ssl

Suche

Unten sind die Ergebnisse Ihrer Suche gelistet.

ldap_secure @linux:commserv:ldap
38 Treffer, Zuletzt geändert:
=== TLS and LDAP over SSL (ldaps) === === Modifying /etc/openldap/ldap.conf === Modify / append the TLS-settings: #--- SSL/TLS setting ---# TLSCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv3:+EXP TLS_CACERT /etc/ssl/certs/ca_cert.pem TLS_CERT /etc/ssl/certs/station7_cert.pem TLS_KEY /
config @linux:commserv:apache2
27 Treffer, Zuletzt geändert:
==== Apache === === SSL (https) === A special thing for getting Apache2 starting withaut user-interact... sk at every start for the password...\\ mv /etc/ssl/private/station7_key.pem /etc/ssl/apache2/private/station7_secure-key.pem openssl rsa -in /etc/ssl/private/station7_secure-key.pem -out /etc/ssl/apa
cyrus_secure @linux:email:cyrus
21 Treffer, Zuletzt geändert:
{{:suse.png}} === TLS, IMAP over SSL (imaps) and pop3 over SSL (pop3s) === === TLS === Modify / append the TLS-settings in **/etc/imap.conf:** #--- SSL/TLS setting ---# tls_ca_path: /etc/ssl/certs tls_ca_file: /etc/ssl/certs/ca_cert.pem tls_cert_fi
ca @linux:commserv:ca
17 Treffer, Zuletzt geändert:
er of certificates in a file is: station7:/etc/ssl/certs # cat ca_cert.pem | grep -E 'BEGIN.* CERTIF... me. To find the fingerprint, use: station7:/etc/ssl/certs # openssl x509 -noout -fingerprint -in ca_c... be world readable). Copy your CA certificate to <ssl-base-dir>certs/ and finds out its Hash. OpenSSL l... te hash value. Calculate it with: station7:/etc/ssl/certs # openssl x509 -noout -hash -in ca_cert.pem
spamassassin @linux:email:spamassassin
17 Treffer, Zuletzt geändert:
not all options are documented def usage(ec): sslmsg="" if hasattr(socket, "ssl"): sslmsg=""" --ssl Make an SSL connection to the IMAP server""" sys.stderr.write("""is
pam @linux:commserv:ldap
13 Treffer, Zuletzt geändert:
nss_map_attribute uniqueMember member #--- SSL/TLS setting ---# # OpenLDAP SSL mechanism # 2007-07-20, chhaas: wegen den folgenden Fehlern in /va... ap_simple_bind Can't contact LDAP server # muss SSL explizit deaktiviert werden: # ssl on # start_tls mechanism uses the normal LDAP port, LDAPS typic
postfix_secure @linux:email:postfix
10 Treffer, Zuletzt geändert:
{{:suse.png}} === Postfix with TLS and SSL (smtps) === Use a portscanner like "nmap": station7:/etc/i... y the TLS-settings in /etc/postfix/main.cf #--- SSL/TLS setting ---# smtpd_client_restrictions= per... dev:/dev/urandom #-- smtpd_tls_CAfile = /etc/ssl/certs/ca_cert.pem smtpd_tls_cert_file = /etc/ssl/certs/station7_cert.pem smtpd_tls_key_file = /etc
slapd_conf @linux:commserv:ldap
8 Treffer, Zuletzt geändert:
eq #--- SSL/TLS setting ---# # 2007-06-28, chhaas: #TLSCipherSuite HIGH:MEDIUM:+SSLv2 #TLSCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv3:+SSLv2:+EXP TLSCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv3:+EXP TLSCACertificateFile
openssl_ca @linux:commserv:ca
7 Treffer, Zuletzt geändert:
