I was only able to read the Subject line and nothing further so take with
grain of salt

Here is the procedure I made  a while ago for differ finding but the only
change in it would be the ciphers I imagine.
 The following files control the ciphers in use

        DirSrv /etc/dirsrv/slapd-REALM-LOCAL/dse.ldif

        PKISrv /etc/dirsrv/slapd-PKI-IPA/dse.ldif



42873  SSL Medium Strength Cipher Suites Supported  Port 389/636

Mitigation:

1. Log onto IPA server.  Using  nmap command below to see the list of
ciphers being used.  Bold print shows the medium ciphers that need to be
removed.

2. [bobsyouruncle@IPASERVER ~]#  nmap --script ssl-enum-ciphers -p 636
`hostname`



Starting Nmap 5.51 ( http://nmap.org ) at 2017-01-30 16:08 EST

Nmap scan report for  (10.x.x.x

Host is up (0.00014s latency).

PORT    STATE SERVICE

636/tcp open  ldapssl

| ssl-enum-ciphers:

|   TLSv1.2

|     Ciphers (17)

|       SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA

|       TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA

|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA

|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256

|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256

|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA

|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256

|       TLS_DHE_RSA_WITH_DES_CBC_SHA

|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA

|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256

|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA

|       TLS_RSA_WITH_3DES_EDE_CBC_SHA

|       TLS_RSA_WITH_AES_128_CBC_SHA

|       TLS_RSA_WITH_AES_128_CBC_SHA256

|       TLS_RSA_WITH_AES_128_GCM_SHA256

|       TLS_RSA_WITH_AES_256_CBC_SHA

|       TLS_RSA_WITH_AES_256_CBC_SHA256

|     Compressors (1)

|_      uncompressed

3. Stop the ipa server with Ipactl stop

4.  The following files control the ciphers in use

        DirSrv /etc/dirsrv/slapd-REALM-LOCAL/dse.ldif

        PKISrv /etc/dirsrv/slapd-PKI-IPA/dse.ldif

        Make copies of the files before modifying with

cp /etc/dirsrv/slapd-PKI-IPA/dse.ldif /etc/dirsrv/slapd-PKI-IPA/dse.ldif.$
(date '+%F')

cp /etc/dirsrv/slapd-WATSON-LOCAL/dse.ldif 
/etc/dirsrv/slapd-REALM-LOCAL/dse.ldif
$(date '+%F')

5.  vim /etc/dirsrv/slapd-REALM-LOCAL/dse.ldif

        and ensure it reads the below where you change a few + to – and add ,
-dhe_rsa_3des_sha. The listings required to be modified are in bold.  The
correct config is shown below:



nsSSL3Ciphers:
-rsa_null_md5,-rsa_rc4_128_md5,-rsa_rc4_40_md5,-rsa_rc2_40_md5,

 -rsa_des_sha,-rsa_fips_des_sha,-rsa_3des_sha,-rsa_fips_3des_sha
,-fortezza,-fo


rtezza_rc4_128_sha,-fortezza_null,-tls_rsa_export1024_with_rc4_56_sha,-tls_rs

 a_export1024_with_des_cbc_sha,-rsa_rc4_128_sha,
-dhe_rsa_3des_sha.-dhe_rsa_des_sha





6.  vim /etc/dirsrv/slapd-PKI-IPA/dse.ldif

        and ensure it reads the below where you change a few + to -.  The
listings required to change are modified in bold.  The correct config is
shown.

nsSSL3Ciphers: -rsa_3des_sha,-rsa_fips_3des_sha,-rsa_rc4_128_sha

7.  Restart IPA ipactl start and play close attention to the start-up
ensuring no errors.

8.  Run Nmap again and ensure listing is no longer showing triple des
ciphers. nmap --script ssl-enum-ciphers -p 636 `hostname`

Starting Nmap 5.51 ( http://nmap.org ) at 2017-01-30 16:40 EST

Nmap scan report for(10.x.x.x.

Host is up (0.000030s latency).

