Displaying 20 results from an estimated 28 matches for "tls1.1".
Did you mean:
tlsv1.1
2019 Dec 27
1
Disabling TLS 1.1 in Centos 7 cockpit
Sure did!
I am even playing with different options (including NONE) and it seems
to ignore the contents of ssl.conf
I have tried
Environment=G_TLS_GNUTLS_PRIORITY=NORMAL:+TLS1.2:!TLS1.1:!TLS1.0:!ECDHE-RSA-AES256-SHA:
Environment=G_TLS_GNUTLS_PRIORITY=NORMAL:+TLS1.2:!TLS1.1:!TLS1.0:!ECDHE-RSA-AES256-SHA
Environment=G_TLS_GNUTLS_PRIORITY=PFS
2016 Mar 25
2
Re: www.centos.org/forums/
On Fri, 25 Mar 2016 16:50, Eero Volotinen wrote:
>
> Stop paranoia? Tlsv1.0 is not recommended when storing credit card data.
>
> Eero
> Hi List,
>
> Does anyone know why the above URL is still using TLS V1.0.
>
> I can't connect to it unless I enable TLS V1.0 which I was under the
> impression that it should not be used
> anymore.
>
> Thanks for any
2019 Dec 27
2
Disabling TLS 1.1 in Centos 7 cockpit
Thanks, Randal for the response. But it did not work.
Here the results:
#yum info cockpit
Name : cockpit
Arch : x86_64
Version : 195.1
Release : 1.el7.centos.0.1
Size : 51 k
Repo : installed
>From repo : extras
Summary : Web Console for Linux servers
URL : https://cockpit-project.org/
License : LGPLv2+
[root at cockpit ~]# cat
2017 Aug 26
3
[PATCH] Add support for lower TLS version than default
The openssl library in Debian unstable (targeting Buster) supports
TLS1.2 by default. The library itself supports also TLS1.1 and TLS1.0.
If the admin decides to also support TLS1.[01] users he can then enable
the lower protocol version in case the users can't update their system.
Signed-off-by: Sebastian Andrzej Siewior <sebastian at breakpoint.cc>
---
src/config/all-settings.c
2016 Mar 26
1
www.centos.org/forums/
On 25.03.2016 17:29, Eero Volotinen wrote:
>> @Eero: IMHO you are missing some points here. There are more and more
>> browsers that are unable to use SSL{2,3} as well as TLS1.0, not just
>> disabled via config, but this decission was made at compile time.
>> Newer Android and Apple-iOS devices for example.
>>
>>
> This is not true. it works fine with latest
2017 Aug 27
3
[PATCH] Add support for lower TLS version than default
On 27 August 2017 08:32:06 CEST, Timo Sirainen <tss at iki.fi> wrote:
>> DEF(SET_STR, ssl_protocols),
>> DEF(SET_STR, ssl_cert_username_field),
>> DEF(SET_STR, ssl_crypto_device),
>> + DEF(SET_STR, ssl_lowest_version),
>
>Does it really require a new setting? Couldn't it use the existing
>ssl_protocols setting?
You need to set a minimal version.
2019 Dec 27
3
Disabling TLS 1.1 in Centos 7 cockpit
Hi, I'm using cockpit in standard port 9090 in a Centos 7 system.
Due to a suggestion from management, they want TLS 1.1 disabled
system-wide in all Linux boxes and TLS 1.2 enabled.
I have not found proper documentation on how to disable it for cockpit
(version 195.1 ships with Centos 7)
So far I have tried (https://cockpit-project.org/guide/149/https.html):
2013 Sep 09
2
How to disable SSL and TLSv1.1?
I'm running Dovecot 2.2.5 and want to make it refuse SSLv2, SSLv3 and
TLSv1.0. Clients will opportunistically use TLS 1.1 and 1.2, but now I
want require they do so. Is it enough to set
ssl_cipher_list = HIGH:!SSLv2:!SSLv3:!TLSv1.0:!aNULL:!MD5
or are there additional settings I need to specify?
2016 Mar 25
0
www.centos.org/forums/
> @Eero: IMHO you are missing some points here. There are more and more
> browsers that are unable to use SSL{2,3} as well as TLS1.0, not just
> disabled via config, but this decission was made at compile time.
> Newer Android and Apple-iOS devices for example.
>
>
This is not true. it works fine with latest android and ios. I just tested
it.
> And the point is not that the
2019 Dec 27
0
Disabling TLS 1.1 in Centos 7 cockpit
Oops, excuse my typo
Create /etc/systemd/system/cockpit.service.d/ssl.conf containing
[Service]
Environment=G_TLS_GNUTLS_PRIORITY=NORMAL:-VERS-SSL3.0:-VERS-TLS1.0:-VERS-TLS1.1
Then
systemctl daemon-reload
systemctl restart cockpit
To verify that TLS 1.1 is disabled,
echo test | openssl s_client -connect localhost:9090 -tls1_1 2>&1 | grep -e Protocol -e Cipher
The expected result is:
2016 Mar 25
5
www.centos.org/forums/
Hi List,
Does anyone know why the above URL is still using TLS V1.0.
