Authority.pem
    lrwxrwxrwx 1 root root 76 Apr 5 08:50 5a4d6896.0 -> ../../ca-certificates/extracted/cadir/Staat_der_Nederlanden_Root_CA_-_G3.pem
    lrwxrwxrwx 1 root root 60 Apr 5 08:50 5ad8a5d6.0 -> ../../ca-certificates/extracted/cadir/GlobalSign_Root_CA.pem
    lrwxrwxrwx 1 root root 76 Apr 5 08:50 5c44d531.0 -> ../../ca-certificates/extracted/cadir/Staat_der_Nederlanden_Root_CA_-_G2.pem
    lrwxrwxrwx 1 root root 64 Apr 5 08:50 5cd81ad7.0 -> ../../ca-certificates/extracted/cadir/TeliaSonera_Root_CA_v1.pem
    lrwxrwxrwx 1 root root 58 Apr 5 08:50 5cf9d536.0 -> ../../ca-certificates/extracted/cadir/QuoVadis_Root_CA.pem
    lrwxrwxrwx 1 root root 54 Apr 5 08:50 5d63b0ae.0 -> ../../ca-certificates/extracted/cadir/WoSign_China.pem
    lrwxrwxrwx 1 root root 102 Apr 5 08:50 5e4e69e7.0 -> ../../ca-certificates/extracted/cadir/VeriSign_Class_3_Public_Primary_Certification_Authority_-_G4.pem
    lrwxrwxrwx 1 root root 67 Apr 5 08:50 5ed36f99.0 -> ../../ca-certificates/extracted/cadir/CA_Cert_Signing_Authority.pem
    lrwxrwxrwx 1 root root 61 Apr 5 08:50 5f15c80c.0 -> ../../ca-certificates/extracted/cadir/TWCA_Global_Root_CA.pem
    lrwxrwxrwx 1 root root 70 Apr 5 08:50 5f267794.0 -> ../../ca-certificates/extracted/cadir/Entrust.net_Secure_Server_CA.pem
    lrwxrwxrwx 1 root root 72 Apr 5 08:50 5f47b495.0 -> ../../ca-certificates/extracted/cadir/Actalis_Authentication_Root_CA.pem
    lrwxrwxrwx 1 root root 65 Apr 5 08:50 607986c7.0 -> ../../ca-certificates/extracted/cadir/DigiCert_Global_Root_G2.pem
    lrwxrwxrwx 1 root root 86 Apr 5 08:50 60afe812.0 -> ../../ca-certificates/extracted/cadir/NetLock_Arany__Class_Gold__F__tan__s__tv__ny.pem
    lrwxrwxrwx 1 root root 64 Apr 5 08:50 63a2c897.0 -> ../../ca-certificates/extracted/cadir/TeliaSonera_Root_CA_v1.pem
    lrwxrwxrwx 1 root root 53 Apr 5 08:50 6410666e.0 -> ../../ca-certificates/extracted/cadir/Taiwan_GRCA.pem
    lrwxrwxrwx 1 root root 67 Apr 5 08:50 653b494a.0 -> ../../ca-certificates/extracted/cadir/Baltimore_CyberTrust_Root.pem
    lrwxrwxrwx 1 root root 167 Apr 5 08:50 65b876bd.0 -> ../../ca-certificates/extracted/cadir/T_xc3_x9c_x42_xC4_xB0TAK_UEKAE_K_xC3_xB6k_Sertifika_Hizmet_Sa_xC4_x9Flay_xc4_xb1_x63_xc4_xb1s_xc4_xb1_-_S_xC3_xBCr_xC3_xBCm_3.pem
    lrwxrwxrwx 1 root root 60 Apr 5 08:50 667c66d4.0 -> ../../ca-certificates/extracted/cadir/Swisscom_Root_CA_1.pem
    lrwxrwxrwx 1 root root 69 Apr 5 08:50 67495436.0 -> ../../ca-certificates/extracted/cadir/thawte_Primary_Root_CA_-_G3.pem
    lrwxrwxrwx 1 root root 69 Apr 5 08:50 69105f4f.0 -> ../../ca-certificates/extracted/cadir/DigiCert_Assured_ID_Root_CA.pem
    lrwxrwxrwx 1 root root 78 Apr 5 08:50 6b99d060.0 -> ../../ca-certificates/extracted/cadir/Entrust_Root_Certification_Authority.pem
    lrwxrwxrwx 1 root root 58 Apr 5 08:50 6cc3c4c3.0 -> ../../ca-certificates/extracted/cadir/Thawte_Server_CA.pem
    lrwxrwxrwx 1 root root 56 Apr 5 08:50 6e8bf996.0 -> ../../ca-certificates/extracted/cadir/Certum_Root_CA.pem
    lrwxrwxrwx 1 root root 61 Apr 5 08:50 6fcc125d.0 -> ../../ca-certificates/extracted/cadir/Visa_eCommerce_Root.pem
    lrwxrwxrwx 1 root root 62 Apr 5 08:50 706f604c.0 -> ../../ca-certificates/extracted/cadir/XRamp_Global_CA_Root.pem
    lrwxrwxrwx 1 root root 62 Apr 5 08:50 72f369af.0 -> ../../ca-certificates/extracted/cadir/Buypass_Class_2_CA_1.pem
    lrwxrwxrwx 1 root root 102 Apr 5 08:50 72fa7371.0 -> ../../ca-certificates/extracted/cadir/Verisign_Class_3_Public_Primary_Certification_Authority_-_G2.pem
    lrwxrwxrwx 1 root root 63 Apr 5 08:50 749e9e03.0 -> ../../ca-certificates/extracted/cadir/QuoVadis_Root_CA_1_G3.pem
    lrwxrwxrwx 1 root root 66 Apr 5 08:50 75680d2e.0 -> ../../ca-certificates/extracted/cadir/Comodo_AAA_Services_root.pem
    lrwxrwxrwx 1 root root 66 Apr 5 08:50 75d1b2ed.0 -> ../../ca-certificates/extracted/cadir/DigiCert_Trusted_Root_G4.pem
    lrwxrwxrwx 1 root root 97 Apr 5 08:50 7651b327.0 -> ../../ca-certificates/extracted/cadir/Verisign_Class_3_Public_Primary_Certification_Authority.pem
    lrwxrwxrwx 1 root root 99 Apr 5 08:50 7651b327.1 -> ../../ca-certificates/extracted/cadir/Verisign_Class_3_Public_Primary_Certification_Authority.1.pem
    lrwxrwxrwx 1 root root 62 Apr 5 08:50 76579174.0 -> ../../ca-certificates/extracted/cadir/XRamp_Global_CA_Root.pem
    lrwxrwxrwx 1 root root 71 Apr 5 08:50 7672ac4b.0 -> ../../ca-certificates/extracted/cadir/Certinomis_-_Autorit___Racine.pem
    lrwxrwxrwx 1 root root 64 Apr 5 08:50 76cb8f92.0 -> ../../ca-certificates/extracted/cadir/Cybertrust_Global_Root.pem
    lrwxrwxrwx 1 root root 60 Apr 5 08:50 76faf6c0.0 -> ../../ca-certificates/extracted/cadir/QuoVadis_Root_CA_3.pem
    lrwxrwxrwx 1 root root 66 Apr 5 08:50 778e3cb0.0 -> ../../ca-certificates/extracted/cadir/UTN_DATACorp_SGC_Root_CA.pem
    lrwxrwxrwx 1 root root 56 Apr 5 08:50 790a7190.0 -> ../../ca-certificates/extracted/cadir/DST_ACES_CA_X6.pem
    lrwxrwxrwx 1 root root 60 Apr 5 08:50 7999be0d.0 -> ../../ca-certificates/extracted/cadir/GeoTrust_Global_CA.pem
    lrwxrwxrwx 1 root root 71 Apr 5 08:50 79ad8b43.0 -> ../../ca-certificates/extracted/cadir/Equifax_Secure_eBusiness_CA_1.pem
    lrwxrwxrwx 1 root root 60 Apr 5 08:50 7a819ef2.0 -> ../../ca-certificates/extracted/cadir/QuoVadis_Root_CA_2.pem
    lrwxrwxrwx 1 root root 102 Apr 5 08:50 7d0b38bd.0 -> ../../ca-certificates/extracted/cadir/VeriSign_Class_3_Public_Primary_Certification_Authority_-_G4.pem
    lrwxrwxrwx 1 root root 64 Apr 5 08:50 7d3cd826.0 -> ../../ca-certificates/extracted/cadir/RSA_Root_Certificate_1.pem
    lrwxrwxrwx 1 root root 102 Apr 5 08:50 7d453d8f.0 -> ../../ca-certificates/extracted/cadir/Verisign_Class_3_Public_Primary_Certification_Authority_-_G3.pem
    lrwxrwxrwx 1 root root 87 Apr 5 08:50 7d5a75e4.0 -> ../../ca-certificates/extracted/cadir/WellsSecure_Public_Root_Certificate_Authority.pem
    lrwxrwxrwx 1 root root 69 Apr 5 08:50 7f3d5d1d.0 -> ../../ca-certificates/extracted/cadir/DigiCert_Assured_ID_Root_G3.pem
    lrwxrwxrwx 1 root root 48 Apr 5 08:50 8096d0a9.0 -> ../../ca-certificates/extracted/cadir/WoSign.pem
    lrwxrwxrwx 1 root root 68 Apr 5 08:50 812e17de.0 -> ../../ca-certificates/extracted/cadir/Deutsche_Telekom_Root_CA_2.pem
    lrwxrwxrwx 1 root root 72 Apr 5 08:50 8160b96c.0 -> ../../ca-certificates/extracted/cadir/Microsec_e-Szigno_Root_CA_2009.pem
    lrwxrwxrwx 1 root root 76 Apr 5 08:50 81b9768f.0 -> ../../ca-certificates/extracted/cadir/DigiCert_High_Assurance_EV_Root_CA.pem
    lrwxrwxrwx 1 root root 65 Apr 5 08:50 82223c44.0 -> ../../ca-certificates/extracted/cadir/Buypass_Class_2_Root_CA.pem
    lrwxrwxrwx 1 root root 62 Apr 5 08:50 8470719d.0 -> ../../ca-certificates/extracted/cadir/RSA_Security_2048_v3.pem
    lrwxrwxrwx 1 root root 88 Apr 5 08:50 84cba82f.0 -> ../../ca-certificates/extracted/cadir/TURKTRUST_Certificate_Services_Provider_Root_1.pem
    lrwxrwxrwx 1 root root 83 Apr 5 08:50 85cde254.0 -> ../../ca-certificates/extracted/cadir/Starfield_Root_Certificate_Authority_-_G2.pem
    lrwxrwxrwx 1 root root 74 Apr 5 08:50 861a399d.0 -> ../../ca-certificates/extracted/cadir/AddTrust_Low-Value_Services_Root.pem
    lrwxrwxrwx 1 root root 64 Apr 5 08:50 86212b19.0 -> ../../ca-certificates/extracted/cadir/AffirmTrust_Networking.pem
    lrwxrwxrwx 1 root root 77 Apr 5 08:50 876f1e28.0 -> ../../ca-certificates/extracted/cadir/StartCom_Certification_Authority_G2.pem
    lrwxrwxrwx 1 root root 65 Apr 5 08:50 87753b0d.0 -> ../../ca-certificates/extracted/cadir/GeoTrust_Universal_CA_2.pem
    lrwxrwxrwx 1 root root 58 Apr 5 08:50 882de061.0 -> ../../ca-certificates/extracted/cadir/certSIGN_ROOT_CA.pem
    lrwxrwxrwx 1 root root 65 Apr 5 08:50 8867006a.0 -> ../../ca-certificates/extracted/cadir/GeoTrust_Universal_CA_2.pem
    lrwxrwxrwx 1 root root 88 Apr 5 08:50 88f89ea7.0 -> ../../ca-certificates/extracted/cadir/TURKTRUST_Certificate_Services_Provider_Root_1.pem
    lrwxrwxrwx 1 root root 52 Apr 5 08:50 895cad1a.0 -> ../../ca-certificates/extracted/cadir/CNNIC_ROOT.pem
    lrwxrwxrwx 1 root root 76 Apr 5 08:50 89c02a45.0 -> ../../ca-certificates/extracted/cadir/COMODO_ECC_Certification_Authority.pem
    lrwxrwxrwx 1 root root 71 Apr 5 08:50 8b59b1ad.0 -> ../../ca-certificates/extracted/cadir/AddTrust_Public_Services_Root.pem
    lrwxrwxrwx 1 root root 52 Apr 5 08:50 8c24b137.0 -> ../../ca-certificates/extracted/cadir/PSCProcert.pem
    lrwxrwxrwx 1 root root 69 Apr 5 08:50 8d6437c3.0 -> ../../ca-certificates/extracted/cadir/DigiCert_Assured_ID_Root_G2.pem
    lrwxrwxrwx 1 root root 58 Apr 5 08:50 8d86cdd1.0 -> ../../ca-certificates/extracted/cadir/certSIGN_ROOT_CA.pem
    lrwxrwxrwx 1 root root 62 Apr 5 08:50 8e52d3cd.0 -> ../../ca-certificates/extracted/cadir/Buypass_Class_3_CA_1.pem
    lrwxrwxrwx 1 root root 58 Apr 5 08:50 9007ae68.0 -> ../../ca-certificates/extracted/cadir/CA_Disig_Root_R1.pem
    lrwxrwxrwx 1 root root 73 Apr 5 08:50 91739615.0 -> ../../ca-certificates/extracted/cadir/EE_Certification_Centre_Root_CA.pem
    lrwxrwxrwx 1 root root 54 Apr 5 08:50 9282e51c.0 -> ../../ca-certificates/extracted/cadir/CFCA_EV_ROOT.pem
    lrwxrwxrwx 1 root root 72 Apr 5 08:50 930ac5d2.0 -> ../../ca-certificates/extracted/cadir/Actalis_Authentication_Root_CA.pem
    lrwxrwxrwx 1 root root 60 Apr 5 08:50 9339512a.0 -> ../../ca-certificates/extracted/cadir/QuoVadis_Root_CA_3.pem
    lrwxrwxrwx 1 root root 64 Apr 5 08:50 93bc0acc.0 -> ../../ca-certificates/extracted/cadir/AffirmTrust_Networking.pem
    lrwxrwxrwx 1 root root 58 Apr 5 08:50 9576d26b.0 -> ../../ca-certificates/extracted/cadir/CA_Disig_Root_R2.pem
    lrwxrwxrwx 1 root root 67 Apr 5 08:50 95aff9e3.0 -> ../../ca-certificates/extracted/cadir/Certum_Trusted_Network_CA.pem
    lrwxrwxrwx 1 root root 48 Apr 5 08:50 961f5451.0 -> ../../ca-certificates/extracted/cadir/WoSign.pem
    lrwxrwxrwx 1 root root 65 Apr 5 08:50 9685a493.0 -> ../../ca-certificates/extracted/cadir/Hongkong_Post_Root_CA_1.pem
    lrwxrwxrwx 1 root root 82 Apr 5 08:50 9772ca32.0 -> ../../ca-certificates/extracted/cadir/GeoTrust_Primary_Certification_Authority.pem
    lrwxrwxrwx 1 root root 73 Apr 5 08:50 9818ca0b.0 -> ../../ca-certificates/extracted/cadir/TC_TrustCenter_Universal_CA_III.pem
    lrwxrwxrwx 1 root root 86 Apr 5 08:50 988a38cb.0 -> ../../ca-certificates/extracted/cadir/NetLock_Arany__Class_Gold__F__tan__s__tv__ny.pem
    lrwxrwxrwx 1 root root 66 Apr 5 08:50 98ec67f0.0 -> ../../ca-certificates/extracted/cadir/Thawte_Premium_Server_CA.pem
    lrwxrwxrwx 1 root root 67 Apr 5 08:50 99d0fa06.0 -> ../../ca-certificates/extracted/cadir/CA_Cert_Signing_Authority.pem
    lrwxrwxrwx 1 root root 63 Apr 5 08:50 9ab62355.0 -> ../../ca-certificates/extracted/cadir/Swisscom_Root_EV_CA_2.pem
    lrwxrwxrwx 1 root root 64 Apr 5 08:50 9af9f759.0 -> ../../ca-certificates/extracted/cadir/RSA_Root_Certificate_1.pem
    lrwxrwxrwx 1 root root 64 Apr 5 08:50 9c2e7d30.0 -> ../../ca-certificates/extracted/cadir/Sonera_Class_2_Root_CA.pem
    lrwxrwxrwx 1 root root 58 Apr 5 08:50 9c472bf7.0 -> ../../ca-certificates/extracted/cadir/A-Trust-nQual-03.pem
    lrwxrwxrwx 1 root root 65 Apr 5 08:50 9c8dfbd4.0 -> ../../ca-certificates/extracted/cadir/AffirmTrust_Premium_ECC.pem
    lrwxrwxrwx 1 root root 69 Apr 5 08:50 9d04f354.0 -> ../../ca-certificates/extracted/cadir/DigiCert_Assured_ID_Root_G2.pem
    lrwxrwxrwx 1 root root 75 Apr 5 08:50 9d520b32.0 -> ../../ca-certificates/extracted/cadir/Security_Communication_EV_RootCA1.pem
    lrwxrwxrwx 1 root root 75 Apr 5 08:50 9d6523ce.0 -> ../../ca-certificates/extracted/cadir/ePKI_Root_Certification_Authority.pem
    lrwxrwxrwx 1 root root 75 Apr 5 08:50 9dbefe7b.0 -> ../../ca-certificates/extracted/cadir/Security_Communication_EV_RootCA1.pem
    lrwxrwxrwx 1 root root 72 Apr 5 08:50 9f533518.0 -> ../../ca-certificates/extracted/cadir/Global_Chambersign_Root_-_2008.pem
    lrwxrwxrwx 1 root root 76 Apr 5 08:50 a0bc6fbb.0 -> ../../ca-certificates/extracted/cadir/Camerfirma_Global_Chambersign_Root.pem
    lrwxrwxrwx 1 root root 66 Apr 5 08:50 a2c66da8.0 -> ../../ca-certificates/extracted/cadir/DigiCert_Trusted_Root_G4.pem
    lrwxrwxrwx 1 root root 71 Apr 5 08:50 a2df7ad7.0 -> ../../ca-certificates/extracted/cadir/AddTrust_Public_Services_Root.pem
    lrwxrwxrwx 1 root root 72 Apr 5 08:50 a3896b44.0 -> ../../ca-certificates/extracted/cadir/Security_Communication_Root_CA.pem
