OK, got it this time -- thanks.
On Fri, 05 May 2017 15:59:38 -0400,
Daniel wrote:
>
> [1 ]
> [2 ]
> Here is a longer lasting pastebin site:
>
> https://apaste.info/IfgP
>
> 2017-05-05 21:51 GMT+02:00 John Covici :
>
> Thanks a lot. Unfortunately, it says the page has been removed or
> expi
Here is a longer lasting pastebin site:
https://apaste.info/IfgP
2017-05-05 21:51 GMT+02:00 John Covici :
> Thanks a lot. Unfortunately, it says the page has been removed or
> expired.
>
> On Fri, 05 May 2017 11:29:25 -0400,
> Daniel wrote:
> >
> > [1 ]
> > [2 ]
> > John,
> >
> > My apologies
Thanks a lot. Unfortunately, it says the page has been removed or
expired.
On Fri, 05 May 2017 11:29:25 -0400,
Daniel wrote:
>
> [1 ]
> [2 ]
> John,
>
> My apologies, these two past weeks Ive been distracted with so many things I
> forgot about this one completely.
>
> I will share my whole
Just tried and still get the error (20).
On 5/5/2017 8:02 AM, rwebb wrote:
Have you tried setting the verify depth to 2? That way you hit the
intermediate and root CA certs in the chain.
On Fri, 05/05/2017 01.58, Doug Maurer wrote:
We have a setup where we have to use MIL CAC's to acc
John,
My apologies, these two past weeks Ive been distracted with so many things
I forgot about this one completely.
I will share my whole config in case it can inspire or help you to
compensate my utter distraction.
First the whole virtualhost, second you will see the fpm pool.
https://hastebi
Thanks for the prompt response.
On 3 May 2017 at 13:55, Ramsey, Robert L wrote:
> This is just my non-apache two cents.
>
Yes, I realise it might not be an Apache problem.
But it did start appearing around the time yum gave us a new version of
Apache...
> - Is your js loaded after a
On Fri, May 5, 2017 at 8:53 AM, Chunduru, Krishnachaithanya
wrote:
> But I read like Apache version 2.2 with openssl 0.98 onwards we have support
> for TLSv1.2, I'm currently running Apache V2.4.10 with Openssl 1.2.1000
> version.
Shrug. My opinion is that your build is a dead end. I'd invest
Hi Eric,
But I read like Apache version 2.2 with openssl 0.98 onwards we have support
for TLSv1.2, I'm currently running Apache V2.4.10 with Openssl 1.2.1000 version.
Regards,
Krishna
-Original Message-
From: Eric Covener [mailto:cove...@gmail.com]
Sent: Friday, May 05, 2017 6:12 PM
To
Thanks for your response!
I got some php error_logs by enabling the display of
php_startup_errors and it was dying in set_execution_time. Do you
have any idea why this would happen?
On Fri, 05 May 2017 03:57:24 -0400,
Luca Toscano wrote:
>
> [1 ]
> [2 ]
> Hi John,
>
> can you share with us
On Fri, May 5, 2017 at 8:36 AM, Chunduru, Krishnachaithanya
wrote:
> [Fri May 05 08:31:01.164912 2017] [ssl:emerg] [pid 11731186:tid 1] AH02231:
> No SSL protocols available [hint: SSLProtocol]
Seems like yet another hing your antiquated httpd release wasn't built
against an openssl that had tlsv
Hi Luca,
Can you please let me know what details do you require for the below.
I’m using the below syntax to block the SSLv2 and V3.
SSLProtocol all -SSLv2 -SSLv3 and below is the log for it after starting the
apache. Please let me know if this information is sufficient to proceed further.
[Fr
Have you tried setting the verify depth to 2? That way you hit the
intermediate and root CA certs in the chain.
On Fri, 05/05/2017 01.58, Doug Maurer wrote:
>
We have a setup where we have to use MIL CAC's to access our site. It
> currently works with SSLVerifyClient require and SSLVerifyDepth
There is no relevant error there, only a warning because you are using a
self-signed server certificate.
Can you describe *fully* which error you are having that is causing you
problems?
If you refer to an error of your browser complaining about your
certificate, then this is normal when using se
Hi John,
can you share with us your error log (redacting IPs and personal info) so
we can check as well?
Otherwise I'd suggest to reach out to the #httpd Freenode IRC channel more
a quicker response, there are a lot of people in there that might help you.
Luca
2017-05-04 19:33 GMT+02:00 John Co
14 matches
Mail list logo