My dilemma,
I need to send, deemed confidential, information via e-mail (SMTP). This information is sitting as a file on AIX. Typically I can send this data as a e-mail attachment via what we term a "mail filter" using telnet. I now would like to somehow encrypt the data and send it to a e-mail... (1 Reply)
Hi,
Hi I have setup Websphere Portal and Apache server on Solaris.
The problem is that clients are allowed to negotiate lower encryption levels and by default the Websphere Apache HTTP server accepts 56-bit keys (your Firefox client requested 256-bit AES below).
So How to disable... (0 Replies)
Hello all,
I have a problem with my x4270_m2 server. I have a GBE lan built into the back of my server and I have a QGE pci card in slot 2 to be used as a redundant.
My server is not picking up the QGE lan card in slot2. From investigation of the /etc/path_to_inst, which shows:
#grep e1000... (2 Replies)
Hi All
*
Need some help on testing if a server supports weak ciphers .
Here is the command I ran :
openssl s_client -connect HOSTNAME:443 -cipher LOW:EXP
result :
Connected : err num=110
openssl s_client -connect HOSTNAME:8000 -cipher LOW:EXP
result :
Connected : err... (0 Replies)
Hi All
*
Need some help on testing if a server supports weak ciphers .
Here is the command I ran :
openssl s_client -connect HOSTNAME:443 -cipher LOW:EXP
result :
Connected : err num=110
openssl s_client -connect HOSTNAME:8000 -cipher LOW:EXP
result :
Connected : err... (1 Reply)
Hello,
One of my co-worker changed our the ssh ciphers that we currently use.
We made a change to /etc/ssh/ssh_config on our Solaris 10 servers. Security said that we have to use aes128-ctr or higher, but not aes128-cbc.
The issue is that many of the ssh clients (Tectia) on Windows will not... (0 Replies)
Hi all,
I'm looking for secure file encryption tools that use MAC address as encryption key. FYI, I'm using Red Hat Enterprise Linux OS.
For example: when A wants to send file to B
A will encrypt the file with B's computer MAC/IP address as an encryption key
This file can only be decrypted... (2 Replies)
Hi All
Is any one know how to diable CBC mode cipher encryption along with MD5 & 96 bit MAC algorithm in solaris 10.
Regards (4 Replies)
Discussion started by: amity
4 Replies
LEARN ABOUT MOJAVE
curlopt_proxy_ssl_cipher_list
CURLOPT_PROXY_SSL_CIPHER_LIST(3) curl_easy_setopt options CURLOPT_PROXY_SSL_CIPHER_LIST(3)NAME
CURLOPT_PROXY_SSL_CIPHER_LIST - specify ciphers to use for proxy TLS
SYNOPSIS
#include <curl/curl.h>
CURLcode curl_easy_setopt(CURL *handle, CURLOPT_PROXY_SSL_CIPHER_LIST, char *list);
DESCRIPTION
Pass a char *, pointing to a zero terminated string holding the list of ciphers to use for the connection to the HTTPS proxy. The list must
be syntactically correct, it consists of one or more cipher strings separated by colons. Commas or spaces are also acceptable separators
but colons are normally used, !, - and + can be used as operators.
For OpenSSL and GnuTLS valid examples of cipher lists include 'RC4-SHA', 'SHA1+DES', 'TLSv1' and 'DEFAULT'. The default list is normally
set when you compile OpenSSL.
You'll find more details about cipher lists on this URL:
https://www.openssl.org/docs/apps/ciphers.html
For NSS, valid examples of cipher lists include 'rsa_rc4_128_md5', 'rsa_aes_128_sha', etc. With NSS you don't add/remove ciphers. If one
uses this option then all known ciphers are disabled and only those passed in are enabled.
You'll find more details about the NSS cipher lists on this URL:
http://git.fedorahosted.org/cgit/mod_nss.git/plain/docs/mod_nss.html#Directives
The application does not have to keep the string around after setting this option.
DEFAULT
NULL, use internal default
PROTOCOLS
All
EXAMPLE
TODO
AVAILABILITY
Added in 7.52.0
If built TLS enabled.
RETURN VALUE
Returns CURLE_OK if TLS is supported, CURLE_UNKNOWN_OPTION if not, or CURLE_OUT_OF_MEMORY if there was insufficient heap space.
SEE ALSO CURLOPT_PROXY_SSLVERSION(3), CURLOPT_USE_SSL(3), CURLOPT_SSLVERSION(3),
libcurl 7.54.0 December 21, 2016 CURLOPT_PROXY_SSL_CIPHER_LIST(3)