similar to: CESA-2019:0482 Moderate CentOS 7 cockpit Security Update

Displaying 20 results from an estimated 6000 matches similar to: "CESA-2019:0482 Moderate CentOS 7 cockpit Security Update"

2019 Dec 27
2
Disabling TLS 1.1 in Centos 7 cockpit
Thanks, Randal for the response. But it did not work. Here the results: #yum info cockpit Name : cockpit Arch : x86_64 Version : 195.1 Release : 1.el7.centos.0.1 Size : 51 k Repo : installed >From repo : extras Summary : Web Console for Linux servers URL : https://cockpit-project.org/ License : LGPLv2+ [root at cockpit ~]# cat
2019 Apr 12
1
Cockpit within httpd
Folks I'd love to use Cockpit, but I cannot open port 9090 for the access in all cases. I'd like to access it via my usual http port (such as 80) where I'm limited to a single HTTP port. I understand the security implications, and can deal with them later. My attempt was to allow the following URL to access the cockpit functionality: http://xxx.example.com/cockpit (not the
2017 Oct 20
0
CEBA-2017:2961 CentOS 7 cockpit BugFix Update
CentOS Errata and Bugfix Advisory 2017:2961 Upstream details at : https://access.redhat.com/errata/RHBA-2017:2961 The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 0b38a0e520340bae44134042c2500bf57b3c2a393bafaecbb26f65b2e0070858 cockpit-138-10.el7_4.x86_64.rpm
2019 Dec 27
0
Disabling TLS 1.1 in Centos 7 cockpit
Oops, excuse my typo Create /etc/systemd/system/cockpit.service.d/ssl.conf containing [Service] Environment=G_TLS_GNUTLS_PRIORITY=NORMAL:-VERS-SSL3.0:-VERS-TLS1.0:-VERS-TLS1.1 Then systemctl daemon-reload systemctl restart cockpit To verify that TLS 1.1 is disabled, echo test | openssl s_client -connect localhost:9090 -tls1_1 2>&1 | grep -e Protocol -e Cipher The expected result is:
2019 Dec 27
0
Disabling TLS 1.1 in Centos 7 cockpit
On Dec 27, 2019, at 16:28, Erick Perez - Quadrian Enterprises <eperez at quadrianweb.com> wrote: > > [root at cockpit ~]# cat /etc/systemd/system/cockpit.service.d/ssl.conf > Environment=G_TLS_GNUTLS_PRIORITY=NORMAL:-VERS-SSL3.0:-VERS-TLS1.0:-VERS-TLS1.1 > > [root at cockpit ~]# > [root at cockpit ~]# systemctl start cockpit > [root at cockpit ~]# systemctl status
2019 Dec 27
1
Disabling TLS 1.1 in Centos 7 cockpit
Sure did! I am even playing with different options (including NONE) and it seems to ignore the contents of ssl.conf I have tried Environment=G_TLS_GNUTLS_PRIORITY=NORMAL:+TLS1.2:!TLS1.1:!TLS1.0:!ECDHE-RSA-AES256-SHA: Environment=G_TLS_GNUTLS_PRIORITY=NORMAL:+TLS1.2:!TLS1.1:!TLS1.0:!ECDHE-RSA-AES256-SHA Environment=G_TLS_GNUTLS_PRIORITY=PFS
2019 Dec 27
3
Disabling TLS 1.1 in Centos 7 cockpit
Hi, I'm using cockpit in standard port 9090 in a Centos 7 system. Due to a suggestion from management, they want TLS 1.1 disabled system-wide in all Linux boxes and TLS 1.2 enabled. I have not found proper documentation on how to disable it for cockpit (version 195.1 ships with Centos 7) So far I have tried (https://cockpit-project.org/guide/149/https.html):
2019 Oct 26
0
Bug 1671147 - RHEL 8 Cockpit - "Launch Remote Viewer" in Virtual Machines section does not work remotely
Can someone that has RHEL developer access look up the details of this bug, bug 1671147 https://bugzilla.redhat.com/show_bug.cgi?id=1671147 was closed as duplicate to this bug - https://bugzilla.redhat.com/show_bug.cgi?id=1558219 however when you try to access the details it states: "You are not authorized to access bug #1558219. Most likely the bug has been restricted for internal
2020 Oct 30
0
Re: virsh rights voor normal users
On Thu, Oct 29, 2020 at 11:34:09PM +0100, Natxo Asenjo wrote: > On Thu, Oct 29, 2020 at 8:39 PM Michal Privoznik <mprivozn@redhat.com> > wrote: > > > On 10/29/20 4:47 PM, Natxo Asenjo wrote: > > > ah, yes. I try this: > > > > > > $ virsh -c qemu:///system > > > > > > But it then I get a prompt: > > > > > > ====
2020 Oct 29
2
Re: virsh rights voor normal users
On Thu, Oct 29, 2020 at 8:39 PM Michal Privoznik <mprivozn@redhat.com> wrote: > On 10/29/20 4:47 PM, Natxo Asenjo wrote: > > ah, yes. I try this: > > > > $ virsh -c qemu:///system > > > > But it then I get a prompt: > > > > ==== AUTHENTICATING FOR org.libvirt.unix.manage ============= > > System policy prevents management of local
2020 Apr 05
2
