[Xymon] False SSL cert alerts

Jonathan Trott jtrott at dancrai.com
Thu Jun 29 01:55:36 CEST 2017


"Xymon" <xymon-bounces at xymon.com> wrote on 28/06/2017 21:52:42:

> From: Zoltan Forray <zforray at vcu.edu>
> To: Phil Crooker <Phil.Crooker at orix.com.au>
> Cc: "xymon at xymon.com" <xymon at xymon.com>
> Date: 28/06/17 22:00
> Subject: Re: [Xymon] False SSL cert alerts
> Sent by: "Xymon" <xymon-bounces at xymon.com>
> 
> Thanks for the help and the command.  However, since I know very 
> little about certs, here is the results:
> 
> [xymon at xymon1 etc]$ openssl s_client -connect quikfm.vcu.edu:443 
-showcerts
> CONNECTED(00000003)
> write:errno=104
> ---
> no peer certificate available
> ---
> No client certificate CA names sent
> ---
> SSL handshake has read 0 bytes and written 247 bytes
> ---
> New, (NONE), Cipher is (NONE)
> Secure Renegotiation IS NOT supported
> Compression: NONE
> Expansion: NONE
> ---

Have you tried adding the keyword "sni" to the end of the host line in the 
hosts.cfg?

The equivalent test from the shell is :

openssl s_client -connect quikfm.vcu.edu:443 -servername quikfm.vcu.edu

Thanks,
JT
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.xymon.com/pipermail/xymon/attachments/20170629/bf2ef698/attachment.html>


More information about the Xymon mailing list