NAC 4.7.1 and SSL

Hi,
I was running V4.1.2 up until recently for my nac install.  This needed to be  upgraded to support windows 7 so the CAM and CAS were upgraded to version  4.7.1.  The CAS is running a trusted certificate from Entrust and the CAM is  running a self signed cert (perfigo).
First question is will this work with version 4.7.1?  I have read a lot of  threads about SSL being used between the CAM and CAS.
I have gone through the steps to export the CAM Cert and import it into the  CAS Trusted certificate Authorities and vice versa but I still get the following  error message on the CAS:
"Warning: The current Trusted Certificate Authority  'www.perfigo.com' is suited for lab environments only. Cisco recommends  importing a third-party Certificate Authority. Please check your Clean Access  Manager(s) and standby Clean Access Server for similar messages. "
Is this purely because I am using the self signed Cert on the CAM?  If I  purchase a cert from Entrust for the CAM, will this correct the problem?
Appreciate any support with this,
Cheers
Brian

Check your CAS Trusted certificate authorities,
You must be still having the old www.perfigo.com cert in there.
As you have come from V4.1.2
If you delete that the problem will be solved.
Regards
Eddy

Similar Messages

  • Securing file download with standard web security and ssl

    Hi,
    I want to put some files for download in my webapp. At the same time, I want to protect these files using standard servlet security and ssl. So I added <security-constraint> in my web.xml and configured tomcat to allow SSL connection. Now I got the files protected as I expected. When I try to access the file directly from browser, tomcat shows me the login page. However, after correct login, I.E. pops up an error saying something like "Internet Explorer cannot download XXX from XXX. The file could not be written to the cache.". The log file showed the following exception:
    javax.net.ssl.SSLException: Connection has been shutdown: javax.net.ssl.SSLException: java.net.SocketException: Connection reset by peer: socket write error
         at com.sun.net.ssl.internal.ssl.SSLSocketImpl.checkEOF(SSLSocketImpl.java:1154)
         at com.sun.net.ssl.internal.ssl.AppInputStream.available(AppInputStream.java:40)
         at org.apache.tomcat.util.net.TcpConnection.shutdownInput(TcpConnection.java:90)
         at org.apache.coyote.http11.Http11Protocol$Http11ConnectionHandler.processConnection(Http11Protocol.java:752)
         at org.apache.tomcat.util.net.PoolTcpEndpoint.processSocket(PoolTcpEndpoint.java:526)
         at org.apache.tomcat.util.net.LeaderFollowerWorkerThread.runIt(LeaderFollowerWorkerThread.java:80)
         at org.apache.tomcat.util.threads.ThreadPool$ControlRunnable.run(ThreadPool.java:684)
         at java.lang.Thread.run(Thread.java:595)
    Caused by: javax.net.ssl.SSLException: java.net.SocketException: Connection reset by peer: socket write error
         at com.sun.net.ssl.internal.ssl.Alerts.getSSLException(Alerts.java:166)
         at com.sun.net.ssl.internal.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1476)
         at com.sun.net.ssl.internal.ssl.SSLSocketImpl.fatal(SSLSocketImpl.java:1443)
         at com.sun.net.ssl.internal.ssl.SSLSocketImpl.handleException(SSLSocketImpl.java:1407)
         at com.sun.net.ssl.internal.ssl.AppOutputStream.write(AppOutputStream.java:64)
         at org.apache.coyote.http11.InternalOutputBuffer.realWriteBytes(InternalOutputBuffer.java:747)
         at org.apache.tomcat.util.buf.ByteChunk.flushBuffer(ByteChunk.java:403)
         at org.apache.coyote.http11.InternalOutputBuffer.endRequest(InternalOutputBuffer.java:400)
         at org.apache.coyote.http11.Http11Processor.action(Http11Processor.java:961)
         at org.apache.coyote.Response.action(Response.java:182)
         at org.apache.coyote.Response.finish(Response.java:304)
         at org.apache.catalina.connector.OutputBuffer.close(OutputBuffer.java:281)
         at org.apache.catalina.connector.Response.finishResponse(Response.java:473)
         at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:151)
         at org.apache.coyote.http11.Http11Processor.process(Http11Processor.java:825)
         at org.apache.coyote.http11.Http11Protocol$Http11ConnectionHandler.processConnection(Http11Protocol.java:738)
         ... 4 more
    Caused by: java.net.SocketException: Connection reset by peer: socket write error
         at java.net.SocketOutputStream.socketWrite0(Native Method)
         at java.net.SocketOutputStream.socketWrite(SocketOutputStream.java:92)
         at java.net.SocketOutputStream.write(SocketOutputStream.java:136)
         at com.sun.net.ssl.internal.ssl.OutputRecord.writeBuffer(OutputRecord.java:283)
         at com.sun.net.ssl.internal.ssl.OutputRecord.write(OutputRecord.java:272)
         at com.sun.net.ssl.internal.ssl.SSLSocketImpl.writeRecord(SSLSocketImpl.java:663)
         at com.sun.net.ssl.internal.ssl.AppOutputStream.write(AppOutputStream.java:59)
         ... 15 more
    I've tried separating concerns, for example protect files but not require SSL, and enable SSL but do not protect files. Both works respectively but not together. I also tried using a download4j's DownloadServlet. Still doesn't work.
    Have any of you encouter the same situation? If so, could you enlight me what I did wrong? It maybe just a simple SSL configuration or something. Thanks in advance!
    Jack

    My environment setup is:
    JDK 1.5.01
    Tomcat 5.5.7
    For downloading files, I just use plain old <a href> method. I simply right-click the link and choose "save target as...".
    Thanks,
    Jack

  • Apache, iPrint and SSL/nile.nlm

    Hi,
    Getting various abends on a daily basis. Server is running as a vm on ESX 4.1 on an AMD platform. The running process is not always the same (apache_workprocess, seg.nlm, pcountdp.nlm) but the type of abend seems to be very consistent. It is the "Kernel detected an attempted context switch in an MPK Fast WTD". Another consistency seems to be that SSL and nile.nlm are high up on the stack - but maybe that is just normal for any iPrint server with secure iprint enabled on every printer (about 400 printer agents).
    Thinking it might be a bad cert I have tried using both the self-signed "SSL CertificateDNS" cert and a third-party (Thawte) cert. Same result in either case. I have also tried the various tweaks on ESX for NetWare guest vm's :
    - setting the memory reservation
    - settting cpu affinity,
    - setting the virtualization method to use hardware (Intel/AMD mmu and Intel/AMD instruction set) rather than automatic,
    - removing the acpidrv.psm module from startup.ncf
    - I have NOT set the NUMA memory node affinity.
    The last thing I can think of to try is to turn off secure iPrint. If I do that, can I load apache without it listening on port 443 and not break any iPrint services? I do have iManager running on this same guest as well but I do not need it there.
    Any other ideas?
    Thanks,
    Ron
    Below are two recent abends, one with pcountdp.nlm and the second with apache_worker process. I've cut the nlm list on the second abend to get it to fit into this post.
    Server N05 halted Monday, November 21, 2011 12:53:52.463 pm
    Abend 1 on P00: Server-5.70.08-1315: Kernel detected an attempted context switch in an MPK Fast WTD.
    Registers:
    CS = 0008 DS = 0010 ES = 0010 FS = 0010 GS = 0023 SS = 0010
    EAX = 00000000 EBX = 00000001 ECX = 00000000 EDX = 00090009
    ESI = 00000006 EDI = A00D19D8 EBP = FBF138DB ESP = 8FD9DE9C
    EIP = 0021AB7A FLAGS = 00000002
    0021AB7A 83C404 ADD ESP, 00000004
    EIP in SERVER.NLM at code start +00019B5Ah
    The violation occurred while processing the following instruction:
    0021AB7A 83C404 ADD ESP, 00000004
    0021AB7D 833D14D0030000 CMP [SERVER.NLM|SleepNotAllowedUseCount]=00000001
    , 00000000
    0021AB84 7482 JZ 0021AB08
    0021AB86 833DACC1030000 CMP [0003C1AC]=00000000, 00000000
    0021AB8D 0F84D5000000 JZ 0021AC68
    0021AB93 85DB TEST EBX, EBX
    0021AB95 0F84BA000000 JZ 0021AC55
    0021AB9B 8B1DE843F0FB MOV EBX, [FBF043E8]=FBF24D68
    0021ABA1 53 PUSH EBX
    0021ABA2 E8CFDBEFFF CALL LOADER.NLM|Abend
    Running process: PCOUNTDP.NLM 236 Process
    Thread Owned by NLM: PCOUNTDP.NLM
    Stack pointer: 8FD9E1A8
    OS Stack limit: 8FD9B360
    CPU 0 (Thread A52305C0) is in a NO SLEEP state
    Scheduling priority: 67371008
    Wait state: 5050010 Blocked on a Mutex
    Stack: --FBF138DB ?
    --A00D19E0 ?
    --00000006 (LOADER.NLM|KernelAddressSpace+6)
    --A00D19C0 ?
    002186BC (SERVER.NLM|SchedSwitch+48)
    --00000001 (LOADER.NLM|KernelAddressSpace+1)
    --A00D19E0 ?
    --A00D19D8 ?
    --00000006 (LOADER.NLM|KernelAddressSpace+6)
    --A00D19C0 ?
    002064BC (SERVER.NLM|kMutexLock+1AC)
    --A00D19E4 ?
    --A00D1A40 ?
    --8FD9DEF0 ?
    --00000000 (LOADER.NLM|KernelAddressSpace+0)
    --04B4E504 ?
    --9D96379C ?
    883E6AC9 (LIBC.NLM|pthread_mutex_lock+A9)
    --A00D19C0 ?
    --04B4E504 ?
    --00000006 (LOADER.NLM|KernelAddressSpace+6)
    --8FD9DEFC ?
    9EDD3AF1 (NILE.NLM|SSL_library_init+26C)
    --9D96379C ?
    --8FD9DF20 ?
    9EDE3ABF (NILE.NLM|CRYPTO_lock+8F)
    --00000009 (LOADER.NLM|KernelAddressSpace+9)
    --00000009 (LOADER.NLM|KernelAddressSpace+9)
    -9FE9C114 (NILE.NLM|RSA_version+28)
    --000000F6 (LOADER.NLM|KernelAddressSpace+F6)
    -9FEC9448 (NILE.NLM|serverPostFix+1968)
    --8FD9DF24 ?
    --04B4E504 ?
    --8FD9DF48 ?
    9EDE3B44 (NILE.NLM|CRYPTO_add_lock+5A)
    --00000009 (LOADER.NLM|KernelAddressSpace+9)
    --00000009 (LOADER.NLM|KernelAddressSpace+9)
    -9FE9C114 (NILE.NLM|RSA_version+28)
    --000000F6 (LOADER.NLM|KernelAddressSpace+F6)
    --00000000 (LOADER.NLM|KernelAddressSpace+0)
    -9FEC9448 (NILE.NLM|serverPostFix+1968)
    --04B4E504 ?
    --00000006 (LOADER.NLM|KernelAddressSpace+6)
    --8FD9DF70 ?
    9EDE00AF (NILE.NLM|RSA_free+2E)
    --04B6E43C ?
    --FFFFFFFF ?
