Hello, I recently upgraded my master node to Debian 10, and now I have a system-wide config setting the minimum TLS version to 1.2
$ tail -3 /etc/ssl/openssl.cnf [system_default_sect] MinProtocol = TLSv1.2 CipherString = DEFAULT@SECLEVEL=2 $ It is enfonced in icinga, and with this setting my (very) old nodes connect connect, as they only have openssl 0.9.8, which cannot handle TLS 1.2 Setting MinProtocol = TLSv1 in /etc/ssl/openssl.cnf allows them to connect, but it affects the whole system. In the Object 'api' of type 'ApiListener', there is a value called tls_protocolmin: * tls_protocolmin = "TLSv1" But it seems it's only enfonced if it's more restrictive than the system setting: - if I set system to TLSv1 and tls_protocolmin to TLSv1.2, I cannot connect - if I set system to TLSv1.2 and tls_protocolmin to TLSv1, I cannot connect neither - if both are set to TLSv1, I can connect Is there a way to make it override the system setting ? Or any other configuration option to force icinga to allow more protocols than system_default_sect defines ? I'm using icinga 2.10.5-1.buster Thanks, -- Bastien Durel DATA Intégration des données de l'entreprise, Systèmes d'information décisionnels. bastien.du...@data.fr tel : +33 (0) 1 57 19 59 28 fax : +33 (0) 1 57 19 59 73 12 avenue Raspail, 94250 GENTILLY France www.data.fr _______________________________________________ icinga-users mailing list icinga-users@lists.icinga.org https://lists.icinga.org/mailman/listinfo/icinga-users