[Xymon] False SSL cert alerts
Jonathan Trott
jtrott at dancrai.com
Thu Jun 29 01:55:36 CEST 2017
"Xymon" <xymon-bounces at xymon.com> wrote on 28/06/2017 21:52:42:
> From: Zoltan Forray <zforray at vcu.edu>
> To: Phil Crooker <Phil.Crooker at orix.com.au>
> Cc: "xymon at xymon.com" <xymon at xymon.com>
> Date: 28/06/17 22:00
> Subject: Re: [Xymon] False SSL cert alerts
> Sent by: "Xymon" <xymon-bounces at xymon.com>
>
> Thanks for the help and the command. However, since I know very
> little about certs, here is the results:
>
> [xymon at xymon1 etc]$ openssl s_client -connect quikfm.vcu.edu:443
-showcerts
> CONNECTED(00000003)
> write:errno=104
> ---
> no peer certificate available
> ---
> No client certificate CA names sent
> ---
> SSL handshake has read 0 bytes and written 247 bytes
> ---
> New, (NONE), Cipher is (NONE)
> Secure Renegotiation IS NOT supported
> Compression: NONE
> Expansion: NONE
> ---
Have you tried adding the keyword "sni" to the end of the host line in the
hosts.cfg?
The equivalent test from the shell is :
openssl s_client -connect quikfm.vcu.edu:443 -servername quikfm.vcu.edu
Thanks,
JT
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.xymon.com/pipermail/xymon/attachments/20170629/bf2ef698/attachment.html>
More information about the Xymon
mailing list