Windows 10 as guest on Centos 8
I agree with Liam. The good old tried and tested virt-manager will be obsoleted in the future but it is still available on RHEL/CentOS 8. Cockpit will replace it in the future but it still lacks a lot of essential features. Boxes is a tool that lacks even more functionality. As to why your computer freezes I have no clue. -- <(*) Jyrki On Sat, 2020-04-04 at 00:45 +0100, Liam O'Toole
2023 Mar 17
1
Samba Issue for Mac
We are using the nss-db instead of SSSD on the Samba server. The backend database is nss. idmap config adlocal : backend = nss Our issue is related to user directory discrepancy on the Mac OS systems. On the windows systems, we don?t see any issue. -Himi ________________________________ From: samba <samba-bounces at lists.samba.org> on behalf of Rowland Penny via samba <samba at
2020 Oct 29
2
virsh rights voor normal users
hi, using the cockpit web ui and with these instructions: https://libvirt.org/dbus.html#usage we allow successfully that a group of users can access the console of the system vms in different kvm hosts. Oddly enough, in the same cockpit web interface I can use a terminal, and if I run virsh list --all I get an empty listing. So using cockpit I can manage the system vms, but I cannot use virsh.
2020 Oct 29
2
Re: virsh rights voor normal users
On Thu, Oct 29, 2020 at 4:25 PM Daniel P. Berrange <dan@berrange.com> wrote: > On Thu, Oct 29, 2020 at 04:13:45PM +0100, Natxo Asenjo wrote: > > if I run virsh list --all I get an empty listing. > > > > So using cockpit I can manage the system vms, but I cannot use virsh. > > > > This is in a rhel 7.8 system. The host is joined to an Idm realm, and > this
2020 Oct 29
0
Re: virsh rights voor normal users
On Thu, Oct 29, 2020 at 04:13:45PM +0100, Natxo Asenjo wrote: > hi, > using the cockpit web ui and with these instructions: > > https://libvirt.org/dbus.html#usage > > we allow successfully that a group of users can access the console of the > system vms in different kvm hosts. > > Oddly enough, in the same cockpit web interface I can use a terminal, and > if I run
2020 Oct 29
0
Re: virsh rights voor normal users
On 10/29/20 4:47 PM, Natxo Asenjo wrote: > ah, yes. I try this: > > $ virsh -c qemu:///system > > But it then I get a prompt: > > ==== AUTHENTICATING FOR org.libvirt.unix.manage ============= > System policy prevents management of local virtualized systems > Authenticating as:  sudo_user_not_disclosed > Password: > Password: > polikit-agent-helper-1:
2019 Sep 25
2
Centos 8 Mate?
Once upon a time, Robert Nichols <rnicholsNOSPAM at comcast.net> said: > the lack of VM snapshot capability is a total deal-breaker for me. The capability is still there and works just the same as before. The only change is that the new preferred tool for graphical VM management, Cockpit, doesn't yet support making snapshots. virt-manager is still there for now (presumably until
2020 Apr 05
0
Windows 10 as guest on Centos 8
Thanks Jyrki and Leroy. I tried to use cockpit but virt-manager seems easier. Is there a config file for cockpit? Where is it? On Sun, 2020-04-05 at 17:58 +0300, Jyrki Tikka wrote: > I agree with Liam. The good old tried and tested virt-manager will be > obsoleted in the future but it is still available on RHEL/CentOS 8. > Cockpit will replace it in the future but it still lacks a lot
2011 May 04
0
CEBA-2011:0482 CentOS 5 x86_64 mod_authz_ldap FASTTRACK Update
CentOS Errata and Bugfix Advisory 2011:0482 Upstream details at : https://rhn.redhat.com/errata/RHBA-2011-0482.html The following updated files have been uploaded and are currently syncing to the mirrors: ( md5sum Filename ) x86_64: 5ce2b332cb9f31aaea04e5712eca1852 mod_authz_ldap-0.26-11.el5.x86_64.rpm Source: 7a9b303099adc6c1c01198a95fa44cdc mod_authz_ldap-0.26-11.el5.src.rpm --
2011 May 04
0
CEBA-2011:0482 CentOS 5 i386 mod_authz_ldap FASTTRACK Update
CentOS Errata and Bugfix Advisory 2011:0482 Upstream details at : https://rhn.redhat.com/errata/RHBA-2011-0482.html The following updated files have been uploaded and are currently syncing to the mirrors: ( md5sum Filename ) i386: 960aa1736476e563411015126940864c mod_authz_ldap-0.26-11.el5.i386.rpm Source: 7a9b303099adc6c1c01198a95fa44cdc mod_authz_ldap-0.26-11.el5.src.rpm -- Johnny