    --00000009 (LOADER.NLM|KernelAddressSpace+9)
    -9FE9C114 (NILE.NLM|RSA_version+28)
    --000000F6 (LOADER.NLM|KernelAddressSpace+F6)
    -9FEC9448 (NILE.NLM|serverPostFix+1968)
    --04B4E504 ?
    --04B4E504 ?
    --8FD9DF80 ?
    9EDE7A81 (NILE.NLM|EVP_PKEY_free+97)
    --04B6E404 ?
    --00000002 (LOADER.NLM|KernelAddressSpace+2)
    --8FD9DF94 ?
    9EDE7A2A (NILE.NLM|EVP_PKEY_free+40)
    --046B3A84 ?
    9EDF8F2C (NILE.NLM|ASN1_template_free+8A)
    --00000000 (LOADER.NLM|KernelAddressSpace+0)
    --8FD9DFA8 ?
    9EDF3660 (NILE.NLM|PKCS7_DIGEST_free+35)
    --046B3A84 ?
    -9FEA2C70 (NILE.NLM|X509_PUBKEY_it+0)
    --047E85C4 ?
    --8FD9DFEC ?
    9EDF8E7A (NILE.NLM|ASN1_item_ex_free+2A6)
    --00000003 (LOADER.NLM|KernelAddressSpace+3)
    --009052DC ?
    -9FEA2C70 (NILE.NLM|X509_PUBKEY_it+0)
    --A00D1540 ?
    -9FEA2C28 (NILE.NLM|PKCS7_ATTR_VERIFY_it+34)
    -9FEA2C3C (NILE.NLM|PKCS7_ATTR_VERIFY_it+48)
    --A00D1540 ?
    --8FD9DFE8 ?
    -9FEA2C10 (NILE.NLM|PKCS7_ATTR_VERIFY_it+1C)
    9EDF3641 (NILE.NLM|PKCS7_DIGEST_free+16)
    --00000002 (LOADER.NLM|KernelAddressSpace+2)
    --046DFC84 ?
    --047E85C4 ?
    --04B4E504 ?
    --00000003 (LOADER.NLM|KernelAddressSpace+3)
    --8FD9E010 ?
    9EDF8F2C (NILE.NLM|ASN1_template_free+8A)
    --009052DC ?
    -9FEA2C70 (NILE.NLM|X509_PUBKEY_it+0)
    --00000000 (LOADER.NLM|KernelAddressSpace+0)
    --04622844 ?
    --00000005 (LOADER.NLM|KernelAddressSpace+5)
    --009052DC ?
    --00000003 (LOADER.NLM|KernelAddressSpace+3)
    --8FD9E050 ?
    9EDF8E55 (NILE.NLM|ASN1_item_ex_free+281)
    --009052DC ?
    -9FE9B6C4 (NILE.NLM|OID_AES256+760)
    --0000000A (LOADER.NLM|KernelAddressSpace+A)
    -9FE9B6C4 (NILE.NLM|OID_AES256+760)
    -9FE9B6C4 (NILE.NLM|OID_AES256+760)
    Additional Information:
    The NetWare OS detected a problem with the system while executing a process owned by SERVER.NLM. It may be the source of the problem or there may have been a memory corruption.
    Loaded Modules:
    PCOUNTWI.NLM Pcounter Web Interface
    Version 5.50 October 27, 2011
    Code Address: A13A6000h Length: 00006A0Ch
    Data Address: A653C000h Length: 00003AA0h
    NDPSGW.NLM NDPS Gateway
    Version 4.01.02 March 2, 2010
    Code Address: A5D20000h Length: 0000E7FCh
    Data Address: A5199000h Length: 0000737Ch
    PCOUNTDP.NLM Pcounter for NDPS
    Version 5.50 October 27, 2011
    Code Address: A5CE3000h Length: 0002230Bh
    Data Address: A3071000h Length: 00005154h
    NETDB.NLM Network Database Access Module
    Version 4.11.05 January 6, 2005
    Code Address: A5CC9000h Length: 0001394Dh
    Data Address: A5CDD000h Length: 000025FCh
    FPSM.NLM Novell Floating-Point Support Module for NLMs [debugging, 0A10]
    Version 5.90.01 December 12, 2000
    Code Address: A2E26000h Length: 0000003Ch
    Data Address: 00000000h Length: 00000000h
    LPR2NDPS.NLM NDPS Utility to accept UNIX jobs via LPR
    Version 4.00.06 April 16, 2010
    Code Address: A5CB9000h Length: 00009975h
    Data Address: A2D9B000h Length: 00001AE8h
    NDPSM.NLM NDPS Manager
    Version 3.03.02 May 18, 2010
    Code Address: A2A97000h Length: 00083318h
    Data Address: A5C48000h Length: 00025E80h
    RMANSRVR.NLM NDPS Resource Manager
    Version 3.07.02 March 2, 2010
    Code Address: A5C01000h Length: 0001DE5Fh
    Data Address: A2188000h Length: 00004A24h
    NIPPZLIB.NLM General Purpose ZIP File Library for NetWare
    Version 1.00.01 November 28, 2005
    Code Address: A5BE7000h Length: 00002A23h
    Data Address: A2760000h Length: 00000048h
    ZLIB.NLM ZLIB 1.1.4 General Purpose Compression Library for NetWare
    Version 1.01.04 December 20, 2002
    Code Address: A5BF5000h Length: 0000BAB4h
    Data Address: A273B000h Length: 000014D8h
    BROKER.NLM NDPS Broker
    Version 3.00.12 February 20, 2008
    Code Address: A5B9B000h Length: 0000FFECh
    Data Address: A137A000h Length: 000071A5h
    DBNET6.NLM Debug Network IO Support
    Version 1.45.02 March 16, 2006
    Code Address: A5508000h Length: 0001B831h
    Data Address: A5524000h Length: 000127B8h
    IPMCFG.NLM Web Interface for IP Address Management
    Version 1.01.16 October 22, 2005
    Code Address: A54AC000h Length: 0000A479h
    Data Address: A54B7000h Length: 0000B610h
    NIRMAN.NLM TCPIP - NetWare Internetworking Remote Manager
    Version 1.06.04 September 18, 2007
    Code Address: A2492000h Length: 00060760h
    Data Address: A542C000h Length: 00018FCAh
    TCPSTATS.NLM Web Interface for Protocol Monitoring
    Version 6.50.10 June 20, 2003
    Code Address: A5412000h Length: 0000E5ECh
    Data Address: A1318000h Length: 00005460h
    HWDETECT.NLM Novell Hardware Insertion/Removal Detection
    Version 1.19.05 February 20, 2003
    Code Address: A53E2000h Length: 00002B33h
    Data Address: A0F11000h Length: 00000D3Ch
    IPPSRVR.NLM Novell iPrint Server
