On Fri, 2022-06-03 at 16:16 -0700, Daniel Lenski wrote:
>
> Cisco's own IP phones, at least model "SPA-525g", use the OpenConnect
> client.
> https://linkprotect.cudasvc.com/url?a=https%3a%2f%2fgitlab.com%2fopenconnect%2focserv%2f-%2fissues%2f51%23note_12193848&c=E,1,wfoABW6JkcvKxUOu1iJuPFhN-2wLU
de a
n excellent argument, to the point that it might very well have made a
difference in keeping Linux
as an option within our group.
Best Regards,
-Randall
--
Randall Sindlinger
LAADS web team
Terrestrial Information Systems Lab
Earth Sciences Division
Goddard
he current version, or what flag or
config I would use to
send the MAC Address.
Thanks,
-Randall
--
Randall Sindlinger
LAADS web team
Terrestrial Information Systems Lab
Earth Sciences Division
NASA Goddard Space Flight Center
___
openconnect-devel ma
20emulated;manufacturer=piv_II;serial=944f2d808286d7e7;token=PIV_II;id=%01;ty
pe=private
Using client certificate 'Randall Sindlinger (affiliate)'
Adding supporting CA ''
Adding supporting CA ''
Segmentation fault (core dumped)
Of note, I don't know if the '
Hello,
I am already using openconnect with ocproxy, setting up a SOCKS5 proxy.
I'd like to do Kerberos authentication through the proxy (to a KDC that is on
the VPN). However, ocproxy does not support forwarding UDP traffic.
Do you have any suggestions on how I might be able to do Kerberos th
On Fri, 08 Feb 2019 22:19:47 + David Woodhouse wrote:
>
>Right, it's waiting for the CSD trojan to run. Look in ~/.cisco and
>find the logs, and work out what happened to it. It may well have
>crashed; it often does.
>
Thanks, I see the log files now Off hand, I do see some messages about no
olKey;id=%00%01;object=PIV%20ID%20Certificate;type=cert
PIN required for CoolKey
Enter PIN:
Using PKCS#11 key
pkcs11:model=;manufacturer=;serial=;token=CoolKey;id=%00%01;object=PIV%20ID%20Certificate;type=private
Using client certificate 'Randall Sindlinger (affiliate)'
SSL negotiation wit