Suche
Unten sind die Ergebnisse Ihrer Suche gelistet.
Passende Seitennamen:
Volltextergebnisse:
- ldap_secure @linux:commserv:ldap
- === TLS and LDAP over SSL (ldaps) === === Modifying /etc/openldap/ldap.conf === Modify / append the TLS-settings: #--- SSL/TLS setting ---# TLSCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv3:+EXP TLS_CACERT /etc/ssl/certs/ca_cert.pem TLS_CERT /etc/ssl/certs/station7_cert.pem TLS_KEY /
- config @linux:commserv:apache2
- ==== Apache === === SSL (https) === A special thing for getting Apache2 starting withaut user-interact... sk at every start for the password...\\ mv /etc/ssl/private/station7_key.pem /etc/ssl/apache2/private/station7_secure-key.pem openssl rsa -in /etc/ssl/private/station7_secure-key.pem -ou
- ca @linux:commserv:ca
- .g. one of the follwing === * [[commserv:ca:openssl_ca|simple OpenSSL CA]] * [[commserv:ca:tiny_ca|Tiny CA]] * [[commserv:ca:phpki_ca|phpki CA]] \\ =... er of certificates in a file is: station7:/etc/ssl/certs # cat ca_cert.pem | grep -E 'BEGIN.* CERTIF... me. To find the fingerprint, use: station7:/etc/ssl/certs # openssl x509 -noout -fingerprint -in ca_c
- pam @linux:commserv:ldap
- nss_map_attribute uniqueMember member #--- SSL/TLS setting ---# # OpenLDAP SSL mechanism # 2007-07-20, chhaas: wegen den folgenden Fehlern in /va... ap_simple_bind Can't contact LDAP server # muss SSL explizit deaktiviert werden: # ssl on # start_tls mechanism uses the normal LDAP port, LDAPS typic
- openssl_ca @linux:commserv:ca
- ==== simple OpenSSL Certficate Authority ==== === Create Certificate Authority === station7:/etc # station7:/usr/share/ssl/misc # ./CA.sh -newca CA certificate filename (... s []:hostmaster@example.com station7:/usr/share/ssl/misc # \\ === Create Certificate Request === station7:/usr/share/ssl/misc # openssl req -new -nodes -keyout newreq.p
- slapd_conf @linux:commserv:ldap
- eq #--- SSL/TLS setting ---# # 2007-06-28, chhaas: #TLSCipherSuite HIGH:MEDIUM:+SSLv2 #TLSCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv3:+SSLv2:+EXP TLSCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv3:+EXP TLSCACertificateFile
- ldap_conf @linux:commserv:ldap
- IMIT 12 #TIMELIMIT 15 #DEREF never #--- SSL/TLS setting ---# TLSCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv3:+SSLv2:+EXP #TLSCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv3:+EXP TLS_CACERT /etc/ssl/certs/ca_cert.pem
- gosa_secure @linux:commserv:gosa
- tead of http change in the "main"-section: forcessl="false" to: forcessl="true" Of course your Apache2-httpd must be enabled for SSL. \\ === force GOsa using imaps/tls === Set in GO... 0.1:993/tls/novalidate-cert} or: {127.0.0.1:993/ssl/novalidate-cert} or: {127.0.0.1:993/imap/ssl/tl
- cpan2rpm @linux:commserv:other
- \\ For compiling the CPAN-Perl-module IO::Socket:SSL you can either do a: cpan2rpm --group=Entwicklung/Bibliotheken/Perl IO::Socket:SSL or: cpan2rpm --group=Entwicklung/Bibliotheken/P... tp://www.cpan.org/authors/id/S/SU/SULLR/IO-Socket-SSL-1.07.tar.gz or, if you downloaded IO-Socket-SSL-1.07.tar.gz to /tmp: cpan2rpm --group=Entwicklung/Bi
- todo
- ve to be documented: * generating the decrypted SSL-key with OpenSSL-CA * use of TinyCA and phpki-CA * Postfix: main.cf and master.cf * implement ht
- config @linux:commserv:squid
- acl localhost src 127.0.0.1/255.255.255.255 acl SSL_ports port 443 563 acl Safe_ports port 80 21 44... cess deny !Safe_ports http_access deny CONNECT !SSL_ports http_access allow all icp_access allow
- config @linux:commserv:egroupware
- xample.com * SMTP server port: 25 (==>> 465 for SSL???) * User for SMTP-authentication (leave it em
- config @linux:commserv:gosa
- rypt * (php5-mhash) * php5-mysql * php5-openssl * php5-pcntl * php5-pear * (php5-pear-auth-
- config @linux:commserv:ldap
- serv:ldap:ldap_secure|Configuration of OpenLDAP with TLS and SSL (ldaps)]] \\ <- [[commserv:index]]