[Xymon] [E] Re: Support for TLS v1.1 and 1.2?
Henrik Størner
henrik at hswn.dk
Wed Jun 8 09:14:25 CEST 2016
Hi,
Xymon asks OpenSSL to connect using any available SSL/TLS protocol and
this should auto-negotiate to whatever protocol both sides support,
which is what SSL/TLS clients (browsers etc) would normally do.
This is different from what you do with the command-line tests below;
you explicitly request one of the TLS 1.x methods, so auto-negotiate is
turned off. Could you running this command without the "-tls*" option?
Have you tried to configure Xymon to specifically use TLS 1? Put
"httpst://www.example.com/" in hosts.cfg (the the 't' added to https).
This will specifically request a TLSv1 connection. You are right that
Xymon does not have similar ways to request TLSv1.1 and TLSv1.2 connections.
Regards,
Henrik
Den 07-06-2016 kl. 16:26 skrev Gore, David W (David):
>
> Hi Henrik,
>
> It is. Specifically I use this:
>
> openssl s_client -connect xymon:443 -tls1 2>/dev/null | grep Renegotiation
>
> Secure Renegotiation IS NOT supported
>
> openssl s_client -connect xymon:443 -tls1_1 2>/dev/null | grep
> Renegotiation
>
> Secure Renegotiation IS NOT supported
>
> openssl s_client -connect xymon:443 -tls1_2 2>/dev/null | grep
> Renegotiation
>
> Secure Renegotiation IS supported
>
> This is what xymon logs in xymonnet.log which you can also see
> alerting for the xymonnet column on the web page:
>
> 2016-06-07 14:09:53.879678 Unspecified SSL error in SSL_connect to
> https (47873/tcp) on host my.ip_1.goes.here: error:1409442E:SSL
> routines:SSL3_READ_BYTES:tlsv1 alert protocol version
>
> 2016-06-07 14:14:41.970374 Unspecified SSL error in SSL_connect to
> https (47873/tcp) on host my.ip_2.goes.here: error:1409442E:SSL
> routines:SSL3_READ_BYTES:tlsv1 alert protocol version
>
> 2016-06-07 14:14:41.970753 Unspecified SSL error in SSL_connect to
> https (47873/tcp) on host my.ip_2.goes.here: error:1409442E:SSL
> routines:SSL3_READ_BYTES:tlsv1 alert protocol version
>
> This is Mark’s post:
>
> http://lists.xymon.com/pipermail/xymon/2015-April/041568.html
>
> My guess is, Xymon doesn’t properly support the minor versions of TLS?
>
> *From:*Henrik Størner [mailto:henrik at hswn.dk]
> *Sent:* Tuesday, June 7, 2016 9:51 AM
> https://xymon1.domain.com <https://xymon1.domain.com/>*To:* Gore,
> David W (David); xymon at xymon.com
> *Subject:* [E] Re: [Xymon] Support for TLS v1.1 and 1.2?
>
> Hi David,
>
> Xymon uses the openssl library on the Xymon server to do SSL/TLS. So
> the most basic of tests would be to run "openssl s_client -connect
> xymon1.domain.com:443" to see if your OpenSSL library supports the
> necessary protocols.
>
> Note that you may have multiple versions of OpenSSL installed, so to
> be 100% sure check the version of OpenSSL that Xymon uses: "xymonnet
> --version" will tell you which OpenSSL version it was compiled with,
> and "ldd ~xymon/server/bin/xymonnet" will show you (on Linux, at
> least) what the actual library is that is used by xymonnet.
>
>
> Regards,
> Henrik
>
> Den 07-06-2016 kl. 00:20 skrev Gore, David W (David):
>
> Mark Felder,
>
> Mentioned last year around April 17^th , 2015 where Xymon support
> for TLS v1.1 and v1.2 may be lacking. Perhaps the issue is more
> my naiveté but does anyone know how I can get the sslcert and http
> tests to work correctly with Apache and Xymon.
>
> redhttps://xymon1.domain.com/ - SSL error
>
> The sslcert test goes purple.
>
> Os: Red Hat Enterprise Linux Server release 7.2 (Maipo)
>
> Openssl: OpenSSL 1.0.1e-fips 11 Feb 2013
>
> Xymon: 4.3.26
>
> David W Gore
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.xymon.com/pipermail/xymon/attachments/20160608/d427f303/attachment.html>
More information about the Xymon
mailing list