    Version 4.02.02 June 16, 2010
    Code Address: A39CF000h Length: 00017550h
    Data Address: A39E7000h Length: 000081F8h
    DPLSV386.NLM NetWare 6.x Distributed Print Library - DPLSV386
    Version 1.15.03 April 16, 2010
    Code Address: A2FF3000h Length: 000541E9h
    Data Address: A39A8000h Length: 0000C724h
    NIPPED.NLM NetWare 5.x, 6.x INF File Editing Library - NIPPED
    Version 1.03.09 February 26, 2010
    Code Address: A1571000h Length: 00005345h
    Data Address: A398C000h Length: 0000016Ch
    DPRPCNLM.NLM Novell NDPS RPC Library NLM
    Version 3.00.17 October 10, 2006
    Code Address: A1547000h Length: 00005324h
    Data Address: A13DB000h Length: 00001F20h
    MONITOR.NLM NetWare Console Monitor
    Version 12.02.02 April 4, 2006
    Code Address: A38FD000h Length: 00022BEFh
    Data Address: A1312000h Length: 00005F15h
    NWSNUT.NLM NetWare NLM Utility User Interface
    Version 7.00.01 July 11, 2008
    Code Address: A38CC000h Length: 000134EBh
    Data Address: A38E1000h Length: 00000790h
    ROTLOGS.NLM Apache 2.0.63 Log Rotation Utility for NetWare
    Version 2.00.63 April 25, 2008
    Code Address: A3200000h Length: 000009F9h
    Data Address: A3201000h Length: 00000438h
    ROTLOGS.NLM Apache 2.0.63 Log Rotation Utility for NetWare
    Version 2.00.63 April 25, 2008
    Code Address: A31E1000h Length: 000009F9h
    Data Address: A31E2000h Length: 00000438h
    REWRITE.NLM Apache 2.0.63 Rewrite Module
    Version 2.00.63 April 25, 2008
    Code Address: A15A1000h Length: 00006C99h
    Data Address: A31DB000h Length: 00001EA8h
    HEADERS.NLM Apache 2.0.63 Headers Module
    Version 2.00.63 April 25, 2008
    Code Address: A31BE000h Length: 00000E39h
    Data Address: A31BF000h Length: 00000538h
    EXPIRES.NLM Apache 2.0.63 Expires Module
    Version 2.00.63 April 25, 2008
    Code Address: A31BA000h Length: 00000B89h
    Data Address: A31BB000h Length: 00000388h
    MOD_IPP.NLM iPrint Module
    Version 1.00.04 June 7, 2006
    Code Address: A31B4000h Length: 00000B76h
    Data Address: A31B5000h Length: 000004CCh
    AUTHLDDN.NLM LdapDN Module
    Version 1.00 November 9, 2005
    Code Address: A31AF000h Length: 00001926h
    Data Address: A31B1000h Length: 00000EC8h
    UTILLDP2.NLM LdapDN Module
    Version 1.00 November 9, 2005
    Code Address: A1544000h Length: 00002A56h
    Data Address: A3194000h Length: 00001E80h
    JNET.NLM Java jnet (based on 1.4.2_18)
    Version 1.43 October 16, 2008
    Code Address: A153D000h Length: 0000653Eh
    Data Address: A318E000h Length: 00001100h
    MOD_JK.NLM Apache 2.0 plugin for Tomcat
    Version 1.02.23 April 25, 2008
    Code Address: A315B000h Length: 00025B33h
    Data Address: A3181000h Length: 0000CDD0h
    LIBGCC_S.NLM gcc runtime and intrinsics support
    Version 3.04.03 April 29, 2005
    Code Address: A13B5000h Length: 00004ABCh
    Data Address: A1086000h Length: 00000A74h
    AUTHLDAP.NLM Apache 2.0.63 LDAP Authentication Module
    Version 2.00.63 April 25, 2008
    Code Address: 9D909000h Length: 00001BB9h
    Data Address: 9EC05000h Length: 000019D0h
    UTILLDAP.NLM Apache 2.0.63 LDAP Authentication Module
    Version 2.00.63 April 25, 2008
    Code Address: A12A0000h Length: 000034A9h
    Data Address: A12A4000h Length: 00002598h
    TSAFS.NLM SMS - File System Agent for NetWare 6.X
    Version 6.53.03 October 16, 2008
    Code Address: A1467000h Length: 0005F9A2h
    Data Address: A14C7000h Length: 0000D7B0h
    SMDR.NLM SMS - Storage Data Requestor
    Version 6.58.01 October 16, 2008
    Code Address: A101B000h Length: 00047EF8h
    Data Address: A1364000h Length: 0000D8E0h
    SMSUT.NLM SMS - Utility Library for NetWare 6.X
    Version 1.01.03 June 26, 2008
    Code Address: A12CB000h Length: 00010201h
    Data Address: A12DC000h Length: 00001DF0h
    LLDAPX.NLM NetWare Extension APIs for LDAP SDK (LibC version)
    Version 3.05.01 October 26, 2010
    Code Address: A1297000h Length: 0000754Ch
    Data Address: A129F000h Length: 00000F70h
    LLDAPSSL.NLM NetWare SSL Library for LDAP SDK (LibC version)
    Version 3.05.01 October 26, 2010
    Code Address: A109B000h Length: 0009CD03h
    Data Address: A1138000h Length: 0002FFD0h
    APACHE2.NLM Apache Web Server 2.0.63
    Version 2.00.63 April 25, 2008
    Code Address: A0EBF000h Length: 00039D29h
    Data Address: A0EF9000h Length: 00011A9Ch
    APRLIB.NLM Apache Portability Runtime Library 0.9.17
    Version 0.09.17 April 25, 2008
    Code Address: A0E4E000h Length: 0002E688h
    Data Address: A0E7D000h Length: 00008088h
    SASL.NLM Simple Authentication and Security Layer 3.3.2.3 20091224
    Version 33230912.24 December 24, 2009
    Code Address: A0CA6000h Length: 00000C7Ch
    Data Address: A0CA7000h Length: 00000160h
    LBURP.NLM LDAP Bulkload Update/Replication Protocol service extension for Novell eDirectory 8.8.
