Custom Query (196 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (184 - 186 of 196)

Ticket Resolution Summary Owner Reporter
#346 fixed Graph sql connection count with munin adehnert
Description

#328 added nagios monitoring of used connections. In tuning those thresholds (and for fun), it would be nice if munin graphed the number of (total and max per-user) connections to sql as well.

#349 invalid TLS SNI alerts on LDAP vhosts presbrey
Description

void is a scripts-vhost:

presbrey@dr-wily:~$ host void.mit.edu
void.mit.edu is an alias for SCRIPTS-VHOSTS.mit.edu.
SCRIPTS-VHOSTS.mit.edu has address 18.181.0.46

that fails to handshake:

presbrey@dr-wily:~$ curl -k https://void.mit.edu/
curl: (35) error:14077458:SSL routines:SSL23_GET_SERVER_HELLO:reason(1112)

even though scripts-vhosts itself works:

presbrey@dr-wily:~$ curl -kv https://scripts-vhosts.mit.edu/
* About to connect() to scripts-vhosts.mit.edu port 443 (#0)
*   Trying 18.181.0.46... connected
* Connected to scripts-vhosts.mit.edu (18.181.0.46) port 443 (#0)
* successfully set certificate verify locations:
*   CAfile: none
  CApath: /etc/ssl/certs
* SSLv3, TLS handshake, Client hello (1):
* SSLv3, TLS handshake, Server hello (2):
* SSLv3, TLS handshake, CERT (11):
* SSLv3, TLS handshake, Server key exchange (12):
* SSLv3, TLS handshake, Server finished (14):
* SSLv3, TLS handshake, Client key exchange (16):
* SSLv3, TLS change cipher, Client hello (1):
* SSLv3, TLS handshake, Finished (20):
* SSLv3, TLS change cipher, Client hello (1):
* SSLv3, TLS handshake, Finished (20):
* SSL connection using DHE-RSA-AES256-SHA
* Server certificate:
*        subject: serialNumber=sKLt5io360jM-oAd2EGLNK0EraXwXE46; C=US; ST=Massachusetts; L=Cambridge; O=Massachusetts Institute of Technology; OU=scripts.mit.edu web hosting service; CN=scripts.mit.edu
*        start date: 2011-05-24 11:40:52 GMT
*        expire date: 2016-06-24 16:28:06 GMT
*        subjectAltName does not match scripts-vhosts.mit.edu
> GET / HTTP/1.1
> User-Agent: curl/7.21.0 (x86_64-pc-linux-gnu) libcurl/7.21.0 OpenSSL/0.9.8o zlib/1.2.3.4 libidn/1.15 libssh2/1.2.6
> Host: scripts-vhosts.mit.edu
> Accept: */*
>
< HTTP/1.1 200 OK
< Date: Thu, 28 Feb 2013 02:21:46 GMT

The problem has to do with TLS SNI extensions. TLS Alert 1112 is Level 1 (Warning) and Code 112 (Unrecognized name). This error is intended to notify the client that the server may not do what the client is expecting when the server does not recognize the SNI hostname passed by the client.

The server-side TLS SNI that validates "recognized" hostnames apparently only checks against hardcoded ServerName?(s) and ServerAlias?(s), and fails to locate LDAP vhosts as valid SNI targets.

#352 fixed Monitor scripts hosts adehnert
Description

We should monitor scripts hosts with the usual battery of load, disk usage, ssh, ping, etc. checks. It's kinda lame that when a-h (seemingly) died today we got alerts only from the guests on it.

Note: See TracQuery for help on using queries.