search for: ssl_howto

Displaying 5 results from an estimated 5 matches for "ssl_howto".

2007 Jul 22
2
httpd failed with a new install of 5.0
Everyone, I have been working on a new installation of CentOS 5.0 on a x86_64 machine. The installation has gone well except for httpd. When I start httpd with LogLevel turned to debug all I get is an immediate failure with the following errors the logs: /var/log/httpd/error_log: [Sun Jul 22 13:00:31 2007] [notice] suEXEC mechanism enabled (wrapper: /usr/sbin/suexec) /var/log/ssl_error.log:
2008 Feb 20
4
OpenSSH and X.509 Certificate Support
Hi, I need to add X.509 Certificate support to OpenSSH. I came across the following post on the openssh-unix-dev mailing list that is very useful: http://marc.info/?l=openssh-unix-dev&m=120298135706959&w=2 <http://marc.info/?l=openssh-unix-dev&m=120298135706959&w=2> And also, http://marc.info/?l=openssh-unix-dev&m=104395024824680&w=2
2019 Oct 11
0
easy way to stop old ssl's
...nf files in its configuration directory, so you might be able to just add another file to the existing config set. If not, then replace the existing config file instead. If you?re asking for a pre-crafted config, there are bunches of them floating around: https://httpd.apache.org/docs/2.4/ssl/ssl_howto.html https://www.sslshopper.com/article-how-to-disable-weak-ciphers-and-ssl-2.0-in-apache.html https://raymii.org/s/tutorials/Strong_SSL_Security_On_Apache2.html etc. I?m also surprised by the premise implied by the question, which is that a stable OS vendor would switch HTTPS configuration...
2019 Oct 11
4
easy way to stop old ssl's
HI all, When CentOS 7 was created things like SSLv2 TLSv1 TLSv1.1 etc... were all OK, but now they have fallen out of favor for various reasons. Updating to CentOS 7.7 does not automatically disable these types of items from apache - is there a script that is available that can be ran to bring a box up to current "accepted" levels ? Or is that an edit by hand, do it yourself on all your
2008 Mar 13
0
[Fwd: Re: OpenSSH and X.509 Certificate Support]
...to be authenticated without having to place anything in the ~/.ssh/authorized_keys file on the server.(i.e authenticate all users if they have a valid certificate without any subject line checking). In Apache this is very much possible via mod_ssl as described in http://www.modssl.org/docs/2.8/ssl_howto.html#ToC6 . Can a similar behavior be emulated in OpenSSH using the X.509 patch? Please let me know your comments. Thanks and Best Regards, Sankalp -------- Original Message -------- Subject: Re: OpenSSH and X.509 Certificate Support Date: Wed, 12 Mar 2008 17:21:26 +0530 From: sankalp_karpe...