<html>
<head>
<meta content="text/html; charset=utf-8" http-equiv="Content-Type">
</head>
<body text="#000000" bgcolor="#FFFFFF">
Hi David,<br>
<br>
could you try this patch and let me know if it works with this
change? This simply changes "httpst://..." to use ONLY TLS 1.2, so
if you have other httpst-defs that are not 1.2 then they will
probably fail.<br>
<br>
Regards,<br>
Henrik<br>
<br>
<br>
<div class="moz-cite-prefix">Den 08-06-2016 kl. 12:47 skrev Gore,
David W (David):<br>
</div>
<blockquote
cite="mid:9E95D92A6FE6D644AD42428C72C4B7C001C344F342@FHDP1LUMXC7V42.us.one.verizon.com"
type="cite">
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta name="Generator" content="Microsoft Word 14 (filtered
medium)">
<!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]-->
<style><!--
/* Font Definitions */
@font-face
{font-family:"Cambria Math";
panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
{font-family:Calibri;
panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
{font-family:Tahoma;
panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
{font-family:"Times New Roman \, serif";
panose-1:0 0 0 0 0 0 0 0 0 0;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
{margin:0in;
margin-bottom:.0001pt;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
color:black;}
a:link, span.MsoHyperlink
{mso-style-priority:99;
color:blue;
text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
{mso-style-priority:99;
color:purple;
text-decoration:underline;}
pre
{mso-style-priority:99;
mso-style-link:"HTML Preformatted Char";
margin:0in;
margin-bottom:.0001pt;
font-size:10.0pt;
font-family:"Courier New","serif";
color:black;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
{mso-style-priority:99;
mso-style-link:"Balloon Text Char";
margin:0in;
margin-bottom:.0001pt;
font-size:8.0pt;
font-family:"Tahoma","sans-serif";
color:black;}
span.HTMLPreformattedChar
{mso-style-name:"HTML Preformatted Char";
mso-style-priority:99;
mso-style-link:"HTML Preformatted";
font-family:"Courier New","serif";}
span.EmailStyle19
{mso-style-type:personal;
font-family:"Calibri","sans-serif";
color:windowtext;}
span.EmailStyle20
{mso-style-type:personal;
font-family:"Calibri","sans-serif";
color:#1F497D;}
span.EmailStyle21
{mso-style-type:personal-reply;
font-family:"Calibri","sans-serif";
color:#1F497D;}
span.BalloonTextChar
{mso-style-name:"Balloon Text Char";
mso-style-priority:99;
mso-style-link:"Balloon Text";
font-family:"Tahoma","sans-serif";
color:black;}
.MsoChpDefault
{mso-style-type:export-only;
font-size:10.0pt;}
@page WordSection1
{size:8.5in 11.0in;
margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
<div class="WordSection1">
<p class="MsoNormal">Hi Henrik,<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">httpst://www.example.com/, yes this is how
our entries are set. I should have shared it before but the
only change made to our environment was to update the Apache
.conf file with this entry:<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">SSLProtocol -ALL +TLSv1.2<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">If I want xymon to not error I could change
it back to:<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">SSLProtocol -ALL +TLSv1<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">But then I would be using TLSv1.0 and our
servers will fail security scans<o:p></o:p></p>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal">The xymon entry is httpst as we have been
using TLS for some time.<o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D"><o:p> </o:p></span></p>
<p class="MsoNormal"><span style="color:#1F497D"><o:p> </o:p></span></p>
<div>
<div style="border:none;border-top:solid #B5C4DF
1.0pt;padding:3.0pt 0in 0in 0in">
<p class="MsoNormal"><b><span
style="font-size:10.0pt;font-family:"Tahoma","sans-serif";color:windowtext">From:</span></b><span
style="font-size:10.0pt;font-family:"Tahoma","sans-serif";color:windowtext">
Henrik Størner [<a class="moz-txt-link-freetext" href="mailto:henrik@hswn.dk">mailto:henrik@hswn.dk</a>] <br>
<b>Sent:</b> Wednesday, June 8, 2016 3:14 AM<br>
<b>To:</b> Gore, David W (David); <a class="moz-txt-link-abbreviated" href="mailto:xymon@xymon.com">xymon@xymon.com</a><br>
<b>Subject:</b> Re: [E] Re: [Xymon] Support for TLS v1.1
and 1.2?<o:p></o:p></span></p>
</div>
</div>
<p class="MsoNormal"><o:p> </o:p></p>
<p class="MsoNormal" style="margin-bottom:12.0pt">Hi,<br>
<br>
Xymon asks OpenSSL to connect using any available SSL/TLS
protocol and this should auto-negotiate to whatever protocol
both sides support, which is what SSL/TLS clients (browsers
etc) would normally do.<br>
<br>
This is different from what you do with the command-line tests
below; you explicitly request one of the TLS 1.x methods, so
auto-negotiate is turned off. Could you running this command
without the "-tls*" option?<br>
<br>
Have you tried to configure Xymon to specifically use TLS 1?
Put "httpst://www.example.com/" in hosts.cfg (the the 't'
added to https). This will specifically request a TLSv1
connection. You are right that Xymon does not have similar
ways to request TLSv1.1 and TLSv1.2 connections.<br>
<br>
<br>
Regards,<br>
Henrik<br>
<o:p></o:p></p>
<div>
<p class="MsoNormal">Den 07-06-2016 kl. 16:26 skrev Gore,
David W (David):<o:p></o:p></p>
</div>
<blockquote style="margin-top:5.0pt;margin-bottom:5.0pt">
<p class="MsoNormal"><span style="color:#1F497D">Hi Henrik,</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D"> </span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">It is.
Specifically I use this:</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D"> </span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">openssl
s_client -connect xymon:443 -tls1 2>/dev/null | grep
Renegotiation</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">Secure
Renegotiation IS NOT supported</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D"> </span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">openssl
s_client -connect xymon:443 -tls1_1 2>/dev/null | grep
Renegotiation</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">Secure
Renegotiation IS NOT supported</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D"> </span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">openssl
s_client -connect xymon:443 -tls1_2 2>/dev/null | grep
Renegotiation</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">Secure
Renegotiation IS supported</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D"> </span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">This is what
xymon logs in xymonnet.log which you can also see alerting
for the xymonnet column on the web page:</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D"> </span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">2016-06-07
14:09:53.879678 Unspecified SSL error in SSL_connect to
https (47873/tcp) on host my.ip_1.goes.here:
error:1409442E:SSL routines:SSL3_READ_BYTES:tlsv1 alert
protocol version</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">2016-06-07
14:14:41.970374 Unspecified SSL error in SSL_connect to
https (47873/tcp) on host my.ip_2.goes.here:
error:1409442E:SSL routines:SSL3_READ_BYTES:tlsv1 alert
protocol version</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">2016-06-07
14:14:41.970753 Unspecified SSL error in SSL_connect to
https (47873/tcp) on host my.ip_2.goes.here:
error:1409442E:SSL routines:SSL3_READ_BYTES:tlsv1 alert
protocol version</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D"> </span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">This is
Mark’s post:</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D"> </span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D"><a
moz-do-not-send="true"
href="http://lists.xymon.com/pipermail/xymon/2015-April/041568.html"><a class="moz-txt-link-freetext" href="http://lists.xymon.com/pipermail/xymon/2015-April/041568.html">http://lists.xymon.com/pipermail/xymon/2015-April/041568.html</a></a></span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D"> </span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">My guess is,
Xymon doesn’t properly support the minor versions of TLS?</span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D"> </span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D"> </span><o:p></o:p></p>
<div>
<div style="border:none;border-top:solid #B5C4DF
1.0pt;padding:3.0pt 0in 0in 0in">
<p class="MsoNormal"><b><span
style="font-size:10.0pt;font-family:"Tahoma","sans-serif";color:windowtext">From:</span></b><span