PORT    STATE SERVICE

636/tcp open  ldapssl

| ssl-enum-ciphers:

|   TLSv1.2

|     Ciphers (14)

|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA

|       TLS_DHE_RSA_WITH_AES_128_CBC_SHA256

|       TLS_DHE_RSA_WITH_AES_128_GCM_SHA256

|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA

|       TLS_DHE_RSA_WITH_AES_256_CBC_SHA256

|       TLS_DHE_RSA_WITH_DES_CBC_SHA

|       TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA

|       TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256

|       TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA

|       TLS_RSA_WITH_AES_128_CBC_SHA

|       TLS_RSA_WITH_AES_128_CBC_SHA256

|       TLS_RSA_WITH_AES_128_GCM_SHA256

|       TLS_RSA_WITH_AES_256_CBC_SHA

|       TLS_RSA_WITH_AES_256_CBC_SHA256

|     Compressors (1)

|_      uncompressed

9.  You now have 13 of the original 17 ciphers being used and no more
triple DES

10. 389 Dirsrv cipher listings can be found here:
http://www.port389.org/docs/389ds/design/nss-cipher-design.html






Sean Hogan










From:   Florence Blanc-Renaud via FreeIPA-users
            <freeipa-users@lists.fedorahosted.org>
To:     FreeIPA users list <freeipa-users@lists.fedorahosted.org>
Cc:     Terry Soucy <tso...@salesforce.com>, Mauricio Tavares
            <raubvo...@gmail.com>, Florence Blanc-Renaud <f...@redhat.com>
Date:   01/14/2020 09:13 AM
Subject:        [EXTERNAL] [Freeipa-users] Re: Disable SSLv3 and RC4 ciphers on
            ipa-server 3.0.0



On 1/14/20 12:54 PM, Terry Soucy via FreeIPA-users wrote:
> I've tried both parameters
>
> .. sslProtocols = "TLSv1.2,TLSv1.1,TLSv1"
> .. sslEnabledProtocols="TLSv1,TLSv1.1,TLSv1.2"
>
> and I receive the same results. I'm able to connect with openssl
> s_client connect ipa001.local:9443 -ssl3. I've even specifically
> disabled the cipher that is negotiated in the connection, but it doesn't
> appear that what I'm trying works.
>
In my conf I also have strictCiphers="true" and it seems to make a
difference. See
https://urldefense.proofpoint.com/v2/url?u=https-3A__www.dogtagpki.org_wiki_Tomcat-5FJSS-5F7.3-5FConfiguration&d=DwIGaQ&c=jf_iaSHvJObTbx-siA1ZOg&r=pAvZgCz4zBPNXNWPu8dLOYdmUIAP7pySuYQoq4H7yUs&m=ik3ORtfD7bR3ZrL2Z2vZW05b_Ixl2rMhd3jnqt4cwX4&s=SaAQxjW3qx50yuDKWTjrIAjjf5n1OKbeWOnMFCYcJAw&e=
  which says:
-----8<-----
strictCiphers:
     This parameter determines whether to disable the NSS default
ciphers. If it's set to true, the NSS default ciphers will be disabled,
and only the ciphers specified in sslRangeCiphers will be enabled. If
it's set to false, the NSS default ciphers will remain enabled in
addition to the ciphers specified in sslRangeCiphers. By default it's
false.
----->8-----

