A new CentOS Linux release 8.3.2011 system, install svn with 'sudo yum install subversion',the version of svn is 'svn, version 1.10.2 (r1835932)'
after execute command 'svn list https://mydomain:4443/svn/', I see blow chars:
svn: E170013: Unable to connect to a repository at URL 'https://myserver:4443/svn/'
svn: E120171: Error running context: An error occurred during SSL communication
In centos 7, svn version 1.7. I will get a question and I can input 'p' to ignore ssl validation forever. But centos8 is not. Why?
It's not a problem with SVN, but with the SSL/TLS library packaged with the client and the SSL/TLS protocol it supports. I guess that that the newer svn client version does not support outdated SSL/TLS protocol versions for security reasons. You can always check the versions with the svn --version -v command.
Check which SSL/TLS versions your client and server support and consider upgrading the server. I think that it does not support modern SSL/TLS protocol versions.
Related
our Jenkins build failed with this error
Unable to access "https://bitbucket.org/.../xx.git", error:14077410:SSL routines:SSL23_GET_SERVER_HELLO:sslv3 alert handshake failure
Obviously it is linked to the depreciation of TLS1.1 and 1.0, but I did check the jenkins slave JDK, it is JDK1.8.0.
Any idea? Thanks in advance.
I had the same problem. It turned out my Windows Jenkins node was using git version 1.9. I uninstalled that one and installed the most recent version (2.19.2 at the moment).
You can call git --version to get the version your system is using.
Now my Windows Jenkins node is back online and working properly.
I tried to install the latest version of Juniper.junos on my Mac :
sudo ansible-galaxy install Juniper.junos
-downloading role 'junos', owned by Juniper
-downloading role from https://github.com/Juniper/ansible-junos-stdlib/archive/2.0.2.tar.gz
[ERROR]: failed to download the file: Failed to validate the SSL certificate for github.com:443. Make sure your managedsystems have a valid CA certificate installed. You can use validate_certs=False if you do not need to confirm the servers identity but this is unsafe and not recommended. Paths checked for this platform: /etc/ssl/certs, /etc/ansible, /usr/local/etc/openssl. The exception msg was: [SSL: TLSV1_ALERT_PROTOCOL_VERSION] tlsv1 alert protocol version (_ssl.c:590).
[WARNING]: - Juniper.junos was NOT installed successfully.
ERROR! - you can use --ignore-errors to skip failed roles and finish processing the list.
ansible-galaxy --version
ansible-galaxy 2.5.0
I already tried with different ansible versions, but the error is still the same.
We are facing this issue sometimes, it’s connectivity issue to install module via ansible-galaxy, not related to Juniper ansible module.
Kindly use below command for installation, it will work well.
sudo ansible-galaxy install git+https://github.com/Juniper/ansible junos-stdlib.git,,Juniper.junos
[abc#hostname /homes/abc] sudo ansible-galaxy install git+https://github.com/Juniper/ansible-junos-stdlib.git,,Juniper.junos
- extracting Juniper.junos to /homes/babud/.ansible/roles/Juniper.junos
- Juniper.junos was installed successfully
I need Apache2.4 with ssl.
AWS RHEL server I am using already has Apache2.2 and openssl 0.9 installed. I configured my Apache,apr,apr-util and pcre packages at /opt/products/apache2. everything is fine except the option
--enable-ssl
fails due to a dependency failure (openssl > 0.9.8a). No problem. I downloaded openssl 1.0.2a from open ssl and configured and installed it at /opt/openssl without problem.
Now I need to configure Apache with
--enable-ssl --with-ssl=/opt/openssl
but the configure command returns the error
"invalid variable name 'with-ssl'".
configure -help shows that with-ssl is an option.
Is this a bug or something? I don't find any reference on the internet.
Just wanted to update for anyone looking at this later.
Installing all the pre-requisites before configuring apache solves the problem of apache giving version error. So this command before the apache configuration solved the problem:
yum install gcc libxml2-devel gcc-c++ libicu-devel libxslt-devel bzip2 bzip2-devel libjpeg-devel libpng libpng-devel freetype freetype-devel curl curl-devel t1lib-devel unixODBC-devel openssl-devel openssl
and I did not have to install openssl separately.
we are using apache webserver ver 2.2.3 with open SSL version 0.9.8e-fips-rhel5 (linux environment). We are required to upgrade the openSSL to the latest version for security reasons. I have following doubts
as per https://www.openssl.org/news/secadv_20140605.txt, ver 0.9.8 should be upgraded to 0.9.8za. Please let me know if its ok to upgrade to 0.9.8za or we should go for 1.0.1h
what is the procedure of upgrading openssl which comes with apache webserver
Is it required to regenerate the keys and certificate again
You can update with below command
yum update openssl
i recently installed uwsgi 2.0.3 on debian via aptitude.
now i am trying to run the default websocket example, but the log tells me:
you need to build uWSGI with SSL support to use the websocket handshake api function !!!
[uwsgi-perl error] unable to complete websocket handshake at ...
I am a bit puzzled, since i cannot find a ssl-plugin and i can't see any options to turn on/off ssl-support. I really want to stick with aptitude, installing uwsgi manually is not preferred, beside i have no clue how to enable it manually either.
Does anyone know how to enable uwsgi-ssl support in debian the aptitude way?
btw.
i also removed uwsgi with aptitude remove --purge uwsgi
installed libssl-dev and reinstalled uwsgi
but without luck :(
You must compile uwsgi yourself if you want the SSL support. Debian hasn't packaged a version of uwsgi with SSL support. I know, it's annoying for updates ... but you haven't the choice.
You just need to run apt-get install build-essential python python-dev libssl-dev, then python uwsgiconfig.py ...