Kyle,
Thanks for the reply. It was certificate issue. After I was able to line
the correct certs with the correct key it started working as advertised.
Thank you,
Eric Speake
Web Systems Administrator
O'Reilly Auto Parts
(417) 862-2674 Ext. 1975
From: Kyle Hamilton
To: openssl-users
I have an ubuntu 14.04 with openssl 1.0.1f-1ubuntu2.3 server running and a
another server connecting as the client with ubuntu 12.04 with openssl
1.0.1-4ubuntu5.16. I am getting an error about the TLS handshake failing
i/o timeout. I have tried using our internal wildcard certs on both
servers s
Thanks.
Eric Speake
Web Systems Administrator
O'Reilly Auto Parts
(417) 862-2674 Ext. 1975
From: Viktor Dukhovni
To: openssl-users@openssl.org, owner-openssl-us...@openssl.org
Date: 02/17/2014 02:44 PM
Subject:Re: CA cert issue
Sent by:owner-openssl-us...@openssl.org
The applications use data connection pools to connect to the iSeries
servers we use. Allof the connections use hibernate
(.hibernate.connection.url=jdbc:as400://;;;
In the options we add secure=true.
The CAcert we have is the root cert and if I use the openSSL command to use
the actual file I g
Viktor,
I have tried the c_rehash /etc/ssl/certs and that did not help the
situation. I had seen that in a bug post and tried it.
How can I make sure that openssl is usin g the /etc/ssl/certs folder to
search for the ca certificate?
Thanks,
Eric Speake
Web Systems Administrator
O'Reilly Auto Pa
I have a server that has a certificate that is sign by an internal
certificate authority. I have the cert for this CA installed on my
application server. If I run the following every thing works.
openssl s_client -state -nbio -connect host:9471
-CAfile /etc/ssl/certs/.pem 2>&1
This:
openssl s
From: Viktor Dukhovni
To: "openssl-users@openssl.org"
Date: 09/23/2013 10:40 AM
Subject:Re: TLS authentication for ldap
Sent by:owner-openssl-us...@openssl.org
On Mon, Sep 23, 2013 at 11:27:06AM -0400, Salz, Rich wrote:
> > Note, the above is for enforcing STARTTLS
From: "Salz, Rich"
To: "openssl-users@openssl.org"
Date: 09/23/2013 10:29 AM
Subject:RE: TLS authentication for ldap
Sent by:owner-openssl-us...@openssl.org
> Note, the above is for enforcing STARTTLS on the server. If the
> decision is left to the client, the confi
From: Viktor Dukhovni
To: "openssl-users@openssl.org"
Date: 09/23/2013 10:10 AM
Subject:Re: TLS authentication for ldap
Sent by:owner-openssl-us...@openssl.org
On Mon, Sep 23, 2013 at 10:54:04AM -0400, Salz, Rich wrote:
> > Another option is to use LDAP's "STARTTLS"
We are trying to put in place a high availability instance of openLDAP
using a 3-node n-way multi master setup. I can telnet to our instance and
each individual node through ports 389 and 636. I can use the showcerts
command on port 636 and see the certs but wheh I try to do this on port
389 to
10 matches
Mail list logo