similar to: [nut-commits] svn commit r2804 - in branches/ssl-nss-port: clients server

Displaying 20 results from an estimated 100 matches similar to: "[nut-commits] svn commit r2804 - in branches/ssl-nss-port: clients server"

2018 Jun 19
2
upsmon Can not initialize SSL context (letsencrypt) #563
those mails list are from last century but i give it a try ! created : https://github.com/networkupstools/nut/issues/563 Hello all, Trying to run an EATON 850pro via USB on a Debian Stretch Stable. I have letsencrypt certificate installed and working. When trying to manage the EATON device, i got: upsmon Can not initialize SSL context When 850pro is connected via USB, i can: lsusb Bus 009
2011 Jan 07
1
[nut-commits] svn commit r2809 - branches/ssl-nss-port/server
Citeren Emilien Kia <emilienkia-guest op alioth.debian.org>: > Author: emilienkia-guest > Date: Fri Jan 7 14:44:25 2011 > New Revision: 2809 > URL: http://trac.networkupstools.org/projects/nut/changeset/2809 > > Log: > Deprecate CERTFILE conf var to the benefit of CERTPATH : homogenize > conf directive names. > > Modified: >
2011 Aug 27
1
[PATCH 2/3] Fix use of uninitialized variable
Credit goes to "cppcheck". Signed-off-by: Thomas Jarosch <thomas.jarosch at intra2net.com> --- drivers/mge-utalk.c | 3 ++- 1 files changed, 2 insertions(+), 1 deletions(-) diff --git a/drivers/mge-utalk.c b/drivers/mge-utalk.c index c6114c7..616e2ad 100644 --- a/drivers/mge-utalk.c +++ b/drivers/mge-utalk.c @@ -465,7 +465,8 @@ void upsdrv_shutdown(void) { char
2011 Aug 27
1
[PATCH 3/3] Fix pointer check on wrong variable
Credit goess to "cppcheck" Signed-off-by: Thomas Jarosch <thomas.jarosch at intra2net.com> --- drivers/usb-common.c | 2 +- 1 files changed, 1 insertions(+), 1 deletions(-) diff --git a/drivers/usb-common.c b/drivers/usb-common.c index e51f3cf..e459872 100644 --- a/drivers/usb-common.c +++ b/drivers/usb-common.c @@ -116,7 +116,7 @@ int USBNewExactMatcher(USBDeviceMatcher_t
2011 Aug 27
1
[PATCH 1/3] Fix file descriptor leak
Credit goes to "cppcheck" Signed-off-by: Thomas Jarosch <thomas.jarosch at intra2net.com> --- common/common.c | 5 +++++ 1 files changed, 5 insertions(+), 0 deletions(-) diff --git a/common/common.c b/common/common.c index f443cb7..e8004d7 100644 --- a/common/common.c +++ b/common/common.c @@ -244,6 +244,7 @@ int sendsignalfn(const char *pidfn, int sig) if (fgets(buf,
2007 Nov 06
3
Keeping Up with Trunk
I have a project with rspec installed as a plugin using svn:externals. Here are my externals: rspec_on_rails svn://rubyforge.org/var/svn/rspec/trunk/ rspec_on_rails rspec svn://rubyforge.org/var/svn/rspec/trunk/ rspec I just did an svn up on both and now have a version mismatch: ########################################################################
2011 Jul 06
4
upsclient high level API and Java wrapping
Hi all, on proposal by Arnaud Quette and sponsored by Eaton, I will work on a port on Java of client, discovery and config API. As I have already suggested (mail of 2011-06-14 of this ml), instead of developping another port of nut protocol, I suggest to develop a higher level API in C/C++ uppon existing upsclient, inspirated by existing C-based tools and python and perl rewrites. The second
2011 Jan 11
1
Client certificates
While browsing the sources of the nss-ssl-port sources I noticed that client certificates were added. What is the reason behind this? As far as I can see, using a server certificate and validating it in the upsmon client should provide us with a secure channel. Authorizations for the server will then be handled by the settings in upsd.users by logging into the server with user and
2011 Jan 21
1
End of NSS port
Hi all, I am pleased to announce that NSS port of NUT is finished. Port is fully functionnal (same functionnalities as openssl, and a not-activated-by-default client certificate validation function) and successfully tested by myself (external tests are pending, Frederic Bohe is planned for) with a test matrix which will be uploaded to the web site soon (by Arnaud), tested functionnality by
2012 Aug 10
1
NSS branch testing.
