Re: TLS handshake failure i/o timeout

2014-09-18 Thread espeake
Kyle, Thanks for the reply. It was certificate issue. After I was able to line the correct certs with the correct key it started working as advertised. Thank you, Eric Speake Web Systems Administrator O'Reilly Auto Parts (417) 862-2674 Ext. 1975 From: Kyle Hamilton To: openssl-users

TLS handshake failure i/o timeout

2014-09-18 Thread espeake
I have an ubuntu 14.04 with openssl 1.0.1f-1ubuntu2.3 server running and a another server connecting as the client with ubuntu 12.04 with openssl 1.0.1-4ubuntu5.16. I am getting an error about the TLS handshake failing i/o timeout. I have tried using our internal wildcard certs on both servers s

Re: CA cert issue

2014-02-17 Thread espeake
Thanks. Eric Speake Web Systems Administrator O'Reilly Auto Parts (417) 862-2674 Ext. 1975 From: Viktor Dukhovni To: openssl-users@openssl.org, owner-openssl-us...@openssl.org Date: 02/17/2014 02:44 PM Subject:Re: CA cert issue Sent by:owner-openssl-us...@openssl.org

Re: CA cert issue

2014-02-17 Thread espeake
The applications use data connection pools to connect to the iSeries servers we use. Allof the connections use hibernate (.hibernate.connection.url=jdbc:as400://;;; In the options we add secure=true. The CAcert we have is the root cert and if I use the openSSL command to use the actual file I g

Re: CA cert issue

2014-02-17 Thread espeake
Viktor, I have tried the c_rehash /etc/ssl/certs and that did not help the situation. I had seen that in a bug post and tried it. How can I make sure that openssl is usin g the /etc/ssl/certs folder to search for the ca certificate? Thanks, Eric Speake Web Systems Administrator O'Reilly Auto Pa

CA cert issue

2014-02-17 Thread espeake
I have a server that has a certificate that is sign by an internal certificate authority. I have the cert for this CA installed on my application server. If I run the following every thing works. openssl s_client -state -nbio -connect host:9471 -CAfile /etc/ssl/certs/.pem 2>&1 This: openssl s

{resolved}Re: TLS authentication for ldap

2013-09-23 Thread espeake
From: Viktor Dukhovni To: "openssl-users@openssl.org" Date: 09/23/2013 10:40 AM Subject:Re: TLS authentication for ldap Sent by:owner-openssl-us...@openssl.org On Mon, Sep 23, 2013 at 11:27:06AM -0400, Salz, Rich wrote: > > Note, the above is for enforcing STARTTLS

RE: TLS authentication for ldap

2013-09-23 Thread espeake
From: "Salz, Rich" To: "openssl-users@openssl.org" Date: 09/23/2013 10:29 AM Subject:RE: TLS authentication for ldap Sent by:owner-openssl-us...@openssl.org > Note, the above is for enforcing STARTTLS on the server. If the > decision is left to the client, the confi

Re: TLS authentication for ldap

2013-09-23 Thread espeake
From: Viktor Dukhovni To: "openssl-users@openssl.org" Date: 09/23/2013 10:10 AM Subject:Re: TLS authentication for ldap Sent by:owner-openssl-us...@openssl.org On Mon, Sep 23, 2013 at 10:54:04AM -0400, Salz, Rich wrote: > > Another option is to use LDAP's "STARTTLS"

TLS authentication for ldap

2013-09-23 Thread espeake
We are trying to put in place a high availability instance of openLDAP using a 3-node n-way multi master setup. I can telnet to our instance and each individual node through ports 389 and 636. I can use the showcerts command on port 636 and see the certs but wheh I try to do this on port 389 to