Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SSL_​VERIFY_​NONE for client is deprecated #29

Open
SUS-EDV opened this issue Oct 20, 2016 · 0 comments
Open

SSL_​VERIFY_​NONE for client is deprecated #29

SUS-EDV opened this issue Oct 20, 2016 · 0 comments

Comments

@SUS-EDV
Copy link

SUS-EDV commented Oct 20, 2016

Hello,

I'm using pve-monitor 1.07 on CentOS 7 and getting this warning on every command execution :

Using the default of SSL_​verify_​mode of SSL_​VERIFY_​NONE for client is deprecated! Please set SSL_​verify_​mode to SSL_​VERIFY_​PEER together with SSL_​ca_​file If you really don't want to verify the certificate and keep the connection open to Man-​In-​The-​Middle attacks please set SSL_​verify_​mode explicitly to SSL_​VERIFY_​NONE in your application. ******************************************************************* at /usr/lib64/perl5/LWP/Protocol/http.​pm line 35. length​() used on @array (did you mean "scalar​(@array)​"?) at /usr/lib64/perl5/IO/Compress/Zlib/Extra.​pm line 198. ******************************************************************* Using the default of SSL_​verify_​mode of SSL_​VERIFY_​NONE for client is deprecated! Please set SSL_​verify_​mode to SSL_​VERIFY_​PEER together with SSL_​ca_​file If you really don't want to verify the certificate and keep the connection open to Man-​In-​The-​Middle attacks please set SSL_​verify_​mode explicitly to SSL_​VERIFY_​NONE in your application. ******************************************************************* at /usr/lib64/perl5/LWP/Protocol/http.​pm line 35. ******************************************************************* Using the default of SSL_​verify_​mode of SSL_​VERIFY_​NONE for client is deprecated! Please set SSL_​verify_​mode to SSL_​VERIFY_​PEER together with SSL_​ca_​file If you really don't want to verify the certificate and keep the connection open to Man-​In-​The-​Middle attacks please set SSL_​verify_​mode explicitly to SSL_​VERIFY_​NONE in your application. ******************************************************************* at /usr/lib64/perl5/LWP/Protocol/http.​pm line 35. ******************************************************************* Using the default of SSL_​verify_​mode of SSL_​VERIFY_​NONE for client is deprecated! Please set SSL_​verify_​mode to SSL_​VERIFY_​PEER together with SSL_​ca_​file If you really don't want to verify the certificate and keep the connection open to Man-​In-​The-​Middle attacks please set SSL_​verify_​mode explicitly to SSL_​VERIFY_​NONE in your application. ******************************************************************* at /usr/lib64/perl5/LWP/Protocol/http.​pm line 35. OPENVZ OK 5 / 5 working VMs

It is saying that it is possible to "SSL_​verify_​mode explicitly to SSL_​VERIFY_​NONE" but it'd be insecure.

I have installed it as follows:

yum install perl-CPAN perl-JSON perl-libwww-perl perl-IO-Socket-SSL perl-Switch
cpan install Net::Proxmox::VE
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant