Displaying 10 results from an estimated 10 matches for "tls1_1".
Did you mean:
tls1.1
2019 Dec 27
3
Disabling TLS 1.1 in Centos 7 cockpit
...nt=G_TLS_GNUTLS_PRIORITY=-VERS-ALL:+VERS-TLS1.2
And I also created the file /etc/systemd/system/cockpit.service.d/ssl.conf
and added:
[Service]
Environment=G_TLS_GNUTLS_PRIORITY=-VERS-ALL:+VERS-TLS1.2
after that, I systemctl restart cockpit
But if I do
#openssl s_client -connect localhost:9090 -tls1_1
I get a proper response (a certificate), so TLS 1.1 is being accepted.
Suggestions?
Thanks.
--
---------------------
Erick Perez
---------------------
2019 Sep 13
2
Multiple certificate option SNI
...l_key =? < /etc/dovecot/ssl/imap.mail.test.domain.com.key
}
doveconf -n:
local_name imap.mail.test.domain.com {
? ssl_cert = </etc/dovecot/ssl/imap.mail.test.domain.com.pem
? ssl_key =? # hidden, use -P to show it
}
Now I test like:
openssl s_client -connect imap.mail.test.domain.com:993 -tls1_1
and dovecot show me default server cert (digicert) but not dedicated
from letsencrypt
In DNS domain imap.mail.test.domain.com is not match *.domain.com
Any idea ?
2019 Dec 27
2
Disabling TLS 1.1 in Centos 7 cockpit
...c 27 16:23:21 cockpit.localdomain cockpit-ws[3573]: Using
certificate: /etc/cockpit/ws-certs.d/0-self-signed.cert
Dec 27 16:23:30 cockpit.localdomain cockpit-ws[3573]: received invalid
HTTP request line
[root at cockpit ~]#
[root at cockpit ~]# echo test | openssl s_client -connect localhost:9090
-tls1_1 2>&1 | grep -e Protocol -e Cipher
New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-SHA
Protocol : TLSv1.1
Cipher : ECDHE-RSA-AES256-SHA
On Fri, Dec 27, 2019 at 10:09 AM Randal, Phil
<phil.randal at hoopleltd.co.uk> wrote:
>
> Oops, excuse my typo
>
> Create /etc/sy...
2019 Dec 27
1
Disabling TLS 1.1 in Centos 7 cockpit
...Environment=G_TLS_GNUTLS_PRIORITY=SECURE192:-VERS-ALL:+VERS-TLS1.3:+VERS-TLS1.2
And my last one:
Environment=G_TLS_GNUTLS_PRIORITY=NONE:+SECURE128:-VERS-ALL:-SHA384:-SHA256
systemctl daemon-reload
systemctl restart cockpit
[root at cockpit ~]# echo test | openssl s_client -connect localhost:9090
-tls1_1 2>&1 | grep -e Protocol -e Cipher
New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-SHA
Protocol : TLSv1.1
Cipher : ECDHE-RSA-AES256-SHA
[root at cockpit ~]# echo test | openssl s_client -connect localhost:9090
-tls1_2 2>&1 | grep -e Protocol -e Cipher
New, TLSv1/SSLv3, Ciphe...
2013 Dec 07
2
pigeonhole openssl s_client
Hi!
I'm trying to get information about a server certificate from a
pigeonhole sieve server.
Various connection attempts show only "wrong version number" or "unknown
protocol" errors from openssl:
$ openssl s_client -connect example.com:4190 { -tls1, -tls1_1, -tls1_2 } [ -starttls { imap, pop3 } ]
None of these work. I'm trying to see who signed the server cert. How
could I do this?
