Suche
Unten sind die Ergebnisse Ihrer Suche gelistet.
Passende Seitennamen:
Volltextergebnisse:
- ldap_secure @linux:commserv:ldap
- === TLS and LDAP over SSL (ldaps) === === Modifying /etc/openldap/ldap.conf === Modify / append the TLS-settings: #--- SSL/TLS setting ---# TLSCipherSuite ALL:!ADH:RC4+RS... :+HIGH:+MEDIUM:+LOW:+SSLv3:+EXP TLS_CACERT /etc/ssl/certs/ca_cert.pem TLS_CERT /etc/ssl/certs/station7_cert.pem TLS_KEY /etc/ssl/private/station7_key.
- config @linux:commserv:apache2
- ==== Apache === === SSL (https) === A special thing for getting Apache2 starting withaut user-interact... sk at every start for the password...\\ mv /etc/ssl/private/station7_key.pem /etc/ssl/apache2/private/station7_secure-key.pem openssl rsa -in /etc/ssl/private/station7_secure-key.pem -out /etc/ssl/apa
- ca @linux:commserv:ca
- er of certificates in a file is: station7:/etc/ssl/certs # cat ca_cert.pem | grep -E 'BEGIN.* CERTIF... me. To find the fingerprint, use: station7:/etc/ssl/certs # openssl x509 -noout -fingerprint -in ca_c... be world readable). Copy your CA certificate to <ssl-base-dir>certs/ and finds out its Hash. OpenSSL l... te hash value. Calculate it with: station7:/etc/ssl/certs # openssl x509 -noout -hash -in ca_cert.pem
- cyrus_secure @linux:email:cyrus
- {{:suse.png}} === TLS, IMAP over SSL (imaps) and pop3 over SSL (pop3s) === === TLS === Modify / append the TLS-settings in **/etc/imap.conf:** #--- SSL/TLS setting ---# tls_ca_path: /etc/ssl/certs tls_ca_file: /etc/ssl/certs/ca_cert.pem tls_cert_fi
- spamassassin @linux:email:spamassassin
- usage(ec): sslmsg="" if hasattr(socket, "ssl"): sslmsg=""" --ssl Make an SSL connection to the IMAP server""" sys.stderr.write("""isbg: IMAP Spam b... punge", "verbose", "trackfile=", "spamc", "ssl", "savepw", "nostats", "exitcodes", # opti
- pam @linux:commserv:ldap
- nss_map_attribute uniqueMember member #--- SSL/TLS setting ---# # OpenLDAP SSL mechanism # 2007-07-20, chhaas: wegen den folgenden Fehlern in /va... ap_simple_bind Can't contact LDAP server # muss SSL explizit deaktiviert werden: # ssl on # start_tls mechanism uses the normal LDAP port, LDAPS typic
- postfix_secure @linux:email:postfix
- {{:suse.png}} === Postfix with TLS and SSL (smtps) === Use a portscanner like "nmap": station7:/etc/i... y the TLS-settings in /etc/postfix/main.cf #--- SSL/TLS setting ---# smtpd_client_restrictions= per... dev:/dev/urandom #-- smtpd_tls_CAfile = /etc/ssl/certs/ca_cert.pem smtpd_tls_cert_file = /etc/ssl/certs/station7_cert.pem smtpd_tls_key_file = /etc
- openssl_ca @linux:commserv:ca
- hority === station7:/etc # station7:/usr/share/ssl/misc # ./CA.sh -newca CA certificate filename (... s []:hostmaster@example.com station7:/usr/share/ssl/misc # \\ === Create Certificate Request === station7:/usr/share/ssl/misc # openssl req -new -nodes -keyout newreq.p... n optional company name []: station7:/usr/share/ssl/misc # \\ === Sign Certificate Request === sta
- config @linux:email:postfix
- attribute = gosaMailForwardingAddress,mail # SSL/TLS config smtp_use_tls = yes smtpd_use_tls =... tarttls = yes smtpd_tls_key_file = /etc/postfix/ssl/smtpdkey.pem smtpd_tls_cert_file = /etc/postfix/ssl/smtpd.pem smtpd_tls_loglevel = 1 # SASL co... in = broken_sasl_auth_clients = yes === Create SSL certificates for Postfix === First, make sure th
- cpan2rpm @linux:commserv:other
- \\ For compiling the CPAN-Perl-module IO::Socket:SSL you can either do a: cpan2rpm --group=Entwicklung/Bibliotheken/Perl IO::Socket:SSL or: cpan2rpm --group=Entwicklung/Bibliotheken/P... tp://www.cpan.org/authors/id/S/SU/SULLR/IO-Socket-SSL-1.07.tar.gz or, if you downloaded IO-Socket-SSL-1.07.tar.gz to /tmp: cpan2rpm --group=Entwicklung/Bi
- gosa_secure @linux:commserv:gosa
- Of course your Apache2-httpd must be enabled for SSL. \\ === force GOsa using imaps/tls === Set in GO... 0.1:993/tls/novalidate-cert} or: {127.0.0.1:993/ssl/novalidate-cert} or: {127.0.0.1:993/imap/ssl/tls/novalidate-cert} or: {127.0.0.1:993/imap/ssl/tls/novalidate-cert} The "novalidate-cert" in the c
- ldap_conf @linux:commserv:ldap
- IMIT 12 #TIMELIMIT 15 #DEREF never #--- SSL/TLS setting ---# TLSCipherSuite ALL:!ADH:RC4+RS... :+HIGH:+MEDIUM:+LOW:+SSLv3:+EXP TLS_CACERT /etc/ssl/certs/ca_cert.pem TLS_CERT /etc/ssl/certs/station7_cert.pem TLS_KEY /etc/ssl/private/station7_key.pem TLS_REQCERT demand \\
- slapd_conf @linux:commserv:ldap
- eq #--- SSL/TLS setting ---# # 2007-06-28, chhaas: #TLSCi... DIUM:+LOW:+SSLv3:+EXP TLSCACertificateFile /etc/ssl/certs/ca_cert.pem TLSCertificateFile /etc/ssl/certs/station7_cert.pem TLSCertificateKeyFile /etc/ssl/private/station7_key.pem # 2007-07-10, chhaa
- ldap @linux:email:postfix
- t= 636 start_tls = no tls_ca_cert_file = /etc/ssl/postfix/certs/ca_cert.pem tls_ca_cert_dir = /etc/ssl/postfix/certs/ tls_cert = /etc/ssl/postfix/certs/station7_cert.pem tls_key = /etc/ssl/postfix/private/station7_key.pem #tls_random_fi
- commserv
- dap_secure|Configuration of OpenLDAP with TLS and SSL (ldaps)]] * **[[commserv:apache2:config|Apache2... * [[commserv:email:postfix:postfix_secure|TLS and SSL configuration (smtps)]] * [[commserv:email:... * [[commserv:email:cyrus:cyrus_secure|TLS and SSL configuration (imaps)]] * [[commserv:email:cy