Displaying 5 results from an estimated 5 matches for "positivessl".
2019 Oct 11
0
Error: SSL_accept() syscall failed
...Jersey, L = Jersey City, O = The USERTRUST
Network, CN = USERTrust RSA Certification Authority
verify return:1
depth=1 C = GB, ST = Greater Manchester, L = Salford, O = Sectigo
Limited, CN = Sectigo RSA Domain Validation Secure Server CA
verify return:1
depth=0 OU = Domain Control Validated, OU = PositiveSSL, CN = kumo.kites.org
verify return:1
---
Certificate chain
0 s:/OU=Domain Control Validated/OU=PositiveSSL/CN=kumo.kites.org
i:/C=GB/ST=Greater Manchester/L=Salford/O=Sectigo Limited/CN=Sectigo
RSA Domain Validation Secure Server CA
1 s:/C=GB/ST=Greater Manchester/L=Salford/O=Sectigo Limit...
2011 Jan 06
0
No subject
...ective ? Or is there a bug ?
>> Can you reproduce such behaviour ?
>>
>
> I'm not sure what is going on. Can you try running 'upsmon' with debugging
> enabled? The following are the results of my tests here. In all cases, the
> upsd server is running with a valid PositiveSSL certificate (so the root CA
> that signed this certificate is trusted without further configuration):
> (...)
>
we've had some findings with Emilien in the meantime.
He's currently checking for a clean fix, so I'll let him describe the issue
and the possible fix.
cheers,
Arna...
2019 Oct 11
3
Error: SSL_accept() syscall failed
In setting up my new mail server, I am getting the following in the logs:
Oct 11 07:10:59 kumo dovecot[5704]: imap-login: Disconnected (no auth
attempts in 0 secs): user=<>, rip=24.53.79.10, lip=172.26.12.90, *TLS
handshaking: SSL_accept() syscall failed: Success*,
session=<B9OokqCUD+UYNU8K>
I have tried various ssl_protocols entries, but for now have defaulted
back to
2011 Jan 13
1
SSL certificate verification with OpenSSL in NUT trunk
Hi all,
After client's certificate verifications discussion in the mailing-list,
I have done some tests with nut trunk and - if my config is not too bad
- I think ther is a bug with server certificate verification.
With a clean trunk checkout, compile and installation; and with the
following config :
upsmon.conf:
CERTPATH /usr/local/ups/etc/cert/
CERTVERIFY 1
FORCESSL 1
Upsd.conf:
CERTFILE
2011 May 08
3
Unable to REGISTER to the Asterisk v1.8.3.3 server via SIP/TLS
...b67ed2111345253c228264d093
Signature Algorithm: 1.2.840.113549.1.1.5 (sha1WithRSAEncryption)
Signature: 28ce574c9715e1e59dfc90829287ab31fdbf0e0212dc488b106e71ffaaa339610492dc091d440772...
Issuer: Country: GB; State: Greater Manchester; Locality Salford;
Organization: Comodo CA Limited; Common Name: PositiveSSL CA; eMail:
Validity: 27/04/11 - 26/04/12
SHA1-Fingerprint: 38d13c709ab1cc9b434c2f05e927239fe4ae6f19
MD5-Fingerprint: a9b62e186465055f34a04153ad7898de
PK Algorithm: 1.2.840.113549.1.1.1 (rsaEncryption)
RSA modulus: 00b90412744fd50459d807a04d007a9fd7d667189f1394f11ecd46e8556bd861526eb9be582a2631...
R...