ssl

2nd virtual host domain forwards to apache test page after ssl certificate

自闭症网瘾萝莉.ら 提交于 2021-01-29 11:06:41
问题 Ok I've seen this question asked a multitude of times but none of the posts I've come across in the 2 days I've been researching this seem to help so I'm putting it out here in hopes of someone knowing the problem. So I have a dedicated self managed linux server using Webmin, and I had a single domain on it and added an SSL certificate and everything was going great. Then I decided to add a second domain using Webmin and it was going great too until I decided I needed an SSL certificate for

Spring WebClient - SSL configuration

谁说胖子不能爱 提交于 2021-01-29 10:02:36
问题 Below is the old code which I am trying to replace. How can I use webclient to follow same behavior? If anyone can guide me on this it will be great. I check for code to use HostnameVerifier but i did not find any link which can help me. public void initSSL() { if (logger.isDebugEnabled()) { logger.debug("HttpBasedUrlConnection - Initializing SSL"); } // Configure truststore location for everybody final String homePath = getHomePath(); synchronized (this) { trustStorePath = homePath + "/conf

How to set different truststore keystore with setProperty

久未见 提交于 2021-01-29 09:52:14
问题 I have a fixed client that call a fixed server using different keystores (one keystore for company). In my java, every time I set trustStore and keyStore system properties like this: ..reading path and password from database.. System.setProperty("javax.net.ssl.trustStore", ..path..); System.setProperty("javax.net.ssl.trustStorePassword", ..password..); System.setProperty("javax.net.ssl.keyStore", ..path..); System.setProperty("javax.net.ssl.keyStorePassword", ..password); In this way, it

Python WWS Library requires entire certificate chain to verify server

南笙酒味 提交于 2021-01-29 09:50:31
问题 I am using ssl.py to connect to a webserver and I would like to verify the server certificate. I have a ROOT_CA which signs an INTERMEDIATE_CA and this finally signs the SERVER_CERTIFICATE. I would like to provide the client only the INTERMEDIATE_CA so it can verify all certificates signed by it. However, it appears that I need to provide the entire certificate chain ROOT_CA->INTERMEDIATE_CA in order for the verification to work. Any insights on this ? Here is the script I am using: import

MariaDB SSL connection error: Unsupported record version Unknown-0.0

余生颓废 提交于 2021-01-29 09:11:17
问题 My environment: OS: centos 7.6.1810 database: 10.3.14-MariaDB jdbc driver: mariadb-java-client 2.4.1 jdbc parameter: jdbc:mysql://db_ip:3306/dbname?useUnicode=true&characterEncoding=utf8mb4&useSSL=true&trustServerCertificate=true java: openjdk version "1.8.0_201" ap server: wildfly 16 MariaDB SSL configuration tested below: mysql mysql --ssl MariaDB [mysql]> status -------------- mysql Ver 15.1 Distrib 10.3.14-MariaDB, for Linux (x86_64) using readline 5.1 Connection id: 68 Current database:

Decrypt file encrypted using openssl with aes-cbc-256

十年热恋 提交于 2021-01-29 08:57:02
问题 I have encrypted a file using below commands openssl rand 32 > test.key openssl enc -aes-256-cbc -iter 10000 -pbkdf2 -salt -in test.txt -out test.txt.enc -pass file:test.key Now i am trying to decrypt it using java. tring since last few days but no success. Can anyone help ? my code package test; import java.io.BufferedReader; import java.io.File; import java.io.FileInputStream; import java.io.FileReader; import java.io.IOException; import java.io.InputStream; import java.io.OutputStream;

Express + CloudFlare with SSL

大兔子大兔子 提交于 2021-01-29 08:02:18
问题 I have an express app freshly created using express appName . I've changed the port to 443. The domain is under CloudFlare's proxy with SSL enabled. When I go to the website though, I get the CloudFlare page Web server is down instead of seeing the express index page. How can I make Express work with CloudFlare's SSL? 回答1: There are two options: You need to alter your app such that it is able to accept HTTPS connections instead of HTTP. You can do this by using the HTTPS library instead of

Curl works outside vm but not inside

痞子三分冷 提交于 2021-01-29 07:41:00
问题 I've tried the following: Setting mtu to 1400 Downgrading vagrant to 1.8.7 and VirtualBox to 5.1.38 Turn off firewall on host (osx) and guest (Ubuntu) Turn off iptables in guest os Ping works, but anything that requires ssl handshake will fail including curl and file_get_contents in php times out Examples: vagrant@scotchbox:~$ openssl s_client -connect www.google.com:443 -prexit CONNECTED(00000003) But using curl: vagrant@scotchbox:~$ curl -iv https://www.google.com * Rebuilt URL to: https:/

ActiveMQ SSL - Reload truststore with out restart broker

自闭症网瘾萝莉.ら 提交于 2021-01-29 07:29:17
问题 Im using activeMQ as my messages server. In order to keep it secure between the server and the clients (producer/consumer), I added to the activemq.xml a ssl context section that tells the activemq when it starts, with which keystore and truststore file to use. In case the truststore has be updated with a new certifiate, I would like the activemq to reload the truststore without restart the broker itself. Is there any way t do it? I found something similer in the link below but I don't know

Why does node https module documentation example pass tls options to both the agent and the request options?

不羁岁月 提交于 2021-01-29 07:18:01
问题 In the node https module docs, regarding https.request, an example is shown: const options = { hostname: 'encrypted.google.com', port: 443, path: '/', method: 'GET', key: fs.readFileSync('test/fixtures/keys/agent2-key.pem'), cert: fs.readFileSync('test/fixtures/keys/agent2-cert.pem') }; options.agent = new https.Agent(options); const req = https.request(options, (res) => { // ... }); What is confusing here to me is the that the request options are passed to the Agent object as well - which is