style="font-size:10.0pt;font-family:"Tahoma","sans-serif";color:windowtext">
Henrik Størner [<a moz-do-not-send="true"
href="mailto:henrik@hswn.dk">mailto:henrik@hswn.dk</a>]
<br>
<b>Sent:</b> Tuesday, June 7, 2016 9:51 AM</span><br>
<span style="font-size:10.0pt;font-family:"Courier
New","serif";color:windowtext"><a
moz-do-not-send="true"
href="https://xymon1.domain.com/"><a class="moz-txt-link-freetext" href="https://xymon1.domain.com">https://xymon1.domain.com</a></a></span><b><span
style="font-size:10.0pt;font-family:"Tahoma","sans-serif";color:windowtext">To:</span></b><span
style="font-size:10.0pt;font-family:"Tahoma","sans-serif";color:windowtext">
Gore, David W (David); <a moz-do-not-send="true"
href="mailto:xymon@xymon.com">xymon@xymon.com</a><br>
<b>Subject:</b> [E] Re: [Xymon] Support for TLS v1.1
and 1.2?</span><o:p></o:p></p>
</div>
</div>
<p class="MsoNormal"> <o:p></o:p></p>
<p class="MsoNormal" style="margin-bottom:12.0pt">Hi David,<br>
<br>
Xymon uses the openssl library on the Xymon server to do
SSL/TLS. So the most basic of tests would be to run "openssl
s_client -connect xymon1.domain.com:443" to see if your
OpenSSL library supports the necessary protocols.<br>
<br>
Note that you may have multiple versions of OpenSSL
installed, so to be 100% sure check the version of OpenSSL
that Xymon uses: "xymonnet --version" will tell you which
OpenSSL version it was compiled with, and "ldd
~xymon/server/bin/xymonnet" will show you (on Linux, at
least) what the actual library is that is used by xymonnet.<br>
<br>
<br>
Regards,<br>
Henrik<br>
<br>
<br>
<o:p></o:p></p>
<div>
<p class="MsoNormal">Den 07-06-2016 kl. 00:20 skrev Gore,
David W (David):<o:p></o:p></p>
</div>
<blockquote style="margin-top:5.0pt;margin-bottom:5.0pt">
<p class="MsoNormal">Mark Felder,<o:p></o:p></p>
<p class="MsoNormal"> <o:p></o:p></p>
<p class="MsoNormal">Mentioned last year around April 17<sup>th</sup>,
2015 where Xymon support for TLS v1.1 and v1.2 may be
lacking. Perhaps the issue is more my naiveté but does
anyone know how I can get the sslcert and http tests to
work correctly with Apache and Xymon.<o:p></o:p></p>
<p class="MsoNormal"> <o:p></o:p></p>
<p class="MsoNormal"><img moz-do-not-send="true"
id="_x0000_i1025"
src="imap://henrik%40hswn%2Edk@mail.hswn.dk:143/fetch%3EUID%3E.Lister.Xymon%3E13013?part=1.2&filename=ForwardedMessage.eml&realtype=message/rfc822&header=quotebody&filename=image001.png"
alt="red" width="16" border="0" height="16"><span
style="font-size:10.0pt;font-family:"Courier
New","serif""><a moz-do-not-send="true"
href="https://xymon1.domain.com/">https://xymon1.domain.com/</a>
- SSL error</span><o:p></o:p></p>
<p class="MsoNormal"><span
style="font-size:10.0pt;font-family:"Courier
New","serif""> </span><o:p></o:p></p>
<p class="MsoNormal">The sslcert test goes purple.<o:p></o:p></p>
<p class="MsoNormal"> <o:p></o:p></p>
<p class="MsoNormal">Os: Red Hat Enterprise Linux Server
release 7.2 (Maipo)<o:p></o:p></p>
<p class="MsoNormal">Openssl: OpenSSL 1.0.1e-fips 11 Feb
2013<o:p></o:p></p>
<p class="MsoNormal">Xymon: 4.3.26<o:p></o:p></p>
<p class="MsoNormal"> <o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D"> </span><o:p></o:p></p>
<p class="MsoNormal"><span style="color:#1F497D">David W
Gore</span><o:p></o:p></p>
<p class="MsoNormal"> <o:p></o:p></p>
</blockquote>
<p class="MsoNormal"><span
style="font-size:12.0pt;font-family:"Times New Roman
, serif","serif""> </span><o:p></o:p></p>
</blockquote>
<p class="MsoNormal"><span
style="font-size:12.0pt;font-family:"Times New
Roman","serif""><o:p> </o:p></span></p>
</div>
</blockquote>
<br>
</body>
</html>