    lrwxrwxrwx 1 root root 70 Apr 5 08:50 a5fd78f0.0 -> ../../ca-certificates/extracted/cadir/TC_TrustCenter_Class_2_CA_II.pem
    lrwxrwxrwx 1 root root 64 Apr 5 08:50 a7605362.0 -> ../../ca-certificates/extracted/cadir/Sonera_Class_2_Root_CA.pem
    lrwxrwxrwx 1 root root 61 Apr 5 08:50 a760e1bd.0 -> ../../ca-certificates/extracted/cadir/Visa_eCommerce_Root.pem
    lrwxrwxrwx 1 root root 69 Apr 5 08:50 a7d2cf64.0 -> ../../ca-certificates/extracted/cadir/thawte_Primary_Root_CA_-_G2.pem
    lrwxrwxrwx 1 root root 51 Apr 5 08:50 a94d09e5.0 -> ../../ca-certificates/extracted/cadir/ACCVRAIZ1.pem
    lrwxrwxrwx 1 root root 61 Apr 5 08:50 ab5346f4.0 -> ../../ca-certificates/extracted/cadir/SecureSign_RootCA11.pem
    lrwxrwxrwx 1 root root 51 Apr 5 08:50 ACCVRAIZ1.pem -> ../../ca-certificates/extracted/cadir/ACCVRAIZ1.pem
    lrwxrwxrwx 1 root root 55 Apr 5 08:50 ACEDICOM_Root.pem -> ../../ca-certificates/extracted/cadir/ACEDICOM_Root.pem
    lrwxrwxrwx 1 root root 72 Apr 5 08:50 Actalis_Authentication_Root_CA.pem -> ../../ca-certificates/extracted/cadir/Actalis_Authentication_Root_CA.pem
    lrwxrwxrwx 1 root root 63 Apr 5 08:50 ad088e1d.0 -> ../../ca-certificates/extracted/cadir/GeoTrust_Universal_CA.pem
    lrwxrwxrwx 1 root root 71 Apr 5 08:50 add67345.0 -> ../../ca-certificates/extracted/cadir/NetLock_Notary__Class_A__Root.pem
    lrwxrwxrwx 1 root root 64 Apr 5 08:50 AddTrust_External_Root.pem -> ../../ca-certificates/extracted/cadir/AddTrust_External_Root.pem
    lrwxrwxrwx 1 root root 74 Apr 5 08:50 AddTrust_Low-Value_Services_Root.pem -> ../../ca-certificates/extracted/cadir/AddTrust_Low-Value_Services_Root.pem
    lrwxrwxrwx 1 root root 71 Apr 5 08:50 AddTrust_Public_Services_Root.pem -> ../../ca-certificates/extracted/cadir/AddTrust_Public_Services_Root.pem
    lrwxrwxrwx 1 root root 78 Apr 5 08:50 AddTrust_Qualified_Certificates_Root.pem -> ../../ca-certificates/extracted/cadir/AddTrust_Qualified_Certificates_Root.pem
    lrwxrwxrwx 1 root root 74 Apr 5 08:50 ae8153b9.0 -> ../../ca-certificates/extracted/cadir/StartCom_Certification_Authority.pem
    lrwxrwxrwx 1 root root 76 Apr 5 08:50 ae8153b9.1 -> ../../ca-certificates/extracted/cadir/StartCom_Certification_Authority.1.pem
    lrwxrwxrwx 1 root root 48 Apr 5 08:50 aeb67534.0 -> ../../ca-certificates/extracted/cadir/EC-ACC.pem
    lrwxrwxrwx 1 root root 83 Apr 5 08:50 aee5f10d.0 -> ../../ca-certificates/extracted/cadir/Entrust.net_Premium_2048_Secure_Server_CA.pem
    lrwxrwxrwx 1 root root 64 Apr 5 08:50 AffirmTrust_Commercial.pem -> ../../ca-certificates/extracted/cadir/AffirmTrust_Commercial.pem
    lrwxrwxrwx 1 root root 64 Apr 5 08:50 AffirmTrust_Networking.pem -> ../../ca-certificates/extracted/cadir/AffirmTrust_Networking.pem
    lrwxrwxrwx 1 root root 65 Apr 5 08:50 AffirmTrust_Premium_ECC.pem -> ../../ca-certificates/extracted/cadir/AffirmTrust_Premium_ECC.pem
    lrwxrwxrwx 1 root root 61 Apr 5 08:50 AffirmTrust_Premium.pem -> ../../ca-certificates/extracted/cadir/AffirmTrust_Premium.pem
    lrwxrwxrwx 1 root root 87 Apr 5 08:50 America_Online_Root_Certification_Authority_1.pem -> ../../ca-certificates/extracted/cadir/America_Online_Root_Certification_Authority_1.pem
    lrwxrwxrwx 1 root root 87 Apr 5 08:50 America_Online_Root_Certification_Authority_2.pem -> ../../ca-certificates/extracted/cadir/America_Online_Root_Certification_Authority_2.pem
    lrwxrwxrwx 1 root root 77 Apr 5 08:50 ApplicationCA_-_Japanese_Government.pem -> ../../ca-certificates/extracted/cadir/ApplicationCA_-_Japanese_Government.pem
    lrwxrwxrwx 1 root root 63 Apr 5 08:50 Atos_TrustedRoot_2011.pem -> ../../ca-certificates/extracted/cadir/Atos_TrustedRoot_2011.pem
    lrwxrwxrwx 1 root root 58 Apr 5 08:50 A-Trust-nQual-03.pem -> ../../ca-certificates/extracted/cadir/A-Trust-nQual-03.pem
    lrwxrwxrwx 1 root root 99 Apr 5 08:50 Autoridad_de_Certificacion_Firmaprofesional_CIF_A62634068.pem -> ../../ca-certificates/extracted/cadir/Autoridad_de_Certificacion_Firmaprofesional_CIF_A62634068.pem
    lrwxrwxrwx 1 root root 69 Apr 5 08:50 b0e59380.0 -> ../../ca-certificates/extracted/cadir/GlobalSign_ECC_Root_CA_-_R4.pem
    lrwxrwxrwx 1 root root 61 Apr 5 08:50 b0ed035a.0 -> ../../ca-certificates/extracted/cadir/TWCA_Global_Root_CA.pem
    lrwxrwxrwx 1 root root 60 Apr 5 08:50 b0f3e76e.0 -> ../../ca-certificates/extracted/cadir/GlobalSign_Root_CA.pem
    lrwxrwxrwx 1 root root 69 Apr 5 08:50 b1159c4c.0 -> ../../ca-certificates/extracted/cadir/DigiCert_Assured_ID_Root_CA.pem
    lrwxrwxrwx 1 root root 72 Apr 5 08:50 b13cc6df.0 -> ../../ca-certificates/extracted/cadir/UTN_USERFirst_Hardware_Root_CA.pem
    lrwxrwxrwx 1 root root 73 Apr 5 08:50 b1b8a7f3.0 -> ../../ca-certificates/extracted/cadir/OISTE_WISeKey_Global_Root_GA_CA.pem
    lrwxrwxrwx 1 root root 102 Apr 5 08:50 b204d74a.0 -> ../../ca-certificates/extracted/cadir/VeriSign_Class_3_Public_Primary_Certification_Authority_-_G5.pem
    lrwxrwxrwx 1 root root 84 Apr 5 08:50 b3fb433b.0 -> ../../ca-certificates/extracted/cadir/Entrust_Root_Certification_Authority_-_EC1.pem
    lrwxrwxrwx 1 root root 71 Apr 5 08:50 b42ff584.0 -> ../../ca-certificates/extracted/cadir/Staat_der_Nederlanden_Root_CA.pem
    lrwxrwxrwx 1 root root 58 Apr 5 08:50 b66938e9.0 -> ../../ca-certificates/extracted/cadir/Secure_Global_CA.pem
    lrwxrwxrwx 1 root root 50 Apr 5 08:50 b6c5745d.0 -> ../../ca-certificates/extracted/cadir/CA_Disig.pem
    lrwxrwxrwx 1 root root 61 Apr 5 08:50 b727005e.0 -> ../../ca-certificates/extracted/cadir/AffirmTrust_Premium.pem
    lrwxrwxrwx 1 root root 75 Apr 5 08:50 b7a5b843.0 -> ../../ca-certificates/extracted/cadir/TWCA_Root_Certification_Authority.pem
    lrwxrwxrwx 1 root root 75 Apr 5 08:50 b7db1890.0 -> ../../ca-certificates/extracted/cadir/TWCA_Root_Certification_Authority.pem
    lrwxrwxrwx 1 root root 63 Apr 5 08:50 b872f2b4.0 -> ../../ca-certificates/extracted/cadir/Atos_TrustedRoot_2011.pem
    lrwxrwxrwx 1 root root 69 Apr 5 08:50 ba89ed3b.0 -> ../../ca-certificates/extracted/cadir/thawte_Primary_Root_CA_-_G3.pem
    lrwxrwxrwx 1 root root 102 Apr 5 08:50 bad35b78.0 -> ../../ca-certificates/extracted/cadir/Verisign_Class_4_Public_Primary_Certification_Authority_-_G3.pem
