://docs.sun.com/app/docs/doc/816-4555/gcbjy?a=view
4.http://www.mail-archive.com/pca@lists.univie.ac.at/
http://www.mail-archive.com/pca@lists.univie.ac.at/
Suggestions, ideas, are welcome.
Best regards
Michele
P.S.:excuse me for bad English, but Italian :)
--
Michele Vecchiato
http
Martin Paul wrote:
Don O'Malley wrote:
Infodoc 81509 : Configuring SSL for Apache 2 bundled in Solaris 10
which sounds exactly like what you want, but this document doesn't
seem to exist (anymore); strange.
That document now lives at:
Don O'Malley wrote:
Hi Martin,
As you are probably well aware SunSolve previously had it's own search
tool (i.e. the SunSolve Advanced Search), which allowed customers to
select the SunSolve Collection (eg. Bug Reports, Patch Descriptions,
SunAlerts, Technical Instruction, etc) that they
Hi Kevin,
IMHO: think the problem is on the *device driver fiber card that works
badly in some conditions* (momentary loss of connection, badly
masking/zoning, etc.). Try to investigate in this direction...See my
email quote bottom(start with MV).
Could be a similar problem with the network
Hi Martin,
I searched on the ML archive the hardening topic, but I did not find any
posts that responded to what I ask you.
WHEREAS, the hardenig of Solaris is not a issue that PCA must resolve,
can suggest for the next version a control if JASS (JumpStart
Architecture and Security Scripts,
Il giorno lun, 19/04/2010 alle 14.33 +0200, Ihsan Dogan ha scritto:
Hi,
Hi Ihsan
I have to rebuild a system with a certain patch level. This mainly,
because all the patches have to be approved by the software vendor first.
You want clone the OS + patches installed on host A into host B?
Ok, I'm a paranoid person ;-), but how does pca to verify that the patch
downloaded from Oracle site is not corrupt? I search on PCA ML archive
but no answer...
You have never done this kind of testing?
To answer this question made a shell script that downloads the file
CHECKSUMS
MB/s) - `/var/tmp/pca/120185-22.tmp' saved
[292265504/292265504]
Done
--
Download Summary: 1 total, 1 successful, 0 skipped, 0 failed
r...@pcaclient #
By
Michele
--
Michele Vecchiato
Blog http
2010/12/27 Martin Paul mar...@par.univie.ac.at:
This could be a different problem - if the pca-proxy returns 404 to the pca
client, it failed to download the patch successfully. To find out why, you
would need to add debug=1 to the pca-proxy.conf file and watch
/var/tmp/pca-proxy-debug.txt for
118666-32. All OK for me.
HTH
P.S.: Excuse me for bad English :-)
--
Michele Vecchiato
Blog http://michelevecchiato.wordpress.com
Option download: 1
Option xrefdir: /var/patches/pca
Option patchdir: /var/patches/pca
Option patchurl: https://MY PCA PROXY/cgi-bin/pca-proxy.cgi?
Option xrefurl: https
--
Michele Vecchiato
Blog http://michelevecchiato.wordpress.com
LinkedIn profile http://www.linkedin.com/in/michelevecchiato
harvesting at least would have to be done only
once, and not by every PCA user.
Martin.
Martin, you're a genius!
Toc toc! Excuse me, Mr.Oracle, what do you think?
Bye
Michele
--
Michele Vecchiato
e-mail mailto:michele.vecchiato::at::gmail.com
Blog http://michelevecchiato.wordpress.com
LinkedIn
). Any tips?
--
Michele Vecchiato
LinkedIn pub profile http://www.linkedin.com/in/michelevecchiato
ate = off
*secure_protocol = TLSv1*
waitretry = 10
root@sunlab1:/[2]$
HTH
Michele.
2017-02-17 13:47 GMT+01:00 Michele Vecchiato <michele.vecchi...@gmail.com>:
> Hi Martin,
> Apache pre-installed (Bundled with OS) was already updated to the latest
> version.
>
> root@pdpcasrv1
n.p...@univie.ac.at>:
> Am 17.02.2017 um 11:11 schrieb Michele Vecchiato:
>
>> Thanks Martin,
>> i don't understand why with wget 1.18 the SSL Handshake failed and
>> with
>> 1.16 work fine...
>> When try to connect with the wget 1.18 client version, the apache
doesn't like to talk HTTPS to your local PCA
> proxy, I guess you'll need to collect wget debug information (put --debug
> in PCA's "wgetopt"-option or in a wgetrc or the like, or try wget outside
> of PCA) or check the log files of your PCA proxy web server.
>
> Martin.
>
16 matches
Mail list logo