Displaying 20 results from an estimated 6000 matches similar to: "Reviving an old thread: "requiring client certificates for external connections""
2010 Dec 19
2
Problem with requiring client certificates for external connections
Folks,
I'm trying to configure my dovecot installation to require client
certificates for external/Internet connections, while still allowing my
local network to not need certificates.
This configuration is for Dovecot 2 (2.0.8 in Fedora 14), and I've
tried to use the "remote" block to give different definitions for my
local network vs the defaults. While most options seem to
2017 Aug 30
2
tsan_interface_java.h; any users? reviving https://github.com/google/java-thread-sanitizer?
Hello,
I've been looking at ThreadSanitizer in
https://github.com/llvm-mirror/compiler-rt and I noticed some Java-related
files. Is there a version of ThreadSanitizer build on top of that, which I
could use to sanitize my Java programs? I could not find any.
I found https://github.com/google/java-thread-sanitizer, which seems to be
now abandoned. It used to work with ThreadSanitizer v1. Has
2017 Aug 31
2
tsan_interface_java.h; any users? reviving https://github.com/google/java-thread-sanitizer?
>
> On Aug 30, 2017, at 12:51 AM, Jiri Danek via llvm-dev <
> llvm-dev at lists.llvm.org> wrote:
> I found https://github.com/google/java-thread-sanitizer, which seems to
> be now abandoned. It used to work with ThreadSanitizer v1. Has anybody ever
> tried to make it work with the current ThreadSanitizer?
>
> I gave it a try and bending java-thread-sanitizer to my
2017 Aug 31
2
tsan_interface_java.h; any users? reviving https://github.com/google/java-thread-sanitizer?
The interface files you see are for a prototype of Java Tsan that's
internal to Google. It's for use by a JDK that we customized with extensive
JVM patches, and enables running the Tsan engine on Java and native code
simultaneously.
We presented this prototype recently at the JVM Language Summit. Here's the
talk:
https://www.youtube.com/watch?v=UykhZ36W04I
We are starting to explore
2016 Jan 29
2
Disable Client Certificate Authentication for Unencrypted Connections?
> On 27 Jan 2016, at 21:55, Axel Luttgens <axel.luttgens at skynet.be> wrote:
>
> Hello Haravikk,
>
> Perhaps could you try to devise an exception based on one (or more) "remote" section(s), as in:
>
> remote ip.of.webmail.server {
> ssl_verify_client_cert = no
> [other settings, if needed]
> }
>
> But I guess you would need to combine
2006 Jun 01
1
ssl-proxy: client certificates and crl check
Skipped content of type multipart/alternative-------------- next part --------------
--- ssl-proxy-openssl.c.orig 2006-04-04 10:32:58.000000000 +0200
+++ ssl-proxy-openssl.c 2006-06-01 09:24:57.000000000 +0200
@@ -498,7 +498,7 @@
const char *ssl_proxy_get_peer_name(struct ssl_proxy *proxy)
{
X509 *x509;
- char buf[1024];
+ char buf[256];
const char *name;
if
2018 Mar 23
0
Reviving the DebugIR pass
Please do take over the pass revival. College hasn't left me with the
bandwidth to continue this side project :)
If there's small things here and there, I'd be happy to pitch in.
However,.whipping the patch into shape is beyond me right now.
Thanks
Siddharth
On Fri 23 Mar, 2018, 00:53 via llvm-dev, <llvm-dev at lists.llvm.org> wrote:
>
> >> This work could also
2016 Jan 25
2
Disable Client Certificate Authentication for Unencrypted Connections?
I?m using dovecot to provide encrypted IMAP e-mail support for remote clients and it?s working great. However, I also need to set up a webmail front-end (Roundcube), which I?m hoping to have use unencrypted IMAP on port 143 (as only port 993 is available externally).
The problem I?m running into is that I want to require client certificate authentication on port 993, but dovecot is apparently
2010 Oct 18
2
Question about Client Certificates
Hi,
I have a simple dovecot installation, version 1.2.12 of ubuntu 10.10.
I also have a straightforward newbie question! I've hunted in the wiki
and on the wider web, but not yet found a solution.
Current status: I have successfully configured imap with tls, accessed
on port 993, and for security require a valid client certificate to be
presented, using ssl_require_client_cert and
2018 Mar 21
0
Reviving the DebugIR pass
Hi Dan,
Having missed this functionality myself in the past I’m excited to see this
gain traction. Let me know if there’s anything I can do to help this along.
Cheers,
Jonas
On Wed, 21 Mar 2018 at 18:19, Dan Liew via llvm-dev <llvm-dev at lists.llvm.org>
wrote:
> Hi,
>
> I recently had the need to see the correspondence between some Clang
> generated LLVM IR and the compiled
2018 Mar 22
0
Reviving the DebugIR pass
+ 1 to having this functionality implemented as `llvm-as -g` or some analog (`clang -g foo.ll`).
As I outlined in https://reviews.llvm.org/D40778 <https://reviews.llvm.org/D40778>, I think such a solution can be made to work for JIT users who don't have on-disk *.ll files.
> On Mar 21, 2018, at 5:37 PM, Jason Surprise via llvm-dev <llvm-dev at lists.llvm.org> wrote:
>
>
2006 May 11
0
mandatory client certificates and crl check in ssl-proxy-openssl.c
hello,
I made a modification to ssl-proxy-openssl.c (patch attached) zo that it
a) disconnects when no client certificate is presented
b) checks the client certificate against the crl for our root cert. (so
you can't use a revoked client cert.)
c) returns the CommonName from the client cert. in
ssl_proxy_get_peer_name (this way it's easier to use dovecot as
imap-proxy with a
2018 Mar 21
2
Reviving the DebugIR pass
Hi,
I recently had the need to see the correspondence between some Clang
generated LLVM IR and the compiled machine code within a debugger
(lldb in this case). Unfortunately it looks like the functionality to
do this used to be in a pass called 'DebugIR' but was removed due to
the lack of a maintainer [1].
It appears an attempt was made [2] to revive this but it appears to
have stalled.
2006 Jul 31
2
Dovecot and SSL certificates
Hello,
we're running RC2 and seeing a problem with the way SSL certs
are handled by Dovecot.
We've set ssl_verify_client_cert=yes and ssl_require_valid_client_cert=no.
Using this setup we get (rather interesting) log entries like these:
Jul 31 11:21:23 dev dovecot: imap-login: Invalid certificate: <user cert>
Jul 31 11:21:23 dev dovecot: imap-login: Invalid certificate: <CA
2018 Mar 22
2
Reviving the DebugIR pass
>> This work could also be used to fix [3]. Although this probably needs
>> more though because there's the question of whether we should preserve
>> existing debug information in an LLVM IR file or write over it when it
>> is given to Clang.
>
> If foo.ll contains edited debug info, `clang -g` shouldn't silently drop
> the edits. A warning + no-op seems
2003 Oct 06
2
Patch to revive tmpfiles
This is a patch to fix one annoyance of having rsync processes race:
I usually keep our servers synced with the following script, run by cron.
#!/bin/sh
lockfile -r 2 -l 1000 /tmp/synchome.lock || exit 1
rsync -e ssh -avHP --delete zorro01:/home/\* /home >/dev/null
rm -f /tmp/synchome.lock
--
Sometimes my users (including myself) are in a hurry and syncronise files and directories in their
2018 Mar 23
1
Reviving the DebugIR pass
>> This work could also be used to fix [3]. Although this probably needs
>> more though because there's the question of whether we should preserve
>> existing debug information in an LLVM IR file or write over it when it
>> is given to Clang.
>
>
> If foo.ll contains edited debug info, `clang -g` shouldn't silently drop the
> edits. A warning + no-op
2011 Jul 31
0
[LLVMdev] Reviving the new LLVM concurrency model
I noticed the patch was already merged into the current LLVM language
reference manual with new memory instructions, fence, cmpxchg and
atomicrmw. Will the instructions be available in LLVM 3.0?
On Mon, Jul 18, 2011 at 8:22 PM, Eli Friedman <eli.friedman at gmail.com> wrote:
> There was some discussion a while back about adding a C++0x-style
> memory model and atomics for LLVM a while
2011 Jul 31
2
[LLVMdev] Reviving the new LLVM concurrency model
On Sun, Jul 31, 2011 at 12:49 PM, Jianzhou Zhao <jianzhou at seas.upenn.edu> wrote:
> I noticed the patch was already merged into the current LLVM language
> reference manual with new memory instructions, fence, cmpxchg and
> atomicrmw. Will the instructions be available in LLVM 3.0?
Hopefully, yes; the implementation is in progress.
-Eli
2011 Aug 01
0
[LLVMdev] Reviving the new LLVM concurrency model
On Sun, Jul 31, 2011 at 7:12 PM, Eli Friedman <eli.friedman at gmail.com> wrote:
> On Sun, Jul 31, 2011 at 12:49 PM, Jianzhou Zhao <jianzhou at seas.upenn.edu> wrote:
>> I noticed the patch was already merged into the current LLVM language
>> reference manual with new memory instructions, fence, cmpxchg and
>> atomicrmw. Will the instructions be available in LLVM