    lrwxrwxrwx 1 root root 67 Apr 5 08:50 Baltimore_CyberTrust_Root.pem -> ../../ca-certificates/extracted/cadir/Baltimore_CyberTrust_Root.pem
    lrwxrwxrwx 1 root root 82 Apr 5 08:50 bc3f2570.0 -> ../../ca-certificates/extracted/cadir/Go_Daddy_Root_Certificate_Authority_-_G2.pem
    lrwxrwxrwx 1 root root 61 Apr 5 08:50 bcdd5959.0 -> ../../ca-certificates/extracted/cadir/ValiCert_Class_2_VA.pem
    lrwxrwxrwx 1 root root 52 Apr 5 08:50 bd1910d4.0 -> ../../ca-certificates/extracted/cadir/CNNIC_ROOT.pem
    lrwxrwxrwx 1 root root 87 Apr 5 08:50 bda4cc84.0 -> ../../ca-certificates/extracted/cadir/America_Online_Root_Certification_Authority_1.pem
    lrwxrwxrwx 1 root root 58 Apr 5 08:50 bdacca6f.0 -> ../../ca-certificates/extracted/cadir/Secure_Global_CA.pem
    lrwxrwxrwx 1 root root 78 Apr 5 08:50 bf64f35b.0 -> ../../ca-certificates/extracted/cadir/Entrust_Root_Certification_Authority.pem
    lrwxrwxrwx 1 root root 62 Apr 5 08:50 Buypass_Class_2_CA_1.pem -> ../../ca-certificates/extracted/cadir/Buypass_Class_2_CA_1.pem
    lrwxrwxrwx 1 root root 65 Apr 5 08:50 Buypass_Class_2_Root_CA.pem -> ../../ca-certificates/extracted/cadir/Buypass_Class_2_Root_CA.pem
    lrwxrwxrwx 1 root root 62 Apr 5 08:50 Buypass_Class_3_CA_1.pem -> ../../ca-certificates/extracted/cadir/Buypass_Class_3_CA_1.pem
    lrwxrwxrwx 1 root root 65 Apr 5 08:50 Buypass_Class_3_Root_CA.pem -> ../../ca-certificates/extracted/cadir/Buypass_Class_3_Root_CA.pem
    lrwxrwxrwx 1 root root 89 Apr 5 08:50 c01cdfa2.0 -> ../../ca-certificates/extracted/cadir/VeriSign_Universal_Root_Certification_Authority.pem
    lrwxrwxrwx 1 root root 69 Apr 5 08:50 c089bbbd.0 -> ../../ca-certificates/extracted/cadir/thawte_Primary_Root_CA_-_G2.pem
    lrwxrwxrwx 1 root root 102 Apr 5 08:50 c0ff1f52.0 -> ../../ca-certificates/extracted/cadir/Verisign_Class_3_Public_Primary_Certification_Authority_-_G3.pem
    lrwxrwxrwx 1 root root 72 Apr 5 08:50 c28a8a30.0 -> ../../ca-certificates/extracted/cadir/D-TRUST_Root_Class_3_CA_2_2009.pem
    lrwxrwxrwx 1 root root 66 Apr 5 08:50 c33a80d4.0 -> ../../ca-certificates/extracted/cadir/Thawte_Premium_Server_CA.pem
    lrwxrwxrwx 1 root root 58 Apr 5 08:50 c3a6a9ad.0 -> ../../ca-certificates/extracted/cadir/A-Trust-nQual-03.pem
    lrwxrwxrwx 1 root root 74 Apr 5 08:50 c47d9980.0 -> ../../ca-certificates/extracted/cadir/Chambers_of_Commerce_Root_-_2008.pem
    lrwxrwxrwx 1 root root 69 Apr 5 08:50 c491639e.0 -> ../../ca-certificates/extracted/cadir/DigiCert_Assured_ID_Root_G3.pem
    lrwxrwxrwx 1 root root 61 Apr 5 08:50 c51c224c.0 -> ../../ca-certificates/extracted/cadir/Trustis_FPS_Root_CA.pem
    lrwxrwxrwx 1 root root 102 Apr 5 08:50 c527e4ab.0 -> ../../ca-certificates/extracted/cadir/Verisign_Class_4_Public_Primary_Certification_Authority_-_G3.pem
    lrwxrwxrwx 1 root root 52 Apr 5 08:50 c5d3212a.0 -> ../../ca-certificates/extracted/cadir/PSCProcert.pem
    lrwxrwxrwx 1 root root 68 Apr 5 08:50 c692a373.0 -> ../../ca-certificates/extracted/cadir/GTE_CyberTrust_Global_Root.pem
    lrwxrwxrwx 1 root root 87 Apr 5 08:50 c7e2a638.0 -> ../../ca-certificates/extracted/cadir/GeoTrust_Primary_Certification_Authority_-_G3.pem
    lrwxrwxrwx 1 root root 71 Apr 5 08:50 c8841d13.0 -> ../../ca-certificates/extracted/cadir/TC_TrustCenter_Universal_CA_I.pem
    lrwxrwxrwx 1 root root 65 Apr 5 08:50 c90bc37d.0 -> ../../ca-certificates/extracted/cadir/DigiCert_Global_Root_G2.pem
    lrwxrwxrwx 1 root root 62 Apr 5 08:50 c99398f3.0 -> ../../ca-certificates/extracted/cadir/RSA_Security_2048_v3.pem
    lrwxrwxrwx 1 root root 69 Apr 5 08:50 c9f83a1c.0 -> ../../ca-certificates/extracted/cadir/Comodo_Secure_Services_root.pem
    lrwxrwxrwx 1 root root 75 Apr 5 08:50 ca6e4ad9.0 -> ../../ca-certificates/extracted/cadir/ePKI_Root_Certification_Authority.pem
    lrwxrwxrwx 1 root root 61 Apr 5 08:50 CAcert_Class_3_Root.pem -> ../../ca-certificates/extracted/cadir/CAcert_Class_3_Root.pem
    lrwxrwxrwx 1 root root 49 Apr 3 22:10 ca-certificates.crt -> ../../ca-certificates/extracted/tls-ca-bundle.pem
    lrwxrwxrwx 1 root root 67 Apr 5 08:50 CA_Cert_Signing_Authority.pem -> ../../ca-certificates/extracted/cadir/CA_Cert_Signing_Authority.pem
    lrwxrwxrwx 1 root root 50 Apr 5 08:50 CA_Disig.pem -> ../../ca-certificates/extracted/cadir/CA_Disig.pem
    lrwxrwxrwx 1 root root 58 Apr 5 08:50 CA_Disig_Root_R1.pem -> ../../ca-certificates/extracted/cadir/CA_Disig_Root_R1.pem
    lrwxrwxrwx 1 root root 58 Apr 5 08:50 CA_Disig_Root_R2.pem -> ../../ca-certificates/extracted/cadir/CA_Disig_Root_R2.pem
    lrwxrwxrwx 1 root root 78 Apr 5 08:50 Camerfirma_Chambers_of_Commerce_Root.pem -> ../../ca-certificates/extracted/cadir/Camerfirma_Chambers_of_Commerce_Root.pem
    lrwxrwxrwx 1 root root 76 Apr 5 08:50 Camerfirma_Global_Chambersign_Root.pem -> ../../ca-certificates/extracted/cadir/Camerfirma_Global_Chambersign_Root.pem
    lrwxrwxrwx 1 root root 73 Apr 5 08:50 cb156124.0 -> ../../ca-certificates/extracted/cadir/E-Tugra_Certification_Authority.pem
    lrwxrwxrwx 1 root root 76 Apr 5 08:50 cb59f961.0 -> ../../ca-certificates/extracted/cadir/Camerfirma_Global_Chambersign_Root.pem
    lrwxrwxrwx 1 root root 62 Apr 5 08:50 cbeee9e2.0 -> ../../ca-certificates/extracted/cadir/GeoTrust_Global_CA_2.pem
    lrwxrwxrwx 1 root root 82 Apr 5 08:50 cbf06781.0 -> ../../ca-certificates/extracted/cadir/Go_Daddy_Root_Certificate_Authority_-_G2.pem
    lrwxrwxrwx 1 root root 52 Apr 5 08:50 cc450945.0 -> ../../ca-certificates/extracted/cadir/Izenpe.com.pem
    lrwxrwxrwx 1 root root 65 Apr 5 08:50 ccc52f49.0 -> ../../ca-certificates/extracted/cadir/AffirmTrust_Premium_ECC.pem
    lrwxrwxrwx 1 root root 72 Apr 5 08:50 cd58d51e.0 -> ../../ca-certificates/extracted/cadir/Security_Communication_RootCA2.pem
    lrwxrwxrwx 1 root root 71 Apr 5 08:50 cdaebb72.0 -> ../../ca-certificates/extracted/cadir/Staat_der_Nederlanden_Root_CA.pem
    lrwxrwxrwx 1 root root 50 Apr 5 08:50 Certigna.pem -> ../../ca-certificates/extracted/cadir/Certigna.pem
    lrwxrwxrwx 1 root root 71 Apr 5 08:50 Certinomis_-_Autorit___Racine.pem -> ../../ca-certificates/extracted/cadir/Certinomis_-_Autorit___Racine.pem
    lrwxrwxrwx 1 root root 69 Apr 5 08:50 Certplus_Class_2_Primary_CA.pem -> ../../ca-certificates/extracted/cadir/Certplus_Class_2_Primary_CA.pem
    lrwxrwxrwx 1 root root 58 Apr 5 08:50 certSIGN_ROOT_CA.pem -> ../../ca-certificates/extracted/cadir/certSIGN_ROOT_CA.pem
    lrwxrwxrwx 1 root root 56 Apr 5 08:50 Certum_Root_CA.pem -> ../../ca-certificates/extracted/cadir/Certum_Root_CA.pem
    lrwxrwxrwx 1 root root 67 Apr 5 08:50 Certum_Trusted_Network_CA.pem -> ../../ca-certificates/extracted/cadir/Certum_Trusted_Network_CA.pem
    lrwxrwxrwx 1 root root 56 Apr 5 08:50 cf701eeb.0 -> ../../ca-certificates/extracted/cadir/SecureTrust_CA.pem
    lrwxrwxrwx 1 root root 75 Apr 5 08:50 cf831791.0 -> ../../ca-certificates/extracted/cadir/USERTrust_Legacy_Secure_Server_CA.pem
    lrwxrwxrwx 1 root root 62 Apr 5 08:50 cfa1c2ee.0 -> ../../ca-certificates/extracted/cadir/Buypass_Class_2_CA_1.pem
    lrwxrwxrwx 1 root root 54 Apr 5 08:50 CFCA_EV_ROOT.pem -> ../../ca-certificates/extracted/cadir/CFCA_EV_ROOT.pem
    lrwxrwxrwx 1 root root 74 Apr 5 08:50 Chambers_of_Commerce_Root_-_2008.pem -> ../../ca-certificates/extracted/cadir/Chambers_of_Commerce_Root_-_2008.pem
    lrwxrwxrwx 1 root root 104 Apr 5 08:50 China_Internet_Network_Information_Center_EV_Certificates_Root.pem -> ../../ca-certificates/extracted/cadir/China_Internet_Network_Information_Center_EV_Certificates_Root.pem
    lrwxrwxrwx 1 root root 52 Apr 5 08:50 CNNIC_ROOT.pem -> ../../ca-certificates/extracted/cadir/CNNIC_ROOT.pem
    lrwxrwxrwx 1 root root 66 Apr 5 08:50 Comodo_AAA_Services_root.pem -> ../../ca-certificates/extracted/cadir/Comodo_AAA_Services_root.pem
    lrwxrwxrwx 1 root root 72 Apr 5 08:50 COMODO_Certification_Authority.pem -> ../../ca-certificates/extracted/cadir/COMODO_Certification_Authority.pem
    lrwxrwxrwx 1 root root 76 Apr 5 08:50 COMODO_ECC_Certification_Authority.pem -> ../../ca-certificates/extracted/cadir/COMODO_ECC_Certification_Authority.pem
    lrwxrwxrwx 1 root root 76 Apr 5 08:50 COMODO_RSA_Certification_Authority.pem -> ../../ca-certificates/extracted/cadir/COMODO_RSA_Certification_Authority.pem
    lrwxrwxrwx 1 root root 69 Apr 5 08:50 Comodo_Secure_Services_root.pem -> ../../ca-certificates/extracted/cadir/Comodo_Secure_Services_root.pem
    lrwxrwxrwx 1 root root 70 Apr 5 08:50 Comodo_Trusted_Services_root.pem -> ../../ca-certificates/extracted/cadir/Comodo_Trusted_Services_root.pem
    lrwxrwxrwx 1 root root 60 Apr 5 08:50 ComSign_Secured_CA.pem -> ../../ca-certificates/extracted/cadir/ComSign_Secured_CA.pem
    lrwxrwxrwx 1 root root 64 Apr 5 08:50 Cybertrust_Global_Root.pem -> ../../ca-certificates/extracted/cadir/Cybertrust_Global_Root.pem
    lrwxrwxrwx 1 root root 70 Apr 5 08:50 d06393bb.0 -> ../../ca-certificates/extracted/cadir/T-TeleSec_GlobalRoot_Class_2.pem
    lrwxrwxrwx 1 root root 99 Apr 5 08:50 d16a5865.0 -> ../../ca-certificates/extracted/cadir/Autoridad_de_Certificacion_Firmaprofesional_CIF_A62634068.pem
    lrwxrwxrwx 1 root root 72 Apr 5 08:50 d18e9066.0 -> ../../ca-certificates/extracted/cadir/IdenTrust_Commercial_Root_CA_1.pem
    lrwxrwxrwx 1 root root 76 Apr 5 08:50 d4c339cb.0 -> ../../ca-certificates/extracted/cadir/COMODO_RSA_Certification_Authority.pem
    lrwxrwxrwx 1 root root 75 Apr 5 08:50 d4dae3dd.0 -> ../../ca-certificates/extracted/cadir/D-TRUST_Root_Class_3_CA_2_EV_2009.pem
    lrwxrwxrwx 1 root root 72 Apr 5 08:50 d59297b8.0 -> ../../ca-certificates/extracted/cadir/Security_Communication_RootCA2.pem
    lrwxrwxrwx 1 root root 76 Apr 5 08:50 d6325660.0 -> ../../ca-certificates/extracted/cadir/COMODO_RSA_Certification_Authority.pem
    lrwxrwxrwx 1 root root 50 Apr 5 08:50 d64f06f3.0 -> ../../ca-certificates/extracted/cadir/CA_Disig.pem
    lrwxrwxrwx 1 root root 91 Apr 5 08:50 d66b55d9.0 -> ../../ca-certificates/extracted/cadir/TURKTRUST_Certificate_Services_Provider_Root_2007.pem
    lrwxrwxrwx 1 root root 75 Apr 5 08:50 d7746a63.0 -> ../../ca-certificates/extracted/cadir/D-TRUST_Root_Class_3_CA_2_EV_2009.pem
    lrwxrwxrwx 1 root root 60 Apr 5 08:50 d7e8dc79.0 -> ../../ca-certificates/extracted/cadir/QuoVadis_Root_CA_2.pem
    lrwxrwxrwx 1 root root 76 Apr 5 08:50 d8274e24.0 -> ../../ca-certificates/extracted/cadir/UTN-USERFirst-Network_Applications.pem
    lrwxrwxrwx 1 root root 61 Apr 5 08:50 d853d49e.0 -> ../../ca-certificates/extracted/cadir/Trustis_FPS_Root_CA.pem
    lrwxrwxrwx 1 root root 71 Apr 5 08:50 d957f522.0 -> ../../ca-certificates/extracted/cadir/Certinomis_-_Autorit___Racine.pem
    lrwxrwxrwx 1 root root 71 Apr 5 08:50 d9d12c58.0 -> ../../ca-certificates/extracted/cadir/NetLock_Notary__Class_A__Root.pem
    lrwxrwxrwx 1 root root 61 Apr 5 08:50 dbc54cab.0 -> ../../ca-certificates/extracted/cadir/AffirmTrust_Premium.pem
    lrwxrwxrwx 1 root root 65 Apr 5 08:50 dd8e9d41.0 -> ../../ca-certificates/extracted/cadir/DigiCert_Global_Root_G3.pem
    lrwxrwxrwx 1 root root 58 Apr 5 08:50 ddc328ff.0 -> ../../ca-certificates/extracted/cadir/Thawte_Server_CA.pem
    lrwxrwxrwx 1 root root 68 Apr 5 08:50 Deutsche_Telekom_Root_CA_2.pem -> ../../ca-certificates/extracted/cadir/Deutsche_Telekom_Root_CA_2.pem
    lrwxrwxrwx 1 root root 69 Apr 5 08:50 DigiCert_Assured_ID_Root_CA.pem -> ../../ca-certificates/extracted/cadir/DigiCert_Assured_ID_Root_CA.pem
    lrwxrwxrwx 1 root root 69 Apr 5 08:50 DigiCert_Assured_ID_Root_G2.pem -> ../../ca-certificates/extracted/cadir/DigiCert_Assured_ID_Root_G2.pem
    lrwxrwxrwx 1 root root 69 Apr 5 08:50 DigiCert_Assured_ID_Root_G3.pem -> ../../ca-certificates/extracted/cadir/DigiCert_Assured_ID_Root_G3.pem
    lrwxrwxrwx 1 root root 65 Apr 5 08:50 DigiCert_Global_Root_CA.pem -> ../../ca-certificates/extracted/cadir/DigiCert_Global_Root_CA.pem
    lrwxrwxrwx 1 root root 65 Apr 5 08:50 DigiCert_Global_Root_G2.pem -> ../../ca-certificates/extracted/cadir/DigiCert_Global_Root_G2.pem
    lrwxrwxrwx 1 root root 65 Apr 5 08:50 DigiCert_Global_Root_G3.pem -> ../../ca-certificates/extracted/cadir/DigiCert_Global_Root_G3.pem
    lrwxrwxrwx 1 root root 76 Apr 5 08:50 DigiCert_High_Assurance_EV_Root_CA.pem -> ../../ca-certificates/extracted/cadir/DigiCert_High_Assurance_EV_Root_CA.pem
    lrwxrwxrwx 1 root root 66 Apr 5 08:50 DigiCert_Trusted_Root_G4.pem -> ../../ca-certificates/extracted/cadir/DigiCert_Trusted_Root_G4.pem