    Version 20504.02 May 24, 2010
    Code Address: A0CA3000h Length: 0000111Ch
    Data Address: A0CA5000h Length: 00000444h
    LDAPXS.NLM (Clib version)
    Version 3.05.01 October 26, 2010
    Code Address: A0C9B000h Length: 000047F3h
    Data Address: A0CA0000h Length: 000008FCh
    NMASLDAP.NLM NMAS LDAP Extensions 3.3.2.3 20091224
    Version 33230912.24 December 24, 2009
    Code Address: A07EC000h Length: 00004E5Ch
    Data Address: A0C6D000h Length: 000007D0h
    SEG.NLM NetWare Memory Analyzer
    Version 2.00.25 April 27, 2009
    Code Address: A0C03000h Length: 00032CB4h
    Data Address: A0C36000h Length: 0001C656h
    AFREECON.NLM AdRem Free Remote Console (NCPE)
    Version 6.00 February 28, 2006
    Code Address: A0801000h Length: 00005A8Dh
    Data Address: A0807000h Length: 00002490h
    RCONAG6.NLM RConsole Agent for Netware
    Version 6.11 November 20, 2007
    Code Address: A0425000h Length: 00006C5Bh
    Data Address: 9EEC0000h Length: 00003304h
    SAS.NLM Secure Authentication Services
    Version 1.75 March 13, 2004
    Code Address: A0864000h Length: 00056640h
    Data Address: A0B8B000h Length: 0001E890h
    NLDAP.NLM LDAP Agent for Novell eDirectory 8.8 SP5
    Version 20506.05 December 30, 2010
    Code Address: A091C000h Length: 0008F8BBh
    Data Address: A09AC000h Length: 00052D20h
    PMPORTAL.NLM NetWare License Information Portal
    Version 2.16 November 21, 2003
    Code Address: 9FD18000h Length: 000071C9h
    Data Address: 9FD20000h Length: 00004360h
    NDSIMON.NLM NDS iMonitor 8.8.5 SP5
    Version 20506.01 December 24, 2010
    Code Address: A02D0000h Length: 00113D69h
    Data Address: 9FC46000h Length: 00091E24h
    LANGMANI.NLM Novell Cross-Platform Language Manager
    Version 20504.01 May 24, 2010
    Code Address: 9F92A000h Length: 000040F2h
    Data Address: 9EC71000h Length: 00001084h
    XI18N.NLM Novell Cross-Platform Internationalization Package
    Version 10310.53 August 2, 2005
    Code Address: A0ABE000h Length: 0001CA12h
    Data Address: 9F753000h Length: 00007EC8h
    PORTAL.NLM Novell Remote Manager NLM
    Version 4.03 September 22, 2008
    Code Address: A0540000h Length: 0010147Ch
    Data Address: 9FBDC000h Length: 00069EA4h
    NWIDK.NLM CDWare Volume Module
    Version 3.01.01 September 19, 2003
    Code Address: 9EF30000h Length: 00004640h
    Data Address: 9EFF9000h Length: 00000730h
    BTCPCOM.NLM BTCPCOM.NLM v7.90.000, Build 253
    Version 7.90 July 9, 2003
    Code Address: 9ED88000h Length: 00004450h
    Data Address: 9EF96000h Length: 00000CECh
    HTTPSTK.NLM Novell Small Http Interface
    Version 4.03 September 4, 2008
    Code Address: 9FFB3000h Length: 000317C6h
    Data Address: 9FFE5000h Length: 00019C10h
    WSPSSL.NLM NetWare Winsock Service 1.0 NLM for SSL
    Version 6.26 December 4, 2007
    Code Address: 9FEEF000h Length: 00008AFFh
    Data Address: 9FEF8000h Length: 0001095Fh
    NILE.NLM Novell N/Ties NLM ("") Release Build with symbols
    Version 7.00.01 August 20, 2007
    Code Address: 9EDC3000h Length: 00090A31h
    Data Address: 9FE99000h Length: 00030C70h
    PKI.NLM Novell Certificate Server
    Version 3.33 April 16, 2009
    Code Address: 9F79D000h Length: 0017C9E5h
    Data Address: 9ECAA000h Length: 00092270h
    PKIAPI.NLM Public Key Infrastructure Services
    Version 2.23.10 November 20, 2004
    Code Address: 9FE61000h Length: 00037721h
    Data Address: 9ECA3000h Length: 00006A14h
    NWUTIL.NLM Novell Utility Library NLM (_NW65[SP7]{""})
    Version 3.00.02 August 20, 2007
    Code Address: 9FE13000h Length: 0000EE40h
    Data Address: 9FE22000h Length: 00023BD4h
    NWBSRVCM.NLM NWBSRVCM.NLM v7.90.000, Build 230
    Version 7.90 March 20, 2001
    Code Address: 9EBB4000h Length: 00006776h
    Data Address: 9FDCA000h Length: 00000AD0h
    VOLSMS.NLM NSS Distributed Volume Manager (Build 212 MP)
    Version 3.27.02 November 11, 2009
    Code Address: 9FD48000h Length: 00018771h
    Data Address: 9D8FD000h Length: 00001780h
    VLRPC.NLM DFS Volume Location Database (VLDB) RPC interface (Build 212 MP)
    Version 3.27.02 November 11, 2009
    Code Address: 9EBA4000h Length: 00003383h
    Data Address: 9FD45000h Length: 000002FDh
    VMRPC.NLM DFS Volume Manager RPC interface (Build 212 MP)
    Version 3.27.02 November 11, 2009
    Code Address: 9EB83000h Length: 00003703h
    Data Address: 9FD43000h Length: 000002FDh
    JSTCP.NLM Jetstream TCP Transport Layer (Build 212 MP)
    Version 3.27.02 November 11, 2009
    Code Address: 9EDBD000h Length: 000050F0h
    Data Address: 9FB0F000h Length: 000001E0h
    JSMSG.NLM Jetstream Message Layer (Build 212 MP)
    Version 3.27.02 November 11, 2009
    Code Address: 9EDB6000h Length: 00006E80h
    Data Address: 9FAF2000h Length: 00000220h
    DFSLIB.NLM DFS Common Library (Build 212 MP)
    Version 3.27.02 November 11, 2009
    Code Address: 9F680000h Length: 000005C3h
    Data Address: 9F681000h Length: 00000080h
    NLSTRAP.NLM NetWare License Server Trap
    Version 5.02 February 19, 2004
    Code Address: 9E448000h Length: 0000298Ah
    Data Address: 9F1F9000h Length: 00000695h
    ZIP.NLM Java zip (based on 1.4.2_18)
    Version 1.43 October 16, 2008
    Code Address: 9F667000h Length: 0000ADCCh
    Data Address: 9D972000h Length: 00001C90h
    JVMLIB.NLM Java jvmlib (based on 1.4.2_18)
    Version 1.43 October 16, 2008
    Code Address: 9F62C000h Length: 00017134h
    Data Address: 9F644000h Length: 00008670h
    VERIFY.NLM Java verify (based on 1.4.2_18)
    Version 1.43 October 16, 2008
    Code Address: 9F5D5000h Length: 000087B4h
    Data Address: 9D4B1000h Length: 00001BC0h
    JVM.NLM Java Hotspot 1.4.2_18 Interpreter
    Version 1.43 October 16, 2008
    Code Address: 9F230000h Length: 00222FFFh
    Data Address: 9F064000h Length: 00065A60h
    LIBPERL.NLM Perl 5.8.4 - Script Interpreter and Library
    Version 5.00.05 September 13, 2005
    Code Address: 9F0EE000h Length: 000B3D60h
    Data Address: 9F1A2000h Length: 0001ADE0h
    IPMGMT.NLM TCPIP - NetWare IP Address Management
    Version 1.03.01 May 29, 2007
    Code Address: 9EA5B000h Length: 000307CDh
    Data Address: 9EA8C000h Length: 0000D778h
    JSOCK6X.NLM NetWare 6.x Support For Java Sockets (JDK 1.4.2)
    Version 1.43 October 16, 2008
    Code Address: 9EA47000h Length: 0000FDB1h
    Data Address: 9EA57000h Length: 00002C44h
    JAVA.NLM java.nlm (based on 1.4.2_18) Build 08101613
    Version 1.43 October 16, 2008
    Code Address: 9E99D000h Length: 000385DEh
    Data Address: 9E9D6000h Length: 0003DD40h
    JSOCK.NLM Support For Java Sockets (loader)
    Version 1.43 October 16, 2008
    Code Address: 9E97C000h Length: 00000086h
    Data Address: 9E97D000h Length: 00000064h
    CRLSM.NLM Challenge Response LSM v2.8.1.0
    Version 2.08.01 October 28, 2008
    Code Address: 9E926000h Length: 00021E46h
    Data Address: 9E948000h Length: 00009456h
    LCMCIFS2.NLM Windows Native File Access Login Methods (Build 83 SP)
    Version 2.00.09 July 25, 2005
    Code Address: 9E862000h Length: 0000E011h
    Data Address: 9E871000h Length: 000016B0h
    LSMCIFS2.NLM Windows Native File Access Login Methods (Build 94 SP)
    Version 2.00.07 July 25, 2005
    Code Address: 9E834000h Length: 0000F051h
    Data Address: 9E844000h Length: 000017B0h
    LSMAFP3.NLM Macintosh Native File Access Login Methods (Build 106 SP)
    Version 2.00.11 January 3, 2005
    Code Address: 9E80D000h Length: 0000F24Eh
    Data Address: 9E81D000h Length: 000013C0h
    NMASGPXY.NLM NMAS Generic Proxy 3.3.2.3 20091224
    Version 33230912.24 December 24, 2009
    Code Address: 9E7EA000h Length: 0000159Ch
    Data Address: 9E7EC000h Length: 000000E0h
    VMWTOOL.NLM VMware Tools
    Version 1.01 May 24, 2010
    Code Address: 9E795000h Length: 0001F9A0h
    Data Address: 9E7B5000h Length: 00019A20h
    PWDLCM.NLM Novell Simple Password Proxy LCM 2.8.2.1 20090422
    Version 28210904.22 April 22, 2009
    Code Address: 9E764000h Length: 0000E228h
    Data Address: 9E773000h Length: 000014B0h
    PWDLSM.NLM Novell Simple Password LSM 2.8.2.1 20090422
    Version 28210904.22 April 22, 2009
    Code Address: 9E720000h Length: 00010538h
    Data Address: 9E731000h Length: 00001A60h
    ACPISBD.NLM System Bus Driver for ACPI compliant systems
    Version 1.05.16 January 16, 2007
    Code Address: 9DA39000h Length: 00002BBAh
    Data Address: 9E6F4000h Length: 000004E1h
    NCM.NLM Novell Configuration Manager
    Version 1.15.01 October 20, 2004
    Code Address: 9E6ED000h Length: 000054CCh
    Data Address: 9E6F3000h Length: 00000FB0h
    LSMCIFS.NLM NMAS Login Server Module for CIFS - MS Windows File System for NetWare
    Version 1.20 March 5, 2003
    Code Address: 9E6A0000h Length: 0000EB2Ah
    Data Address: 9E6AF000h Length: 00001610h
    SLPTCP.NLM SERVICE LOCATION TCP/UDP INTERFACE (RFC2165/RFC2608)
    Version 2.13 November 15, 2005
    Code Address: 9DA32000h Length: 0000386Ah
    Data Address: 9E60F000h Length: 0000108Ch
    NSPDNS.NLM NetWare Winsock 2.0 NSPDNS.NLM Name Service Providers
    Version 6.20.03 September 8, 2003
    Code Address: 9DA36000h Length: 00002527h
    Data Address: 9E604000h Length: 000004E4h
    WSPIP.NLM NetWare Winsock Service 1.0 NLM for TCP and UDP
    Version 6.24 December 4, 2007
    Code Address: 9E4B3000h Length: 000124C4h
    Data Address: 9DA2F000h Length: 0000287Ch
    NCPIP.NLM NetWare NCP Services over IP
    Version 6.02.01 September 30, 2008
    Code Address: 9E41C000h Length: 000168E9h
    Data Address: 9DA23000h Length: 00003540h
    BSDSOCK.NLM Novell BSDSOCK Module (Domestic)
    Version 6.92.02 December 23, 2009
    Code Address: 9E38A000h Length: 00012099h
    Data Address: 9E39D000h Length: 0000C0E0h
    TCPIP.NLM Novell TCP/IP/IPSec Module (Domestic) NICI Enabled
    Version 6.92.02 September 30, 2009
    Code Address: 9D9A3000h Length: 00078AB4h
    Data Address: 9D468000h Length: 000405F0h
    TCP.NLM Novell TCP/IP Stack - Transport module (Domestic)
    Version 6.92.05 December 23, 2009
    Code Address: 9DB5A000h Length: 00025862h
    Data Address: 9DB80000h Length: 00082F60h
    NETLIB.NLM Novell TCPIP NETLIB Module
    Version 6.50.22 February 12, 2003
    Code Address: 9DA7C000h Length: 00005AACh
    Data Address: 9DA82000h Length: 000D0710h
    CSLIND.NLM TCPIP CSL INDEPENDENCE MODULE 7Dec99 7Dec99
    Version 4.21 December 7, 1999
    Code Address: 9D97D000h Length: 000003CCh
    Data Address: 9D97E000h Length: 000024E0h
    E1000.LAN Intel(R) PRO/1000 PCI/PCI-X Network Connections Driver
    Version 8.24 December 22, 2005
    Code Address: 9D84B000h Length: 00016B5Dh
    Data Address: 006A7000h Length: 00009973h
    ETHERTSM.NLM Novell Ethernet Topology Specific Module
    Version 3.90 March 20, 2006
    Code Address: 9D847000h Length: 000024CEh
    Data Address: 9D84A000h Length: 000002BCh
    MSM.NLM Novell Multi-Processor Media Support Module
    Version 4.12 August 22, 2007
    Code Address: 9D831000h Length: 0000E5B3h
    Data Address: 9D840000h Length: 00003DFCh
    LSAPI.NLM NLS LSAPI Library
    Version 5.02 January 7, 2003
    Code Address: 9D817000h Length: 0000A51Bh
    Data Address: 9D822000h Length: 00001B00h
    NLSAPI.NLM NLSAPI
    Version 5.02 August 7, 2003
    Code Address: 9D7EB000h Length: 000124DBh
    Data Address: 9D740000h Length: 000022A4h
    NLSLSP.NLM NLS - License Service Provider
    Version 5.02 May 25, 2005
    Code Address: 9D74E000h Length: 0006DF03h
    Data Address: 9D7BC000h Length: 000205DCh
    CSL.NLM NetWare Call Support Layer For NetWare
    Version 2.06.02 January 13, 2000
    Code Address: 9D71A000h Length: 0000CB32h
    Data Address: 90203000h Length: 000028F4h
    BTRIEVE.NLM BTRIEVE.NLM v7.90.000
    Version 7.90 March 21, 2001
    Code Address: 8FEF1000h Length: 000013BFh
    Data Address: 8FEF3000h Length: 00000980h
    NWMKDE.NLM NWMKDE.NLM v7.94.251.000
    Version 7.94 December 11, 2001
    Code Address: 8FCB5000h Length: 00053D55h
    Data Address: 9D127000h Length: 0000F784h
    NWENC103.NLM NWENC103.NLM v7.90.000 (Text Encoding Conversion Library)
    Version 7.90 February 24, 2001
    Code Address: 8FEA0000h Length: 0004D0F5h
    Data Address: 9CF76000h Length: 001B0208h
    NWAIF103.NLM nwaif103.nlm v7.94, Build 251 ()
    Version 7.94 November 30, 2001
    Code Address: 9CF5C000h Length: 00010E51h
    Data Address: 8FC86000h Length: 00006828h
    PSVCS.NLM Portability Services
    Version 251.00 November 30, 2001
    Code Address: 9CF25000h Length: 0001270Fh
    Data Address: 9CF38000h Length: 00009464h