Don't forget to restart pki after you edit server.xml
flo
> ssl3Ciphers="-DHE-RSA-AES256-SHA"
>
> # openssl s_client -connect en3021s.dev.ca1.sfmc.co:9443
> <
https://urldefense.proofpoint.com/v2/url?u=http-3A__en3021s.dev.ca1.sfmc.co-3A9443&d=DwIGaQ&c=jf_iaSHvJObTbx-siA1ZOg&r=pAvZgCz4zBPNXNWPu8dLOYdmUIAP7pySuYQoq4H7yUs&m=ik3ORtfD7bR3ZrL2Z2vZW05b_Ixl2rMhd3jnqt4cwX4&s=UsFmfu84deUf78WSSjohqe_2bgbosJY1W94sPP5_5Lg&e=
 > -ssl3
> ...
> Server Temp Key: DH, 2048 bits
> ---
> SSL handshake has read 2763 bytes and written 349 bytes
> ---
> New, TLSv1/SSLv3, Cipher is DHE-RSA-AES256-SHA
> Server public key is 2048 bit
> Secure Renegotiation IS supported
> Compression: NONE
> Expansion: NONE
> No ALPN negotiated
> SSL-Session:
>      Protocol  : SSLv3
>      Cipher    : DHE-RSA-AES256-SHA
> ...
>
> I've even tried setting JAVA_HOME in /etc/pki-cad/tomcat6.conf to my
> openjdk7 install, thinking that maybe it was a java thing, but the same
> issue arises. I'm out of ideas, other than to try to upgrade to a newer
> version of freeipa server, and subsequently tomcat, which is a task I'm
> not looking forward to.
>
> Terry
>
>
>
>
> On Tue, Jan 14, 2020 at 7:20 AM Florence Blanc-Renaud via FreeIPA-users
> <freeipa-users@lists.fedorahosted.org
> <mailto:freeipa-users@lists.fedorahosted.org>> wrote:
>
>     On 1/14/20 11:58 AM, Mauricio Tavares via FreeIPA-users wrote:
>      > On Tue, Jan 14, 2020 at 4:16 AM Florence Blanc-Renaud via
>      > FreeIPA-users <freeipa-users@lists.fedorahosted.org
>     <mailto:freeipa-users@lists.fedorahosted.org>> wrote:
>      >>
>      >> On 1/13/20 8:38 PM, Terry Soucy via FreeIPA-users wrote:
>      >>> We are running FreeIPA 3.0.0 on CentOS 6 (directly from the OS
>      >>> repository). I am having trouble disabling SSL3 and RC4 ciphers
>     on port
>      >>> 9443 (pki-cad)
>      >>>
>      >>> ipa-server-3.0.0
>      >>> tomcat6-6.0.24
>      >>>
>      >>> I've been modifying /etc/pki-ca/server.xml with little success.
>     What am
>      >>> I missing? I've been banging my head on this for the past week.
>      >>>
>      >>>       <Connector name="Agent" port="9443" protocol="HTTP/1.1"
>      >>> SSLEnabled="true" sslEnabledProtocols="TLSv1,TLSv1.1,TLSv1.2"
>      >>
>      >> I believe the correct parameter name is sslProtocols="...", not
>      >> sslEnabledProtocols, in this version of tomcat.
>      >> flo
>      >>
>      >
>      >        If we take a look at the latest
>      > (
https://urldefense.proofpoint.com/v2/url?u=https-3A__tomcat.apache.org_tomcat-2D9.0-2Ddoc_config_http.html&d=DwIGaQ&c=jf_iaSHvJObTbx-siA1ZOg&r=pAvZgCz4zBPNXNWPu8dLOYdmUIAP7pySuYQoq4H7yUs&m=ik3ORtfD7bR3ZrL2Z2vZW05b_Ixl2rMhd3jnqt4cwX4&s=iBLDd3MdR7f6UOK-t5ahu_XASjI1dxiqd6xcros92JM&e=
 ) docs, it
>      > says sslEnabledProtocols is an alias to the protocols entry in
>      > SSLHostConfig
>     (
https://urldefense.proofpoint.com/v2/url?u=https-3A__tomcat.apache.org_tomcat-2D9.0-2Ddoc_config_http.html-23SSL-5FSupport-5F-2D-5FSSLHostConfig&d=DwIGaQ&c=jf_iaSHvJObTbx-siA1ZOg&r=pAvZgCz4zBPNXNWPu8dLOYdmUIAP7pySuYQoq4H7yUs&m=ik3ORtfD7bR3ZrL2Z2vZW05b_Ixl2rMhd3jnqt4cwX4&s=5KGVLn3t-mS2NgnoX3tSoYoRNzmK0N43DLHlVxsJX9k&e=
 ),
>     Hi,
>     Terry stated that he is using ipa-server-3.0.0 with tomcat6-6.0.24.
>
https://urldefense.proofpoint.com/v2/url?u=https-3A__access.redhat.com_solutions_1232233&d=DwIGaQ&c=jf_iaSHvJObTbx-siA1ZOg&r=pAvZgCz4zBPNXNWPu8dLOYdmUIAP7pySuYQoq4H7yUs&m=ik3ORtfD7bR3ZrL2Z2vZW05b_Ixl2rMhd3jnqt4cwX4&s=PBER-hfQUAFbLMAJ0bj8KWKiige7BtTJLC59S1O21qM&e=
  mentions that for this
>     version the value  sslProtocols = "TLSv1,TLSv1.1,TLSv1.2" should be
>     used. For Tomcat 6 (6.0.38 and later) and 7,
>     sslEnabledProtocols="TLSv1,TLSv1.1,TLSv1.2" can be used.
>
>     flo
>      > which specifically lists
>      >
>      > SSLv2Hello
>      > SSLv3
>      > TLSv1
>      > TLSv1.1
>      > TLSv1.2
>      > TLSv1.3
>      > all
>      >
>      > as valid entries. I will agree that the explanation of sslProtocol
is
>      > kinda confusing because it kinda implies it is "the protocol(s) to
>      > use," with TLS as the default. Maybe the subtle difference is that
>      > sslEnabledProtocols is the list of "protocols to support when
>      > *communicating with clients*" the latter part is what
differentiates
>      > it. In any case, in my ancient notes I seem to explicitly define
both
>      > (was the order in sslEnabledProtocols important?):
>      >
>      >      <Connector port="443" protocol="HTTP/1.1" SSLEnabled="true"
>      >                 maxThreads="150" scheme="https" secure="true"
>      >                 keystoreFile="/usr/share/tomcat/keystore"
>      >                 keystorePass="password1" keyAlias="tomcat"
>      >                 clientAuth="false"
>      >                 sslProtocol="TLS"
>     sslEnabledProtocols="TLSv1.2,TLSv1.1,TLSv1"
>      >                 />
>      >
>      >
>      >>> scheme="https" secure="true"
>      >>>                  maxHttpHeaderSize="8192"
>      >>>                  acceptCount="100" maxThreads="150"
>     minSpareThreads="25"
>      >>> maxSpareThreads="75"
>      >>>                  enableLookups="false"
disableUploadTimeout="true"
>      >>>
>      >>>
>     SSLImplementation="org.apache.tomcat.util.net.jss.JSSImplementation"
>      >>>                  enableOCSP="false"
>      >>>
>     ocspResponderURL="
https://urldefense.proofpoint.com/v2/url?u=http-3A__ipa001.local-3A9080_ca_ocsp&d=DwIGaQ&c=jf_iaSHvJObTbx-siA1ZOg&r=pAvZgCz4zBPNXNWPu8dLOYdmUIAP7pySuYQoq4H7yUs&m=ik3ORtfD7bR3ZrL2Z2vZW05b_Ixl2rMhd3jnqt4cwX4&s=o-Nw0vVYcjpXdVbE4GIzB0lofSfPIoNUC1WBrY3z6n8&e=
 "
>      >>>                  ocspResponderCertNickname="ocspSigningCert
>     cert-pki-ca"
>      >>>                  ocspCacheSize="1000"
>      >>>                  ocspMinCacheEntryDuration="60"
>      >>>                  ocspMaxCacheEntryDuration="120"
>      >>>                  ocspTimeout="10"
>      >>>                  clientAuth="true"
>      >>>                  sslOptions="ssl2=false,ssl3=false,tls=true"
>      >>>
>      >>>
>
tls3Ciphers="-SSL3_FORTEZZA_DMS_WITH_NULL_SHA,-SSL3_FORTEZZA_DMS_WITH_RC4_128_SHA,-SSL3_RSA_WITH_RC4_128_SHA,-SSL3_RSA_EXPORT_WITH_RC4_40_MD5,-SSL3_RSA_WITH_3DES_EDE_CBC_SHA,-SSL3_RSA_WITH_DES_CBC_SHA,-SSL3_RSA_EXPORT_WITH_RC2_CBC_40_MD5,-SSL3_FORTEZZA_DMS_WITH_FORTEZZA_CBC_SHA,-SSL_RSA_FIPS_WITH_DES_CBC_SHA,-SSL_RSA_FIPS_WITH_3DES_EDE_CBC_SHA,-SSL3_RSA_WITH_NULL_MD5,-TLS_RSA_EXPORT1024_WITH_RC4_56_SHA,-TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA,+TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,-EDH-RSA-DES-CBC3-SHA,-DES-CBC3-SHA"