    lrwxrwxrwx 1 root root 56 Apr 5 08:50 DST_ACES_CA_X6.pem -> ../../ca-certificates/extracted/cadir/DST_ACES_CA_X6.pem
    lrwxrwxrwx 1 root root 56 Apr 5 08:50 DST_Root_CA_X3.pem -> ../../ca-certificates/extracted/cadir/DST_Root_CA_X3.pem
    lrwxrwxrwx 1 root root 72 Apr 5 08:50 D-TRUST_Root_Class_3_CA_2_2009.pem -> ../../ca-certificates/extracted/cadir/D-TRUST_Root_Class_3_CA_2_2009.pem
    lrwxrwxrwx 1 root root 75 Apr 5 08:50 D-TRUST_Root_Class_3_CA_2_EV_2009.pem -> ../../ca-certificates/extracted/cadir/D-TRUST_Root_Class_3_CA_2_EV_2009.pem
    lrwxrwxrwx 1 root root 50 Apr 5 08:50 e113c810.0 -> ../../ca-certificates/extracted/cadir/Certigna.pem
    lrwxrwxrwx 1 root root 63 Apr 5 08:50 e18bfb83.0 -> ../../ca-certificates/extracted/cadir/QuoVadis_Root_CA_3_G3.pem
    lrwxrwxrwx 1 root root 74 Apr 5 08:50 e268a4c5.0 -> ../../ca-certificates/extracted/cadir/AddTrust_Low-Value_Services_Root.pem
    lrwxrwxrwx 1 root root 87 Apr 5 08:50 e2799e36.0 -> ../../ca-certificates/extracted/cadir/GeoTrust_Primary_Certification_Authority_-_G3.pem
    lrwxrwxrwx 1 root root 63 Apr 5 08:50 e36a6752.0 -> ../../ca-certificates/extracted/cadir/Atos_TrustedRoot_2011.pem
    lrwxrwxrwx 1 root root 63 Apr 5 08:50 e442e424.0 -> ../../ca-certificates/extracted/cadir/QuoVadis_Root_CA_3_G3.pem
    lrwxrwxrwx 1 root root 64 Apr 5 08:50 e48193cf.0 -> ../../ca-certificates/extracted/cadir/AffirmTrust_Commercial.pem
    lrwxrwxrwx 1 root root 78 Apr 5 08:50 e536d871.0 -> ../../ca-certificates/extracted/cadir/AddTrust_Qualified_Certificates_Root.pem
    lrwxrwxrwx 1 root root 61 Apr 5 08:50 e5662767.0 -> ../../ca-certificates/extracted/cadir/CAcert_Class_3_Root.pem
    lrwxrwxrwx 1 root root 60 Apr 5 08:50 e60bf0c0.0 -> ../../ca-certificates/extracted/cadir/Swisscom_Root_CA_1.pem
    lrwxrwxrwx 1 root root 63 Apr 5 08:50 e775ed2d.0 -> ../../ca-certificates/extracted/cadir/GeoTrust_Universal_CA.pem
    lrwxrwxrwx 1 root root 71 Apr 5 08:50 e7b8d656.0 -> ../../ca-certificates/extracted/cadir/Equifax_Secure_eBusiness_CA_1.pem
    lrwxrwxrwx 1 root root 72 Apr 5 08:50 e8651083.0 -> ../../ca-certificates/extracted/cadir/Microsec_e-Szigno_Root_CA_2009.pem
    lrwxrwxrwx 1 root root 65 Apr 5 08:50 e8de2f56.0 -> ../../ca-certificates/extracted/cadir/Buypass_Class_3_Root_CA.pem
    lrwxrwxrwx 1 root root 55 Apr 5 08:50 ea169617.0 -> ../../ca-certificates/extracted/cadir/ACEDICOM_Root.pem
    lrwxrwxrwx 1 root root 87 Apr 5 08:50 eacdeb40.0 -> ../../ca-certificates/extracted/cadir/America_Online_Root_Certification_Authority_1.pem
    lrwxrwxrwx 1 root root 62 Apr 5 08:50 eb375c3e.0 -> ../../ca-certificates/extracted/cadir/Buypass_Class_3_CA_1.pem
    lrwxrwxrwx 1 root root 80 Apr 5 08:50 eb99629b.0 -> ../../ca-certificates/extracted/cadir/VeriSign_Class_3_Secure_Server_CA_-_G2.pem
    lrwxrwxrwx 1 root root 116 Apr 5 08:50 EBG_Elektronik_Sertifika_Hizmet_Sa_xC4_x9Flay_xc4_xb1_x63_xc4_xb1s_xc4_xb1.pem -> ../../ca-certificates/extracted/cadir/EBG_Elektronik_Sertifika_Hizmet_Sa_xC4_x9Flay_xc4_xb1_x63_xc4_xb1s_xc4_xb1.pem
    lrwxrwxrwx 1 root root 48 Apr 5 08:50 EC-ACC.pem -> ../../ca-certificates/extracted/cadir/EC-ACC.pem
    lrwxrwxrwx 1 root root 65 Apr 5 08:50 ed39abd0.0 -> ../../ca-certificates/extracted/cadir/DigiCert_Global_Root_G3.pem
    lrwxrwxrwx 1 root root 70 Apr 5 08:50 ed524cf5.0 -> ../../ca-certificates/extracted/cadir/Entrust.net_Secure_Server_CA.pem
    lrwxrwxrwx 1 root root 66 Apr 5 08:50 ee64a828.0 -> ../../ca-certificates/extracted/cadir/Comodo_AAA_Services_root.pem
    lrwxrwxrwx 1 root root 78 Apr 5 08:50 ee7cd6fb.0 -> ../../ca-certificates/extracted/cadir/Camerfirma_Chambers_of_Commerce_Root.pem
    lrwxrwxrwx 1 root root 77 Apr 5 08:50 ee90b008.0 -> ../../ca-certificates/extracted/cadir/StartCom_Certification_Authority_G2.pem
    lrwxrwxrwx 1 root root 73 Apr 5 08:50 EE_Certification_Centre_Root_CA.pem -> ../../ca-certificates/extracted/cadir/EE_Certification_Centre_Root_CA.pem
    lrwxrwxrwx 1 root root 76 Apr 5 08:50 eed8c118.0 -> ../../ca-certificates/extracted/cadir/COMODO_ECC_Certification_Authority.pem
    lrwxrwxrwx 1 root root 72 Apr 5 08:50 ef954a4e.0 -> ../../ca-certificates/extracted/cadir/IdenTrust_Commercial_Root_CA_1.pem
    lrwxrwxrwx 1 root root 93 Apr 5 08:50 E-Guven_Kok_Elektronik_Sertifika_Hizmet_Saglayicisi.pem -> ../../ca-certificates/extracted/cadir/E-Guven_Kok_Elektronik_Sertifika_Hizmet_Saglayicisi.pem
    lrwxrwxrwx 1 root root 83 Apr 5 08:50 Entrust.net_Premium_2048_Secure_Server_CA.pem -> ../../ca-certificates/extracted/cadir/Entrust.net_Premium_2048_Secure_Server_CA.pem
    lrwxrwxrwx 1 root root 70 Apr 5 08:50 Entrust.net_Secure_Server_CA.pem -> ../../ca-certificates/extracted/cadir/Entrust.net_Secure_Server_CA.pem
    lrwxrwxrwx 1 root root 84 Apr 5 08:50 Entrust_Root_Certification_Authority_-_EC1.pem -> ../../ca-certificates/extracted/cadir/Entrust_Root_Certification_Authority_-_EC1.pem
    lrwxrwxrwx 1 root root 83 Apr 5 08:50 Entrust_Root_Certification_Authority_-_G2.pem -> ../../ca-certificates/extracted/cadir/Entrust_Root_Certification_Authority_-_G2.pem
    lrwxrwxrwx 1 root root 78 Apr 5 08:50 Entrust_Root_Certification_Authority.pem -> ../../ca-certificates/extracted/cadir/Entrust_Root_Certification_Authority.pem
    lrwxrwxrwx 1 root root 75 Apr 5 08:50 ePKI_Root_Certification_Authority.pem -> ../../ca-certificates/extracted/cadir/ePKI_Root_Certification_Authority.pem
    lrwxrwxrwx 1 root root 71 Apr 5 08:50 Equifax_Secure_eBusiness_CA_1.pem -> ../../ca-certificates/extracted/cadir/Equifax_Secure_eBusiness_CA_1.pem
    lrwxrwxrwx 1 root root 73 Apr 5 08:50 E-Tugra_Certification_Authority.pem -> ../../ca-certificates/extracted/cadir/E-Tugra_Certification_Authority.pem
    lrwxrwxrwx 1 root root 69 Apr 5 08:50 f060240e.0 -> ../../ca-certificates/extracted/cadir/Certplus_Class_2_Primary_CA.pem
    lrwxrwxrwx 1 root root 61 Apr 5 08:50 f081611a.0 -> ../../ca-certificates/extracted/cadir/Go_Daddy_Class_2_CA.pem
    lrwxrwxrwx 1 root root 79 Apr 5 08:50 f30dd6ad.0 -> ../../ca-certificates/extracted/cadir/USERTrust_ECC_Certification_Authority.pem