Hello all, In order to prepare the merge of the NSS branch to the trunk, I have validated the code in this branch by passing this validation document written by Emilien Kia : http://www.networkupstools.org/tmp/NUT-NSS_Mini_DVT_Plan-final.pdf The testing has been done on rev 3685 of the ssl-nss-port branch. As you can read, I have found no issue. Let me know if you have any comments on this.
2023 Nov 09
2
2.8.1 build buglet: sockdebug.c
I am (belatedly) updating pkgsrc to 2.8.1 (+ bugfix). (FWIW, I think a 2.8.1.1 or 2.8.2 immediately with the fix is in order. >From a packaging viewpoint, the effort to update for a release is about 3 minutes plus time to adapt anythhing that has changed. So I'd much rather have releases more often.) In the pkgsrc build, nut finds tcp wrappers because they are part of the base system.
2011 Jan 13
1
SSL certificate verification with OpenSSL in NUT trunk
Hi all, After client's certificate verifications discussion in the mailing-list, I have done some tests with nut trunk and - if my config is not too bad - I think ther is a bug with server certificate verification. With a clean trunk checkout, compile and installation; and with the following config : upsmon.conf: CERTPATH /usr/local/ups/etc/cert/ CERTVERIFY 1 FORCESSL 1 Upsd.conf: CERTFILE
2005 Sep 24
0
Software to generate an SRTP key pair?
I have been looking all over for software to generate the keys needed to have secure calls with my Sipura. The only one that I have found is on-line and thus not so secure: http://voxilla.com/certrequest.php Any pointers? Thx, -RFH
2018 Jul 10
0
NSS on Debian Stretch with libnss3: Can not initialize SSL context
I am unable to get 2.7.4 to work with NSS support as provided by libnss3 2:3.26.2 on Debian stretch. Currently NSS supports two database formats identified by prefixes "sql:" for the new database and "dbm:" for the legacy database. I created the NSS database in directory /etc/nut with command certutil -N -d dbm:NSS_db --empty-password I copied over public key and
2023 Oct 31
5
NUT v2.8.1 is released
...it was almost midnight, Cinderella became a pumpkin, and NUT was released!.. Trick or treat?! -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://alioth-lists.debian.net/pipermail/nut-upsdev/attachments/20231031/f3590340/attachment.htm>
2023 Oct 31
5
NUT v2.8.1 is released
...it was almost midnight, Cinderella became a pumpkin, and NUT was released!.. Trick or treat?! -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://alioth-lists.debian.net/pipermail/nut-upsdev/attachments/20231031/f3590340/attachment.htm>
2005 Sep 27
4
Voice Encryption
Hi, Does Asterisk support encryption of voice traffic? I found following wiki that describes IAX RSA authentication. I was able to implement the public/private key authentication among three Asterisk servers connected using IAX protocol. I am not certain if voice traffic can also be encrypted among the Asterisk servers. Your help is highly appreciated.
2011 Nov 18
0
Introduce jNutWebApi
Hi All, Perhaps you have seen, a few weeks ago, a release of jNut-0.2 which introduces nut-scanner capability to jNut java library, see http://networkupstools.org/download.html#_java_packages. With this package have been released jNutWebApi, a java web archive which uses jNut to present some UPSD and nut-scanner data on the form of a web service. This package is a maven-based project
2015 Apr 04
1
SSL only working in DEBUG mode
Hello All 2015-03-26 9:03 GMT+01:00 Arnaud Quette <arnaud.quette at gmail.com>: > > > What I will do is to move ssl initializing after usering and forking, > than add key file right checking where ssl was initialized before (before > forking). > > As keys should be owned by nut user, this would not be a problem. > > And moving this code, independently of SSL
2011 Jan 06
0
No subject
If you don't use 'CERTVERIFY 1', then this will at least make sure that nobody can sniff your sessions without a large effort (...) > So, do I misunderstand CERTVERIFY directive ? Or is there a bug ? >> Can you reproduce such behaviour ? >> > > I'm not sure what is going on. Can you try running 'upsmon' with debugging > enabled? The following are