>      >>>                  sslVersionRangeStream="tls1_1:tls1_2"
>      >>>                  sslVersionRangeDatagram="tls1_1:tls1_2"
>      >>>
>      >>>
>
sslRangeCiphers="-TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA,-TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA,+TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA,+TLS_ECDH_RSA_WITH_AES_128_CBC_SHA,+TLS_ECDH_RSA_WITH_AES_256_CBC_SHA,-TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA,+TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA,+TLS_RSA_WITH_3DES_EDE_CBC_SHA,+TLS_RSA_WITH_AES_128_CBC_SHA,+TLS_RSA_WITH_AES_256_CBC_SHA,+TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA,+TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA,-TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA,-TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,-TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA,+TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA,+TLS_DHE_DSS_WITH_AES_128_CBC_SHA,+TLS_DHE_DSS_WITH_AES_256_CBC_SHA,+TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA,+TLS_DHE_RSA_WITH_AES_128_CBC_SHA,+TLS_DHE_RSA_WITH_AES_256_CBC_SHA,+TLS_DHE_RSA_WITH_AES_128_CBC_SHA256,+TLS_DHE_RSA_WITH_AES_256_CBC_SHA256,+TLS_RSA_WITH_AES_128_CBC_SHA256,+TLS_RSA_WITH_AES_256_CBC_SHA256,+TLS_RSA_WITH_AES_128_GCM_SHA256,+TLS_DHE_RSA_WITH_AES_128_GCM_SHA256,+TLS_DHE_DSS_WITH_AES_128_GCM_SHA256,+TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,+TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,+TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,+TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256,+TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,+TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256"