Thanks,
Daniel
--
L?VAI D?niel
PGP key ID = 0x83B63A8F
Key fingerprint = DBEC C66B A47A DFA2 792D 650C C69B BE4C 83B6 3A8F
2019 Dec 27
0
Disabling TLS 1.1 in Centos 7 cockpit
...e /etc/systemd/system/cockpit.service.d/ssl.conf containing
[Service]
Environment=G_TLS_GNUTLS_PRIORITY=NORMAL:-VERS-SSL3.0:-VERS-TLS1.0:-VERS-TLS1.1
Then
systemctl daemon-reload
systemctl restart cockpit
To verify that TLS 1.1 is disabled,
echo test | openssl s_client -connect localhost:9090 -tls1_1 2>&1 | grep -e Protocol -e Cipher
The expected result is:
New, (NONE), Cipher is (NONE)
Protocol : TLSv1.1
Cipher : 0000
Cheers,
Phil
-----Original Message-----
From: Randal, Phil
Sent: 27 December 2019 15:04
To: 'CentOS mailing list' <centos at centos.org>
Sub...
2020 Oct 16
2
Dovecot won't accept IMAP TLS 1 connections from older devices [SOLVED]
...o Dovecot. Dovecot logged:
?? SSL routines:tls_early_post_process_client_hello:unsupported protocol
and TCP/IP traces showed that it dropped the connection after the
client's initial HELLO.? I tested what kinds of connections Dovecot
would accept with (for example):
??? openssl s_client -tls1_1 -connect localhost:993?? # Test whether
TLSv1.1 is accepted - received "unsupported protocol" message.
Searching showed that Dovecot has a parameter "ssl_min_protocol", which
is documented as defaulting to TLSv1.? Nevertheless I explicitly set it
to TLSv1 with no effect.? Th...
2018 Jun 22
0
Imap daemons for CentOS 6 (other then cyrus-imapd)
...rus-imapd/tls.crt/server-chain-sslca.crt
tls_cipher_list:
EECDH+ECDSA+AESGCM:EECDH+aRSA+AESGCM:EECDH+ECDSA:EECDH:EDH+AESGCM:EDH:ECDH+AESGCM:ECDH+AES:ECDH:AES:HIGH:MEDIUM:3DES:!SSLv2:+SSLv3:!RC4:!MD5:!IDEA:!SEED:!aNULL:!eNULL:!LOW:!EXP:!DSS:!PSK:!SRP
tls_prefer_server_ciphers: 1
tls_versions: tls1_0 tls1_1 tls1_2
Walter
2019 Sep 07
2
Multiple certificate option
Thanks Michael I will check with the free cert lets encrypt to test it.
Remo
> Il giorno 7 set 2019, alle ore 02:09, Michael Hallager via dovecot <dovecot at dovecot.org> ha scritto:
>
> ?On 2019-09-07 12:25, remo--- via dovecot wrote:
>> What is the best way to adopt multiple certs?
>> Thanks.
>
> /etc/dovecot/conf.d/10-ssl.conf
>
> Primary SSL
2018 Jun 25
0
NetworkManager updating resolv.cfg
...rus-imapd/tls.crt/server-chain-sslca.crt
tls_cipher_list:
EECDH+ECDSA+AESGCM:EECDH+aRSA+AESGCM:EECDH+ECDSA:EECDH:EDH+AESGCM:EDH:ECDH+AESGCM:ECDH+AES:ECDH:AES:HIGH:MEDIUM:3DES:!SSLv2:+SSLv3:!RC4:!MD5:!IDEA:!SEED:!aNULL:!eNULL:!LOW:!EXP:!DSS:!PSK:!SRP
tls_prefer_server_ciphers: 1
tls_versions: tls1_0 tls1_1 tls1_2
Walter
------------------------------
Subject: Digest Footer
_______________________________________________
CentOS mailing list
CentOS at centos.org
https://clicktime.symantec.com/a/1/GaRh-9mT7pT2BGk25Szya6j4lyfBTXokdCA6hocGAkM=?d=jdUOEa0ursy6vviA72Wp9CQyzmNZP0ZhevOrPVBV93kfSdUe78C...