    lrwxrwxrwx 1 root root 72 Apr 5 08:50 f3377b1b.0 -> ../../ca-certificates/extracted/cadir/Security_Communication_Root_CA.pem
    lrwxrwxrwx 1 root root 62 Apr 5 08:50 f387163d.0 -> ../../ca-certificates/extracted/cadir/Starfield_Class_2_CA.pem
    lrwxrwxrwx 1 root root 56 Apr 5 08:50 f39fc864.0 -> ../../ca-certificates/extracted/cadir/SecureTrust_CA.pem
    lrwxrwxrwx 1 root root 61 Apr 5 08:50 f4996e82.0 -> ../../ca-certificates/extracted/cadir/ValiCert_Class_1_VA.pem
    lrwxrwxrwx 1 root root 60 Apr 5 08:50 f58a60fe.0 -> ../../ca-certificates/extracted/cadir/ComSign_Secured_CA.pem
    lrwxrwxrwx 1 root root 67 Apr 5 08:50 f61bff45.0 -> ../../ca-certificates/extracted/cadir/Microsec_e-Szigno_Root_CA.pem
    lrwxrwxrwx 1 root root 116 Apr 5 08:50 f80cc7f6.0 -> ../../ca-certificates/extracted/cadir/EBG_Elektronik_Sertifika_Hizmet_Sa_xC4_x9Flay_xc4_xb1_x63_xc4_xb1s_xc4_xb1.pem
    lrwxrwxrwx 1 root root 78 Apr 5 08:50 f90208f7.0 -> ../../ca-certificates/extracted/cadir/Camerfirma_Chambers_of_Commerce_Root.pem
    lrwxrwxrwx 1 root root 77 Apr 5 08:50 fac084d7.0 -> ../../ca-certificates/extracted/cadir/ApplicationCA_-_Japanese_Government.pem
    lrwxrwxrwx 1 root root 102 Apr 5 08:50 facacbc6.0 -> ../../ca-certificates/extracted/cadir/VeriSign_Class_3_Public_Primary_Certification_Authority_-_G5.pem
    lrwxrwxrwx 1 root root 72 Apr 5 08:50 fb126c6d.0 -> ../../ca-certificates/extracted/cadir/Root_CA_Generalitat_Valenciana.pem
    lrwxrwxrwx 1 root root 79 Apr 5 08:50 fc5a8f99.0 -> ../../ca-certificates/extracted/cadir/USERTrust_RSA_Certification_Authority.pem
    lrwxrwxrwx 1 root root 49 Apr 5 08:50 fcac10e3.0 -> ../../ca-certificates/extracted/cadir/Juur-SK.pem
    lrwxrwxrwx 1 root root 50 Apr 5 08:50 fde84897.0 -> ../../ca-certificates/extracted/cadir/Certigna.pem
    lrwxrwxrwx 1 root root 72 Apr 5 08:50 ff783690.0 -> ../../ca-certificates/extracted/cadir/UTN_USERFirst_Hardware_Root_CA.pem
    lrwxrwxrwx 1 root root 62 Apr 5 08:50 GeoTrust_Global_CA_2.pem -> ../../ca-certificates/extracted/cadir/GeoTrust_Global_CA_2.pem
    lrwxrwxrwx 1 root root 60 Apr 5 08:50 GeoTrust_Global_CA.pem -> ../../ca-certificates/extracted/cadir/GeoTrust_Global_CA.pem
    lrwxrwxrwx 1 root root 87 Apr 5 08:50 GeoTrust_Primary_Certification_Authority_-_G2.pem -> ../../ca-certificates/extracted/cadir/GeoTrust_Primary_Certification_Authority_-_G2.pem
    lrwxrwxrwx 1 root root 87 Apr 5 08:50 GeoTrust_Primary_Certification_Authority_-_G3.pem -> ../../ca-certificates/extracted/cadir/GeoTrust_Primary_Certification_Authority_-_G3.pem
    lrwxrwxrwx 1 root root 82 Apr 5 08:50 GeoTrust_Primary_Certification_Authority.pem -> ../../ca-certificates/extracted/cadir/GeoTrust_Primary_Certification_Authority.pem
    lrwxrwxrwx 1 root root 65 Apr 5 08:50 GeoTrust_Universal_CA_2.pem -> ../../ca-certificates/extracted/cadir/GeoTrust_Universal_CA_2.pem
    lrwxrwxrwx 1 root root 63 Apr 5 08:50 GeoTrust_Universal_CA.pem -> ../../ca-certificates/extracted/cadir/GeoTrust_Universal_CA.pem
    lrwxrwxrwx 1 root root 72 Apr 5 08:50 Global_Chambersign_Root_-_2008.pem -> ../../ca-certificates/extracted/cadir/Global_Chambersign_Root_-_2008.pem
    lrwxrwxrwx 1 root root 69 Apr 5 08:50 GlobalSign_ECC_Root_CA_-_R4.pem -> ../../ca-certificates/extracted/cadir/GlobalSign_ECC_Root_CA_-_R4.pem
    lrwxrwxrwx 1 root root 69 Apr 5 08:50 GlobalSign_ECC_Root_CA_-_R5.pem -> ../../ca-certificates/extracted/cadir/GlobalSign_ECC_Root_CA_-_R5.pem
    lrwxrwxrwx 1 root root 60 Apr 5 08:50 GlobalSign_Root_CA.pem -> ../../ca-certificates/extracted/cadir/GlobalSign_Root_CA.pem
    lrwxrwxrwx 1 root root 65 Apr 5 08:50 GlobalSign_Root_CA_-_R2.pem -> ../../ca-certificates/extracted/cadir/GlobalSign_Root_CA_-_R2.pem
    lrwxrwxrwx 1 root root 65 Apr 5 08:50 GlobalSign_Root_CA_-_R3.pem -> ../../ca-certificates/extracted/cadir/GlobalSign_Root_CA_-_R3.pem
    lrwxrwxrwx 1 root root 61 Apr 5 08:50 Go_Daddy_Class_2_CA.pem -> ../../ca-certificates/extracted/cadir/Go_Daddy_Class_2_CA.pem
    lrwxrwxrwx 1 root root 82 Apr 5 08:50 Go_Daddy_Root_Certificate_Authority_-_G2.pem -> ../../ca-certificates/extracted/cadir/Go_Daddy_Root_Certificate_Authority_-_G2.pem
    lrwxrwxrwx 1 root root 68 Apr 5 08:50 GTE_CyberTrust_Global_Root.pem -> ../../ca-certificates/extracted/cadir/GTE_CyberTrust_Global_Root.pem
    lrwxrwxrwx 1 root root 97 Apr 5 08:50 Hellenic_Academic_and_Research_Institutions_RootCA_2011.pem -> ../../ca-certificates/extracted/cadir/Hellenic_Academic_and_Research_Institutions_RootCA_2011.pem
    lrwxrwxrwx 1 root root 65 Apr 5 08:50 Hongkong_Post_Root_CA_1.pem -> ../../ca-certificates/extracted/cadir/Hongkong_Post_Root_CA_1.pem
    lrwxrwxrwx 1 root root 72 Apr 5 08:50 IdenTrust_Commercial_Root_CA_1.pem -> ../../ca-certificates/extracted/cadir/IdenTrust_Commercial_Root_CA_1.pem
    lrwxrwxrwx 1 root root 75 Apr 5 08:50 IdenTrust_Public_Sector_Root_CA_1.pem -> ../../ca-certificates/extracted/cadir/IdenTrust_Public_Sector_Root_CA_1.pem
    lrwxrwxrwx 1 root root 47 Apr 5 08:50 IGC_A.pem -> ../../ca-certificates/extracted/cadir/IGC_A.pem
    lrwxrwxrwx 1 root root 52 Apr 5 08:50 Izenpe.com.pem -> ../../ca-certificates/extracted/cadir/Izenpe.com.pem
    drwxr-xr-x 2 root root 4096 Apr 5 08:50 java
    lrwxrwxrwx 1 root root 49 Apr 5 08:50 Juur-SK.pem -> ../../ca-certificates/extracted/cadir/Juur-SK.pem
    lrwxrwxrwx 1 root root 72 Apr 5 08:50 Microsec_e-Szigno_Root_CA_2009.pem -> ../../ca-certificates/extracted/cadir/Microsec_e-Szigno_Root_CA_2009.pem
    lrwxrwxrwx 1 root root 67 Apr 5 08:50 Microsec_e-Szigno_Root_CA.pem -> ../../ca-certificates/extracted/cadir/Microsec_e-Szigno_Root_CA.pem
    lrwxrwxrwx 1 root root 86 Apr 5 08:50 NetLock_Arany__Class_Gold__F__tan__s__tv__ny.pem -> ../../ca-certificates/extracted/cadir/NetLock_Arany__Class_Gold__F__tan__s__tv__ny.pem
    lrwxrwxrwx 1 root root 71 Apr 5 08:50 NetLock_Notary__Class_A__Root.pem -> ../../ca-certificates/extracted/cadir/NetLock_Notary__Class_A__Root.pem
    lrwxrwxrwx 1 root root 81 Apr 5 08:50 Network_Solutions_Certificate_Authority.pem -> ../../ca-certificates/extracted/cadir/Network_Solutions_Certificate_Authority.pem
    lrwxrwxrwx 1 root root 73 Apr 5 08:50 OISTE_WISeKey_Global_Root_GA_CA.pem -> ../../ca-certificates/extracted/cadir/OISTE_WISeKey_Global_Root_GA_CA.pem