I can't connect to it unless I enable TLS V1.0 which I was under the impression that it should not be used
anymore.
Thanks for any enlightenment.
Steve
--
2024 Jun 04
2
Classicupgrade FL 2012_R2 NTLM/Kerberos logon
Hi samba list,
I work on an classicupgrade of our NT4/ldap domain.
On my tests (DC and filer are on FreeBSD and zfs file system, client is
a Windows 10 22H2):
-> I'm able to do this classicupgrade and keep all users able to connect
on computers with their domain account.
-> In a second step I configure samba DC to improve security and by the
way I upgrade our FL to 2012_R2, schema
2019 Oct 01
4
Change ciphers on samba
On 01.10.2019 14:06, Rowland penny via samba wrote:
> On 01/10/2019 12:51, Arkadiusz Karpi?ski wrote:
>>
>> On 30.09.2019 20:03, Rowland penny via samba wrote:
>>> On 30/09/2019 18:06, akarpinski wrote:
>>>> Samba version is 4.10.7
>>>>
>>>> smb.conf:
>>>>
>>>> # Global parameters
>>>> [global]
2016 Aug 02
0
TLSv1.2 support for lftp on CentOS 6.x
On Tue, Aug 02, 2016 at 02:56:26PM +0000, Olivier BONHOMME wrote:
> Hello Tom,
>
> It's indeed an interesting way. I didn't think about something just disabled. I
> browsed, gnutls rpm changelog and I saw this :
>
> * Thu May 3 2012 Tomas Mraz <tmraz at redhat.com> 2.8.5-7
> - more TLS-1.2 compatibility fixes (TLS-1.2 stays disabled by default)
>
> So
2019 Dec 27
0
Disabling TLS 1.1 in Centos 7 cockpit
On Dec 27, 2019, at 16:28, Erick Perez - Quadrian Enterprises <eperez at quadrianweb.com> wrote:
>
> [root at cockpit ~]# cat /etc/systemd/system/cockpit.service.d/ssl.conf
> Environment=G_TLS_GNUTLS_PRIORITY=NORMAL:-VERS-SSL3.0:-VERS-TLS1.0:-VERS-TLS1.1
>
> [root at cockpit ~]#
> [root at cockpit ~]# systemctl start cockpit
> [root at cockpit ~]# systemctl status
2017 Aug 27
0
[PATCH] Add support for lower TLS version than default
On 26 Aug 2017, at 19.47, Sebastian Andrzej Siewior <sebastian at breakpoint.cc> wrote:
>
> The openssl library in Debian unstable (targeting Buster) supports
> TLS1.2 by default. The library itself supports also TLS1.1 and TLS1.0.
> If the admin decides to also support TLS1.[01] users he can then enable
> the lower protocol version in case the users can't update their
2017 Aug 27
0
[PATCH] Add support for lower TLS version than default
On 2017-08-27 13:46, Sebastian Andrzej Siewior wrote:
> On 27 August 2017 08:32:06 CEST, Timo Sirainen <tss at iki.fi> wrote:
>>> DEF(SET_STR, ssl_protocols),
>>> DEF(SET_STR, ssl_cert_username_field),
>>> DEF(SET_STR, ssl_crypto_device),
>>> + DEF(SET_STR, ssl_lowest_version),
>> Does it really require a new setting? Couldn't it use the
2020 May 31
1
I can no longer use TLS for Windows7 and Outlook
On 5/31/20 11:54 AM, Aki Tuomi wrote:
>
>> On 31/05/2020 07:36 Mark Constable <markc at renta.net
>> <mailto:markc at renta.net>> wrote:
>>
>>
>> I currently use Ubuntu 20.04 with Dovecot 2.3.7.2 and OpenSSL 1.1.1f.
>>
>> A few months ago there was an update to all these systems and since
>> then I've had to talk W7 and old Mac
2024 Oct 01
1
Error SAMBA4.19.2
Good evening,
We have been dealing with an incident for several weeks during peak load
times, either due to authentications or service accesses that rely on Samba
4 AD. Below are the details of the current Samba version and OS:
**Samba version 4.19.2**
```bash
~$ uname -r
5.15.0-41-generic
~$ sudo lsb_release
No LSB modules are available.
~$ sudo lsb_release -a
No LSB modules are available.
2019 Oct 01
0
Change ciphers on samba
You looking for something like this i think?
Enable TLS1.2 ( and if supported TLS1.3) and allowes AES128 and EAS256.
tls priority = SECURE256:+SECURE128:-VERS-SSL3.0:-VERS-TLS1.0:-VERS-TLS1.1:-VERS-DTLS1.0:-VERS-DTLS1.1
Greetz,
Louis
> -----Oorspronkelijk bericht-----
> Van: samba [mailto:samba-bounces at lists.samba.org] Namens
> Robert Marcano via samba
> Verzonden: dinsdag