I do "pkg install openssl" that works ok.
But from that point I get 2 different messages at port make time
depending on the port being installed.
/usr/ports/sysutils/qjail >make install clean
/!\ WARNING /!\
You have security/openssl installed but do not have
DEFAULT_VERSIONS+=ssl=openssl set
On 24-10-2017 16:00, Ernie Luzar wrote:
> I do "pkg install openssl" that works ok.
>
> But from that point I get 2 different messages at port make time
> depending on the port being installed.
>
> /usr/ports/sysutils/qjail >make install clean
> /!\ WARNING /!\
>
> You have security/openssl install
> On 24 Oct, 2017, at 8:00, Ernie Luzar wrote:
>
> I do "pkg install openssl" that works ok.
>
> But from that point I get 2 different messages at port make time depending on
> the port being installed.
>
> /usr/ports/sysutils/qjail >make install clean
> /!\ WARNING /!\
>
> You have security/
On 2017-10-24 9:15 am, Adam Weinberger wrote:
On 24 Oct, 2017, at 8:00, Ernie Luzar wrote:
I do "pkg install openssl" that works ok.
But from that point I get 2 different messages at port make time
depending on the port being installed.
/usr/ports/sysutils/qjail >make install clean
/!\ WARN
Hello,
After upgrading our Nagios host, I can no longer get status from our
older HP servers with iLO3.
Using a perl script, check_ilo2_health.pl, this stopped working due to
lack of support of older ciphers in base openssl.
So far, I installed openssl from ports and enabled the weak cipher
14.04.2020 16:58, Per olof Ljungmark wrote:
> I am at loss right now on how I could teach the FBSD-12 system to use the
> older ciphers, it still works fine from 11.
Easiest way would be untar'ing FreeBSD 11 base.txz into chroot area and copy
your script there, too.
Then use chroot to pkg insta
On 2020-04-14 13:52, Eugene Grosbein wrote:
14.04.2020 16:58, Per olof Ljungmark wrote:
I am at loss right now on how I could teach the FBSD-12 system to use the older
ciphers, it still works fine from 11.
Easiest way would be untar'ing FreeBSD 11 base.txz into chroot area and copy
your scr
On Tue, Apr 14, 2020 at 11:58:05AM +0200, Per olof Ljungmark wrote:
> Hello,
>
> After upgrading our Nagios host, I can no longer get status from our older
> HP servers with iLO3.
>
> Using a perl script, check_ilo2_health.pl, this stopped working due to lack
> of support of older ciphers in base
On 2020-04-14 17:08, Mathieu Arnold wrote:
On Tue, Apr 14, 2020 at 11:58:05AM +0200, Per olof Ljungmark wrote:
Hello,
After upgrading our Nagios host, I can no longer get status from our older
HP servers with iLO3.
Using a perl script, check_ilo2_health.pl, this stopped working due to lack
of
On 2020-04-14 19:48, Per olof Ljungmark wrote:
On 2020-04-14 17:08, Mathieu Arnold wrote:
On Tue, Apr 14, 2020 at 11:58:05AM +0200, Per olof Ljungmark wrote:
Hello,
After upgrading our Nagios host, I can no longer get status from our
older
HP servers with iLO3.
Using a perl script, check_il
> Finally managed to figure it out, you need to tell the perl script
> exactly what cipher to use, so I added to 'check_ilo2_health.pl':
> --sslopts 'SSL_verify_mode => SSL_VERIFY_NONE, SSL_version =>
> "TLSv1_1", SSL_cipher_list => "EDH-RSA-DES-CBC3-SHA"'
>
> Works with openssl from ports.
But
On 2020-04-15 00:39, Matthias Andree wrote:
Finally managed to figure it out, you need to tell the perl script
exactly what cipher to use, so I added to 'check_ilo2_health.pl':
--sslopts 'SSL_verify_mode => SSL_VERIFY_NONE, SSL_version =>
"TLSv1_1", SSL_cipher_list => "EDH-RSA-DES-CBC3-SHA"'
W
Am 15.04.20 um 07:55 schrieb Per olof Ljungmark:
> On 2020-04-15 00:39, Matthias Andree wrote:
>>
>>> Finally managed to figure it out, you need to tell the perl script
>>> exactly what cipher to use, so I added to 'check_ilo2_health.pl':
>>> --sslopts 'SSL_verify_mode => SSL_VERIFY_NONE, SSL_versi
13 matches
Mail list logo