>      >>>
>      >>>
>      >>>    serverCertNickFile="/var/lib/pki-ca/conf/serverCertNick.conf"
>      >>>
passwordFile="/var/lib/pki-ca/conf/password.conf"
>      >>>
>      >>>
passwordClass="org.apache.tomcat.util.net.jss.PlainPasswordFile"
>      >>>                  certdbDir="/var/lib/pki-ca/alias"
>      >>>                  />
>      >>>
>      >>> --
>      >>> Terry Soucy
>      >>> Systems Engineering Lead | Salesforce
>      >>> Mobile: +1.506.609.3247
>      >>>
>      >>>
>      >>> <http://smart.salesforce.com/sig/tsoucy//ca_mb/default/link.html
>
>      >>>
>      >>> _______________________________________________
>      >>> FreeIPA-users mailing list --
>     freeipa-users@lists.fedorahosted.org
>     <mailto:freeipa-users@lists.fedorahosted.org>
>      >>> To unsubscribe send an email to
>     freeipa-users-le...@lists.fedorahosted.org
>     <mailto:freeipa-users-le...@lists.fedorahosted.org>
>      >>> Fedora Code of Conduct:
>
https://urldefense.proofpoint.com/v2/url?u=https-3A__docs.fedoraproject.org_en-2DUS_project_code-2Dof-2Dconduct_&d=DwIGaQ&c=jf_iaSHvJObTbx-siA1ZOg&r=pAvZgCz4zBPNXNWPu8dLOYdmUIAP7pySuYQoq4H7yUs&m=ik3ORtfD7bR3ZrL2Z2vZW05b_Ixl2rMhd3jnqt4cwX4&s=13Z4XmUp0YKRtcFfAe7JFsd5BEt-NcvFpxp3weLO-Kg&e=