hority === station7:/etc # station7:/usr/share/ssl/misc # ./CA.sh -newca CA certificate filename (... s []:hostmaster@example.com station7:/usr/share/ssl/misc # \\ === Create Certificate Request === station7:/usr/share/ssl/misc # openssl req -new -nodes -keyout newreq.p... n optional company name []: station7:/usr/share/ssl/misc # \\ === Sign Certificate Request === sta
ldap_conf @linux:commserv:ldap
7 Treffer, Zuletzt geändert:
IMIT 12 #TIMELIMIT 15 #DEREF never #--- SSL/TLS setting ---# TLSCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv3:+SSLv2:+EXP #TLSCipherSuite ALL:!ADH:RC4+RSA:+HIGH:+MEDIUM:+LOW:+SSLv3:+EXP TLS_CACERT /etc/ssl/certs/ca_cert.pem
config @linux:email:postfix
7 Treffer, Zuletzt geändert:
attribute = gosaMailForwardingAddress,mail # SSL/TLS config smtp_use_tls = yes smtpd_use_tls =... tarttls = yes smtpd_tls_key_file = /etc/postfix/ssl/smtpdkey.pem smtpd_tls_cert_file = /etc/postfix/ssl/smtpd.pem smtpd_tls_loglevel = 1 # SASL co... in = broken_sasl_auth_clients = yes === Create SSL certificates for Postfix === First, make sure th
cpan2rpm @linux:commserv:other
5 Treffer, Zuletzt geändert:
\\ For compiling the CPAN-Perl-module IO::Socket:SSL you can either do a: cpan2rpm --group=Entwicklung/Bibliotheken/Perl IO::Socket:SSL or: cpan2rpm --group=Entwicklung/Bibliotheken/P... tp://www.cpan.org/authors/id/S/SU/SULLR/IO-Socket-SSL-1.07.tar.gz or, if you downloaded IO-Socket-SSL-1.07.tar.gz to /tmp: cpan2rpm --group=Entwicklung/Bi
ldap @linux:email:postfix
5 Treffer, Zuletzt geändert:
t= 636 start_tls = no tls_ca_cert_file = /etc/ssl/postfix/certs/ca_cert.pem tls_ca_cert_dir = /etc/ssl/postfix/certs/ tls_cert = /etc/ssl/postfix/certs/station7_cert.pem tls_key = /etc/ssl/postfix/private/station7_key.pem #tls_random_fi
gosa_secure @linux:commserv:gosa
4 Treffer, Zuletzt geändert:
Of course your Apache2-httpd must be enabled for SSL. \\ === force GOsa using imaps/tls === Set in GO... 0.1:993/tls/novalidate-cert} or: {127.0.0.1:993/ssl/novalidate-cert} or: {127.0.0.1:993/imap/ssl/tls/novalidate-cert} or: {127.0.0.1:993/imap/ssl/tls/novalidate-cert} The "novalidate-cert" in the c
commserv
3 Treffer, Zuletzt geändert:
dap_secure|Configuration of OpenLDAP with TLS and SSL (ldaps)]] * **[[commserv:apache2:config|Apache2... * [[commserv:email:postfix:postfix_secure|TLS and SSL configuration (smtps)]] * [[commserv:email:... * [[commserv:email:cyrus:cyrus_secure|TLS and SSL configuration (imaps)]] * [[commserv:email:cy
sieve @linux:email:cyrus
3 Treffer, Zuletzt geändert:
all @linux:debian
2 Treffer, Zuletzt geändert:
hardware @linux:debian
2 Treffer, Zuletzt geändert:
email @linux:email
2 Treffer, Zuletzt geändert:
config @linux:commserv:squid
2 Treffer, Zuletzt geändert:
linux
1 Treffer, Zuletzt geändert:
todo @linux:commserv
1 Treffer, Zuletzt geändert:
desktop @linux:debian
1 Treffer, Zuletzt geändert:
cyrus @linux:email
1 Treffer, Zuletzt geändert:
config @linux:commserv:egroupware
1 Treffer, Zuletzt geändert:
config @linux:commserv:ldap
1 Treffer, Zuletzt geändert:
temper1 @linux:monitoring:icinga:hardware
1 Treffer, Zuletzt geändert: