where can I find the settings?
Code: Select all
"On your nrdp server go to Admin, Monitoring Config, Unconfigured Objects."There is no such thing in the NRDP web interface
Code: Select all
"On your nrdp server go to Admin, Monitoring Config, Unconfigured Objects."Code: Select all
curl -v -L http://core.server.com/nrdp/Code: Select all
% Total % Received % Xferd Average Speed Time Time Time Current
Dload Upload Total Spent Left Speed
0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* Trying xxx.xxx.xxx.xxx:80...
* TCP_NODELAY set
* Connected to nagioscorehostname.net (xxx.xxx.xxx.xxx) port 80 (#0)
> GET /nrdp/ HTTP/1.1
> Host: nagioscorehostname.net
> User-Agent: curl/7.68.0
> Accept: */*
>
* Mark bundle as not supporting multiuse
< HTTP/1.1 302 Found
< Date: Fri, 28 May 2021 05:09:18 GMT
< Server: Apache/2.4.18 (Ubuntu)
< Location: https://nagioscorehostname.net/nrdp/
< Content-Length: 314
< Content-Type: text/html; charset=iso-8859-1
<
* Ignoring the response-body
{ [314 bytes data]
100 314 100 314 0 0 153k 0 --:--:-- --:--:-- --:--:-- 153k
* Connection #0 to host nagioscorehostname.net left intact
* Issue another request to this URL: 'https://nagioscorehostname.net/nrdp/'
* Trying xxx.xxx.xxx.xxx:443...
* TCP_NODELAY set
* Connected to nagioscorehostname.net (xxx.xxx.xxx.xxxx) port 443 (#1)
* ALPN, offering h2
* ALPN, offering http/1.1
* successfully set certificate verify locations:
* CAfile: /etc/ssl/certs/ca-certificates.crt
CApath: /etc/ssl/certs
} [5 bytes data]
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
} [512 bytes data]
* TLSv1.3 (IN), TLS handshake, Server hello (2):
{ [108 bytes data]
* TLSv1.2 (IN), TLS handshake, Certificate (11):
{ [1874 bytes data]
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
{ [147 bytes data]
* TLSv1.2 (IN), TLS handshake, Server finished (14):
{ [4 bytes data]
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
} [70 bytes data]
* TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):
} [1 bytes data]
* TLSv1.2 (OUT), TLS handshake, Finished (20):
} [16 bytes data]
* TLSv1.2 (IN), TLS handshake, Finished (20):
{ [16 bytes data]
* SSL connection using TLSv1.2 / ECDHE-ECDSA-AES256-GCM-SHA384
* ALPN, server accepted to use http/1.1
* Server certificate:
* subject: C=DE; ST=xxxxxxxxxxxx; L=xxxxxxxxxxxxx; O=xxxxxxxxxx; CN=nagioscorehostname.net
* start date: Apr 29 11:20:00 2021 GMT
* expire date: Apr 28 11:20:00 2026 GMT
* subjectAltName: host "nagioscorehostname.net" matched cert's "nagioscorehostname.net"
* issuer: C=DE; ST=xxxxxxxxxxxxxx; L=xxxxxxxxxxx; O=xxxxxxxxxxxxx; CN=xxxxxxxxxxx CA1
* SSL certificate verify ok.
} [5 bytes data]
> GET /nrdp/ HTTP/1.1
> Host: nagioscorehostname.net
> User-Agent: curl/7.68.0
> Accept: */*
>
{ [5 bytes data]
* Mark bundle as not supporting multiuse
< HTTP/1.1 200 OK
< Date: Fri, 28 May 2021 05:09:18 GMT
< Server: Apache/2.4.18 (Ubuntu)
< Vary: Accept-Encoding
< Transfer-Encoding: chunked
< Content-Type: text/html; charset=UTF-8
<
{ [5 bytes data]
100 10590 0 10590 0 0 544k 0 --:--:-- --:--:-- --:--:-- 544k
* Connection #1 to host nagioscorehostname.net left intactCode: Select all
cd /tmp
openssl s_client -showcerts -servername <server> -connect <server>:443 > cacert.pemCode: Select all
openssl x509 -outform der -in cacert.pem -out cacert.crtCode: Select all
sudo cp cacert.crt /usr/local/share/ca-certificatesCode: Select all
sudo dpkg-reconfigure ca-certificates Code: Select all
sudo update-ca-certificatesCode: Select all
root@logserverdomain:/tmp# openssl s_client -showcerts -servername nagioscoredomain.net -connect nagioscoredomain.net:443 > cacert.pem
depth=2 C = DE, ST = XXXXXXX, L = XXXXXXXX, O = XXXXXXXXXXXXx, CN = XXXXXXXX Root CA
verify error:num=19:self signed certificate in certificate chain
verify return:1
depth=2 C = DE, ST = XXXXXXXXXXXx, L = XXXXXXXXXx, O = XXXXXXXXXXXXXX, CN = XXXXXXXX Root CA
verify return:1
depth=1 C = DE, ST = XXXXXXXXXXXx, L = XXXXXXXXXXX, O = XXXXXXXXXx, CN = XXXXXXX Intermediate CA1
verify return:1
depth=0 C = DE, ST = XXXXXXXXX, L = XXXXXXXXXXXx, O = XXXXXXXXXXXXx, CN = nagioscoredomain.net
verify return:1Code: Select all
root@logserverdomain:/tmp# update-ca-certificates
Updating certificates in /etc/ssl/certs...
rehash: warning: skipping RootCAChainIntermediate1.pem,it does not contain exactly one certificate or CRL
rehash: warning: skipping nagioscoredomain.pem,it does not contain exactly one certificate or CRL
rehash: warning: skipping cacert.pem,it does not contain exactly one certificate or CRL
1 added, 0 removed; done.
Running hooks in /etc/ca-certificates/update.d...
Adding debian:cacert.pem
done.
done.