    lrwxrwxrwx 1 root root 52 Apr 5 08:50 PSCProcert.pem -> ../../ca-certificates/extracted/cadir/PSCProcert.pem
    lrwxrwxrwx 1 root root 63 Apr 5 08:50 QuoVadis_Root_CA_1_G3.pem -> ../../ca-certificates/extracted/cadir/QuoVadis_Root_CA_1_G3.pem
    lrwxrwxrwx 1 root root 63 Apr 5 08:50 QuoVadis_Root_CA_2_G3.pem -> ../../ca-certificates/extracted/cadir/QuoVadis_Root_CA_2_G3.pem
    lrwxrwxrwx 1 root root 60 Apr 5 08:50 QuoVadis_Root_CA_2.pem -> ../../ca-certificates/extracted/cadir/QuoVadis_Root_CA_2.pem
    lrwxrwxrwx 1 root root 63 Apr 5 08:50 QuoVadis_Root_CA_3_G3.pem -> ../../ca-certificates/extracted/cadir/QuoVadis_Root_CA_3_G3.pem
    lrwxrwxrwx 1 root root 60 Apr 5 08:50 QuoVadis_Root_CA_3.pem -> ../../ca-certificates/extracted/cadir/QuoVadis_Root_CA_3.pem
    lrwxrwxrwx 1 root root 58 Apr 5 08:50 QuoVadis_Root_CA.pem -> ../../ca-certificates/extracted/cadir/QuoVadis_Root_CA.pem
    lrwxrwxrwx 1 root root 72 Apr 5 08:50 Root_CA_Generalitat_Valenciana.pem -> ../../ca-certificates/extracted/cadir/Root_CA_Generalitat_Valenciana.pem
    lrwxrwxrwx 1 root root 64 Apr 5 08:50 RSA_Root_Certificate_1.pem -> ../../ca-certificates/extracted/cadir/RSA_Root_Certificate_1.pem
    lrwxrwxrwx 1 root root 62 Apr 5 08:50 RSA_Security_2048_v3.pem -> ../../ca-certificates/extracted/cadir/RSA_Security_2048_v3.pem
    lrwxrwxrwx 1 root root 58 Apr 5 08:50 Secure_Global_CA.pem -> ../../ca-certificates/extracted/cadir/Secure_Global_CA.pem
    lrwxrwxrwx 1 root root 61 Apr 5 08:50 SecureSign_RootCA11.pem -> ../../ca-certificates/extracted/cadir/SecureSign_RootCA11.pem
    lrwxrwxrwx 1 root root 56 Apr 5 08:50 SecureTrust_CA.pem -> ../../ca-certificates/extracted/cadir/SecureTrust_CA.pem
    lrwxrwxrwx 1 root root 75 Apr 5 08:50 Security_Communication_EV_RootCA1.pem -> ../../ca-certificates/extracted/cadir/Security_Communication_EV_RootCA1.pem
    lrwxrwxrwx 1 root root 72 Apr 5 08:50 Security_Communication_RootCA2.pem -> ../../ca-certificates/extracted/cadir/Security_Communication_RootCA2.pem
    lrwxrwxrwx 1 root root 72 Apr 5 08:50 Security_Communication_Root_CA.pem -> ../../ca-certificates/extracted/cadir/Security_Communication_Root_CA.pem
    lrwxrwxrwx 1 root root 64 Apr 5 08:50 Sonera_Class_2_Root_CA.pem -> ../../ca-certificates/extracted/cadir/Sonera_Class_2_Root_CA.pem
    lrwxrwxrwx 1 root root 74 Apr 5 08:50 Staat_der_Nederlanden_EV_Root_CA.pem -> ../../ca-certificates/extracted/cadir/Staat_der_Nederlanden_EV_Root_CA.pem
    lrwxrwxrwx 1 root root 76 Apr 5 08:50 Staat_der_Nederlanden_Root_CA_-_G2.pem -> ../../ca-certificates/extracted/cadir/Staat_der_Nederlanden_Root_CA_-_G2.pem
    lrwxrwxrwx 1 root root 76 Apr 5 08:50 Staat_der_Nederlanden_Root_CA_-_G3.pem -> ../../ca-certificates/extracted/cadir/Staat_der_Nederlanden_Root_CA_-_G3.pem
    lrwxrwxrwx 1 root root 71 Apr 5 08:50 Staat_der_Nederlanden_Root_CA.pem -> ../../ca-certificates/extracted/cadir/Staat_der_Nederlanden_Root_CA.pem
    lrwxrwxrwx 1 root root 62 Apr 5 08:50 Starfield_Class_2_CA.pem -> ../../ca-certificates/extracted/cadir/Starfield_Class_2_CA.pem
    lrwxrwxrwx 1 root root 83 Apr 5 08:50 Starfield_Root_Certificate_Authority_-_G2.pem -> ../../ca-certificates/extracted/cadir/Starfield_Root_Certificate_Authority_-_G2.pem
    lrwxrwxrwx 1 root root 92 Apr 5 08:50 Starfield_Services_Root_Certificate_Authority_-_G2.pem -> ../../ca-certificates/extracted/cadir/Starfield_Services_Root_Certificate_Authority_-_G2.pem
    lrwxrwxrwx 1 root root 76 Apr 5 08:50 StartCom_Certification_Authority.1.pem -> ../../ca-certificates/extracted/cadir/StartCom_Certification_Authority.1.pem
    lrwxrwxrwx 1 root root 77 Apr 5 08:50 StartCom_Certification_Authority_G2.pem -> ../../ca-certificates/extracted/cadir/StartCom_Certification_Authority_G2.pem
    lrwxrwxrwx 1 root root 74 Apr 5 08:50 StartCom_Certification_Authority.pem -> ../../ca-certificates/extracted/cadir/StartCom_Certification_Authority.pem
    lrwxrwxrwx 1 root root 60 Apr 5 08:50 Swisscom_Root_CA_1.pem -> ../../ca-certificates/extracted/cadir/Swisscom_Root_CA_1.pem
    lrwxrwxrwx 1 root root 60 Apr 5 08:50 Swisscom_Root_CA_2.pem -> ../../ca-certificates/extracted/cadir/Swisscom_Root_CA_2.pem
    lrwxrwxrwx 1 root root 63 Apr 5 08:50 Swisscom_Root_EV_CA_2.pem -> ../../ca-certificates/extracted/cadir/Swisscom_Root_EV_CA_2.pem
    lrwxrwxrwx 1 root root 64 Apr 5 08:50 SwissSign_Gold_CA_-_G2.pem -> ../../ca-certificates/extracted/cadir/SwissSign_Gold_CA_-_G2.pem
    lrwxrwxrwx 1 root root 66 Apr 5 08:50 SwissSign_Silver_CA_-_G2.pem -> ../../ca-certificates/extracted/cadir/SwissSign_Silver_CA_-_G2.pem
    lrwxrwxrwx 1 root root 53 Apr 5 08:50

Maybe you are looking for

  • How do i change my icloud email to match my new apple id?

    I recently changed my apple id to update to a new email and it never updated my email for icloud so now I can not log into icloud without it telling me it is wrong. where is there an option to go in and change my icloud email to match my new apple id

  • Is Web service security available?

    Dear Experts,     In RWB, when i click on Integration Engine(in component monitoring) i get a yellow triangle next to it instead of green. Result of self test says that Is Web service security available? "Communication error Proxy calls are not permi

  • Infotype not permitted

    Dear Friends: Using Tcode Pa30, I have entered infotype 0048 and clicked on create. I am getting this error                                                                              Information type 'Residence Status (0048)' not permitted         

  • A good epub & ebook maker for Mac?

    I've spent the last 10 days looking for a good, effective, convenient epub maker for the Mac. I gotta say it's scam country out there in this regard. The only workable ones I've found are InDesign, of course, Jutoh, eCub, Wondershare. And none of the

  • Error Opening Database

    Hi I have just repaired my Aperture 3.1 Database hoping that it would help with some difficulties I have with the software. Now it is completed when I try to open Aperture I get the message "There was an error opening the database for the library "/V