Suche
Unten sind die Ergebnisse Ihrer Suche gelistet.
Passende Seitennamen:
Volltextergebnisse:
- ldap_secure @linux:commserv:ldap
- === TLS and LDAP over SSL (ldaps) === === Modifying /etc/openldap/ldap.conf === Modify / append the TLS-settings: #--- SSL/TLS setting ---# TLSCipherSuite ALL:!ADH:RC4+RS... :+HIGH:+MEDIUM:+LOW:+SSLv3:+EXP TLS_CACERT /etc/ssl/certs/ca_cert.pem TLS_CERT /etc/ssl/certs/station7_cert.pem TLS_KEY /etc/ssl/private/station7_key.
- config @linux:commserv:apache2
- ==== Apache === === SSL (https) === A special thing for getting Apache2 starting withaut user-interact... sk at every start for the password...\\ mv /etc/ssl/private/station7_key.pem /etc/ssl/apache2/private/station7_secure-key.pem openssl rsa -in /etc/ssl/private/station7_secure-key.pem -out /etc/ssl/apa
- ca @linux:commserv:ca
- er of certificates in a file is: station7:/etc/ssl/certs # cat ca_cert.pem | grep -E 'BEGIN.* CERTIF... me. To find the fingerprint, use: station7:/etc/ssl/certs # openssl x509 -noout -fingerprint -in ca_c... be world readable). Copy your CA certificate to <ssl-base-dir>certs/ and finds out its Hash. OpenSSL l... te hash value. Calculate it with: station7:/etc/ssl/certs # openssl x509 -noout -hash -in ca_cert.pem
- pam @linux:commserv:ldap
- nss_map_attribute uniqueMember member #--- SSL/TLS setting ---# # OpenLDAP SSL mechanism # 2007-07-20, chhaas: wegen den folgenden Fehlern in /va... ap_simple_bind Can't contact LDAP server # muss SSL explizit deaktiviert werden: # ssl on # start_tls mechanism uses the normal LDAP port, LDAPS typic
- openssl_ca @linux:commserv:ca
- hority === station7:/etc # station7:/usr/share/ssl/misc # ./CA.sh -newca CA certificate filename (... s []:hostmaster@example.com station7:/usr/share/ssl/misc # \\ === Create Certificate Request === station7:/usr/share/ssl/misc # openssl req -new -nodes -keyout newreq.p... n optional company name []: station7:/usr/share/ssl/misc # \\ === Sign Certificate Request === sta
- cpan2rpm @linux:commserv:other
- \\ For compiling the CPAN-Perl-module IO::Socket:SSL you can either do a: cpan2rpm --group=Entwicklung/Bibliotheken/Perl IO::Socket:SSL or: cpan2rpm --group=Entwicklung/Bibliotheken/P... tp://www.cpan.org/authors/id/S/SU/SULLR/IO-Socket-SSL-1.07.tar.gz or, if you downloaded IO-Socket-SSL-1.07.tar.gz to /tmp: cpan2rpm --group=Entwicklung/Bi
- gosa_secure @linux:commserv:gosa
- Of course your Apache2-httpd must be enabled for SSL. \\ === force GOsa using imaps/tls === Set in GO... 0.1:993/tls/novalidate-cert} or: {127.0.0.1:993/ssl/novalidate-cert} or: {127.0.0.1:993/imap/ssl/tls/novalidate-cert} or: {127.0.0.1:993/imap/ssl/tls/novalidate-cert} The "novalidate-cert" in the c
- ldap_conf @linux:commserv:ldap
- IMIT 12 #TIMELIMIT 15 #DEREF never #--- SSL/TLS setting ---# TLSCipherSuite ALL:!ADH:RC4+RS... :+HIGH:+MEDIUM:+LOW:+SSLv3:+EXP TLS_CACERT /etc/ssl/certs/ca_cert.pem TLS_CERT /etc/ssl/certs/station7_cert.pem TLS_KEY /etc/ssl/private/station7_key.pem TLS_REQCERT demand \\
- slapd_conf @linux:commserv:ldap
- eq #--- SSL/TLS setting ---# # 2007-06-28, chhaas: #TLSCi... DIUM:+LOW:+SSLv3:+EXP TLSCACertificateFile /etc/ssl/certs/ca_cert.pem TLSCertificateFile /etc/ssl/certs/station7_cert.pem TLSCertificateKeyFile /etc/ssl/private/station7_key.pem # 2007-07-10, chhaa
- config @linux:commserv:squid
- acl localhost src 127.0.0.1/255.255.255.255 acl SSL_ports port 443 563 acl Safe_ports port 80 21 44... cess deny !Safe_ports http_access deny CONNECT !SSL_ports http_access allow all icp_access allow
- todo
- ve to be documented: * generating the decrypted SSL-key with OpenSSL-CA * use of TinyCA and phpki-C
- config @linux:commserv:egroupware
- xample.com * SMTP server port: 25 (==>> 465 for SSL???) * User for SMTP-authentication (leave it em
- config @linux:commserv:ldap
- serv:ldap:ldap_secure|Configuration of OpenLDAP with TLS and SSL (ldaps)]] \\ <- [[commserv:index]]