>      >>> List Guidelines:
>
https://urldefense.proofpoint.com/v2/url?u=https-3A__fedoraproject.org_wiki_Mailing-5Flist-5Fguidelines&d=DwIGaQ&c=jf_iaSHvJObTbx-siA1ZOg&r=pAvZgCz4zBPNXNWPu8dLOYdmUIAP7pySuYQoq4H7yUs&m=ik3ORtfD7bR3ZrL2Z2vZW05b_Ixl2rMhd3jnqt4cwX4&s=MuSpMY52Rk_2YkJ6LoelS4jyLr28R4uG4v9Ps5WbHrY&e=

>      >>> List Archives:
>
https://urldefense.proofpoint.com/v2/url?u=https-3A__lists.fedorahosted.org_archives_list_freeipa-2Dusers-40lists.fedorahosted.org&d=DwIGaQ&c=jf_iaSHvJObTbx-siA1ZOg&r=pAvZgCz4zBPNXNWPu8dLOYdmUIAP7pySuYQoq4H7yUs&m=ik3ORtfD7bR3ZrL2Z2vZW05b_Ixl2rMhd3jnqt4cwX4&s=OvkC8UpE1G13vNUusL-IdAVCxBHTdR3ea28eqCQWROo&e=

>      >>>
>      >>
>      >> _______________________________________________
>      >> FreeIPA-users mailing list --
>     freeipa-users@lists.fedorahosted.org
>     <mailto:freeipa-users@lists.fedorahosted.org>
>      >> To unsubscribe send an email to
>     freeipa-users-le...@lists.fedorahosted.org
>     <mailto:freeipa-users-le...@lists.fedorahosted.org>
>      >> Fedora Code of Conduct:
>
https://urldefense.proofpoint.com/v2/url?u=https-3A__docs.fedoraproject.org_en-2DUS_project_code-2Dof-2Dconduct_&d=DwIGaQ&c=jf_iaSHvJObTbx-siA1ZOg&r=pAvZgCz4zBPNXNWPu8dLOYdmUIAP7pySuYQoq4H7yUs&m=ik3ORtfD7bR3ZrL2Z2vZW05b_Ixl2rMhd3jnqt4cwX4&s=13Z4XmUp0YKRtcFfAe7JFsd5BEt-NcvFpxp3weLO-Kg&e=

>      >> List Guidelines:
>
https://urldefense.proofpoint.com/v2/url?u=https-3A__fedoraproject.org_wiki_Mailing-5Flist-5Fguidelines&d=DwIGaQ&c=jf_iaSHvJObTbx-siA1ZOg&r=pAvZgCz4zBPNXNWPu8dLOYdmUIAP7pySuYQoq4H7yUs&m=ik3ORtfD7bR3ZrL2Z2vZW05b_Ixl2rMhd3jnqt4cwX4&s=MuSpMY52Rk_2YkJ6LoelS4jyLr28R4uG4v9Ps5WbHrY&e=

>      >> List Archives:
>
https://urldefense.proofpoint.com/v2/url?u=https-3A__lists.fedorahosted.org_archives_list_freeipa-2Dusers-40lists.fedorahosted.org&d=DwIGaQ&c=jf_iaSHvJObTbx-siA1ZOg&r=pAvZgCz4zBPNXNWPu8dLOYdmUIAP7pySuYQoq4H7yUs&m=ik3ORtfD7bR3ZrL2Z2vZW05b_Ixl2rMhd3jnqt4cwX4&s=OvkC8UpE1G13vNUusL-IdAVCxBHTdR3ea28eqCQWROo&e=

>      > _______________________________________________
>      > FreeIPA-users mailing list --
>     freeipa-users@lists.fedorahosted.org
>     <mailto:freeipa-users@lists.fedorahosted.org>
>      > To unsubscribe send an email to
>     freeipa-users-le...@lists.fedorahosted.org
>     <mailto:freeipa-users-le...@lists.fedorahosted.org>
>      > Fedora Code of Conduct:
>
https://urldefense.proofpoint.com/v2/url?u=https-3A__docs.fedoraproject.org_en-2DUS_project_code-2Dof-2Dconduct_&d=DwIGaQ&c=jf_iaSHvJObTbx-siA1ZOg&r=pAvZgCz4zBPNXNWPu8dLOYdmUIAP7pySuYQoq4H7yUs&m=ik3ORtfD7bR3ZrL2Z2vZW05b_Ixl2rMhd3jnqt4cwX4&s=13Z4XmUp0YKRtcFfAe7JFsd5BEt-NcvFpxp3weLO-Kg&e=

>      > List Guidelines:
>
https://urldefense.proofpoint.com/v2/url?u=https-3A__fedoraproject.org_wiki_Mailing-5Flist-5Fguidelines&d=DwIGaQ&c=jf_iaSHvJObTbx-siA1ZOg&r=pAvZgCz4zBPNXNWPu8dLOYdmUIAP7pySuYQoq4H7yUs&m=ik3ORtfD7bR3ZrL2Z2vZW05b_Ixl2rMhd3jnqt4cwX4&s=MuSpMY52Rk_2YkJ6LoelS4jyLr28R4uG4v9Ps5WbHrY&e=

>      > List Archives:
>
https://urldefense.proofpoint.com/v2/url?u=https-3A__lists.fedorahosted.org_archives_list_freeipa-2Dusers-40lists.fedorahosted.org&d=DwIGaQ&c=jf_iaSHvJObTbx-siA1ZOg&r=pAvZgCz4zBPNXNWPu8dLOYdmUIAP7pySuYQoq4H7yUs&m=ik3ORtfD7bR3ZrL2Z2vZW05b_Ixl2rMhd3jnqt4cwX4&s=OvkC8UpE1G13vNUusL-IdAVCxBHTdR3ea28eqCQWROo&e=

>      >
>
>     _______________________________________________
>     FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
>     <mailto:freeipa-users@lists.fedorahosted.org>
>     To unsubscribe send an email to
>     freeipa-users-le...@lists.fedorahosted.org
>     <mailto:freeipa-users-le...@lists.fedorahosted.org>
>     Fedora Code of Conduct:
>
https://urldefense.proofpoint.com/v2/url?u=https-3A__docs.fedoraproject.org_en-2DUS_project_code-2Dof-2Dconduct_&d=DwIGaQ&c=jf_iaSHvJObTbx-siA1ZOg&r=pAvZgCz4zBPNXNWPu8dLOYdmUIAP7pySuYQoq4H7yUs&m=ik3ORtfD7bR3ZrL2Z2vZW05b_Ixl2rMhd3jnqt4cwX4&s=13Z4XmUp0YKRtcFfAe7JFsd5BEt-NcvFpxp3weLO-Kg&e=

>     List Guidelines:
https://urldefense.proofpoint.com/v2/url?u=https-3A__fedoraproject.org_wiki_Mailing-5Flist-5Fguidelines&d=DwIGaQ&c=jf_iaSHvJObTbx-siA1ZOg&r=pAvZgCz4zBPNXNWPu8dLOYdmUIAP7pySuYQoq4H7yUs&m=ik3ORtfD7bR3ZrL2Z2vZW05b_Ixl2rMhd3jnqt4cwX4&s=MuSpMY52Rk_2YkJ6LoelS4jyLr28R4uG4v9Ps5WbHrY&e=

>     List Archives:
>
https://urldefense.proofpoint.com/v2/url?u=https-3A__lists.fedorahosted.org_archives_list_freeipa-2Dusers-40lists.fedorahosted.org&d=DwIGaQ&c=jf_iaSHvJObTbx-siA1ZOg&r=pAvZgCz4zBPNXNWPu8dLOYdmUIAP7pySuYQoq4H7yUs&m=ik3ORtfD7bR3ZrL2Z2vZW05b_Ixl2rMhd3jnqt4cwX4&s=OvkC8UpE1G13vNUusL-IdAVCxBHTdR3ea28eqCQWROo&e=

>
>
>
> --
> Terry Soucy
> Systems Engineering Lead | Salesforce
> Mobile: +1.506.609.3247
>
>
> <http://smart.salesforce.com/sig/tsoucy//ca_mb/default/link.html>
>
> _______________________________________________
> FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
> To unsubscribe send an email to
freeipa-users-le...@lists.fedorahosted.org
> Fedora Code of Conduct:
https://urldefense.proofpoint.com/v2/url?u=https-3A__docs.fedoraproject.org_en-2DUS_project_code-2Dof-2Dconduct_&d=DwIGaQ&c=jf_iaSHvJObTbx-siA1ZOg&r=pAvZgCz4zBPNXNWPu8dLOYdmUIAP7pySuYQoq4H7yUs&m=ik3ORtfD7bR3ZrL2Z2vZW05b_Ixl2rMhd3jnqt4cwX4&s=13Z4XmUp0YKRtcFfAe7JFsd5BEt-NcvFpxp3weLO-Kg&e=

> List Guidelines:
https://urldefense.proofpoint.com/v2/url?u=https-3A__fedoraproject.org_wiki_Mailing-5Flist-5Fguidelines&d=DwIGaQ&c=jf_iaSHvJObTbx-siA1ZOg&r=pAvZgCz4zBPNXNWPu8dLOYdmUIAP7pySuYQoq4H7yUs&m=ik3ORtfD7bR3ZrL2Z2vZW05b_Ixl2rMhd3jnqt4cwX4&s=MuSpMY52Rk_2YkJ6LoelS4jyLr28R4uG4v9Ps5WbHrY&e=

> List Archives:
https://urldefense.proofpoint.com/v2/url?u=https-3A__lists.fedorahosted.org_archives_list_freeipa-2Dusers-40lists.fedorahosted.org&d=DwIGaQ&c=jf_iaSHvJObTbx-siA1ZOg&r=pAvZgCz4zBPNXNWPu8dLOYdmUIAP7pySuYQoq4H7yUs&m=ik3ORtfD7bR3ZrL2Z2vZW05b_Ixl2rMhd3jnqt4cwX4&s=OvkC8UpE1G13vNUusL-IdAVCxBHTdR3ea28eqCQWROo&e=

>

_______________________________________________
FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org
Fedora Code of Conduct:
https://urldefense.proofpoint.com/v2/url?u=https-3A__docs.fedoraproject.org_en-2DUS_project_code-2Dof-2Dconduct_&d=DwIGaQ&c=jf_iaSHvJObTbx-siA1ZOg&r=pAvZgCz4zBPNXNWPu8dLOYdmUIAP7pySuYQoq4H7yUs&m=ik3ORtfD7bR3ZrL2Z2vZW05b_Ixl2rMhd3jnqt4cwX4&s=13Z4XmUp0YKRtcFfAe7JFsd5BEt-NcvFpxp3weLO-Kg&e=

List Guidelines:
https://urldefense.proofpoint.com/v2/url?u=https-3A__fedoraproject.org_wiki_Mailing-5Flist-5Fguidelines&d=DwIGaQ&c=jf_iaSHvJObTbx-siA1ZOg&r=pAvZgCz4zBPNXNWPu8dLOYdmUIAP7pySuYQoq4H7yUs&m=ik3ORtfD7bR3ZrL2Z2vZW05b_Ixl2rMhd3jnqt4cwX4&s=MuSpMY52Rk_2YkJ6LoelS4jyLr28R4uG4v9Ps5WbHrY&e=

List Archives:
https://urldefense.proofpoint.com/v2/url?u=https-3A__lists.fedorahosted.org_archives_list_freeipa-2Dusers-40lists.fedorahosted.org&d=DwIGaQ&c=jf_iaSHvJObTbx-siA1ZOg&r=pAvZgCz4zBPNXNWPu8dLOYdmUIAP7pySuYQoq4H7yUs&m=ik3ORtfD7bR3ZrL2Z2vZW05b_Ixl2rMhd3jnqt4cwX4&s=OvkC8UpE1G13vNUusL-IdAVCxBHTdR3ea28eqCQWROo&e=




_______________________________________________
FreeIPA-users mailing list -- freeipa-users@lists.fedorahosted.org
To unsubscribe send an email to freeipa-users-le...@lists.fedorahosted.org
Fedora Code of Conduct: 
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: 
https://lists.fedorahosted.org/archives/list/freeipa-users@lists.fedorahosted.org

Reply via email to