    NWUCMGR.NLM NWUCMGR.NLM v1.5 Build 230
    Version 1.05 March 14, 2001
    Code Address: 9CEF5000h Length: 0000D920h
    Data Address: 8FC49000h Length: 000078D4h
    SPMDCLNT.NLM Novell SPM Client for DClient 3.3.2.3 20091224
    Version 33230912.24 December 24, 2009
    Code Address: 9CE6F000h Length: 000145E8h
    Data Address: 8F9DB000h Length: 00001370h
    NPKIAPI.NLM Public Key Infrastructure Services
    Version 3.33 April 16, 2009
    Code Address: 9CE17000h Length: 00038627h
    Data Address: 9CE50000h Length: 0001E73Fh
    LDAPSDK.NLM LDAP SDK Library (Clib version)
    Version 3.05.02 October 26, 2010
    Code Address: 9CDF5000h Length: 00021500h
    Data Address: 8F4FE000h Length: 000065ADh
    SNMP.NLM Netware 4.x/5.x/6.x SNMP Service
    Version 4.18 July 25, 2006
    Code Address: 9CDB2000h Length: 00013E90h
    Data Address: 8F432000h Length: 00003220h
    TLI.NLM NetWare Transport Level Interface Library
    Version 4.30.02 December 19, 2000
    Code Address: 8F423000h Length: 00003859h
    Data Address: 8F427000h Length: 00000164h
    Global Code Address: 8F428000h Length: 00001000h
    Global Data Address: 8F429000h Length: 00002000h
    DHOST.NLM Novell DHost Portability Interface 1.0.0 SMP
    Version 10010.97 September 18, 2006
    Code Address: 8F224000h Length: 00006621h
    Data Address: 8F0CD000h Length: 0000234Ch
    CONLOG.NLM System Console Logger
    Version 3.01.02 August 8, 2006
    Code Address: 8EF13000h Length: 0000243Ch
    Data Address: 8EF16000h Length: 00001CE0h
    NPKIT.NLM Public Key Infrastructure Services
    Version 3.33 April 16, 2009
    Code Address: 9028C000h Length: 0002E5BEh
    Data Address: 902BB000h Length: 000166ABh
    LLDAPSDK.NLM LDAP SDK Library (LibC version)
    Version 3.05.02 October 26, 2010
    Code Address: 90269000h Length: 00022600h
    Data Address: 8EF0A000h Length: 000065C0h
    NSPNDS.NLM NetWare Winsock 2.0 NSPNDS.NLM Name Service Provider
    Version 6.20 November 12, 2001
    Code Address: 896E7000h Length: 00006547h
    Data Address: 88206000h Length: 00000518h
    DS.NLM Novell eDirectory Version 8.8 SP5 SMP
    Version 20506.07 March 18, 2011
    Code Address: 8FF37000h Length: 002CBA43h
    Data Address: 8F338000h Length: 0008D794h
    ROLLCALL.NLM RollCall NLM (101, API 1.0)
    Version 5.00 July 27, 1998
    Code Address: 80133000h Length: 0000055Dh
    Data Address: 88258000h Length: 000002D4h
    NTLS.NLM NTLS 2.0.5.0 based on OpenSSL 0.9.7m
    Version 20510.01 March 11, 2009
    Code Address: 8F44B000h Length: 000A72C6h
    Data Address: 8FEFD000h Length: 0003915Fh
    DSLOG.NLM DS Log for Novell eDirectory 8.8.0
    Version 20219.15 May 12, 2009
    Code Address: 8EEFC000h Length: 00003CCFh
    Data Address: 8966E000h Length: 0000B06Ch
    SPMNWCC.NLM Novell SPM Client for NWCC 3.3.2.3 20091224
    Version 33230912.24 December 24, 2009
    Code Address: 8FA66000h Length: 00011688h
    Data Address: 8FA78000h Length: 00001340h
    NMAS.NLM Novell Modular Authentication Service 3.3.2.3 20091224
    Version 33230912.24 December 24, 2009
    Code Address: 8F1C9000h Length: 0005AB78h
    Data Address: 8FA54000h Length: 0000D5A0h
    GAMS.NLM Graded Authentication Management Service
    Version 2.00.01 September 2, 2008
    Code Address: 8FA44000h Length: 0000DFC7h
    Data Address: 8FA52000h Length: 00001348h
    NDSAUDIT.NLM Directory Services Audit
    Version 2.09 May 22, 2003
    Code Address: 8FA33000h Length: 00010844h
    Data Address: 8EEF6000h Length: 00002ED0h
    SAL.NLM Novell System Abstraction Layer Version 8.8.0
    Version 20504.01 May 24, 2010
    Code Address: 8F9FC000h Length: 000086E6h
    Data Address: 8FA05000h Length: 00001554h
    NICISDI.NLM Security Domain Infrastructure
    Version 27610.01.01 March 30, 2009
    Code Address: 8F9BD000h Length: 0000ADA2h
    Data Address: 006A5000h Length: 00001320h
    SASDFM.NLM SAS Data Flow Manager
    Version 27610.01.01 March 30, 2009
    Code Address: 8F9A0000h Length: 000040AEh
    Data Address: 32D56000h Length: 00000980h
    CALNLM32.NLM NetWare NWCalls Runtime Library
    Version 6.01.03 August 26, 2008
    Code Address: 8F971000h Length: 0001CEB9h
    Data Address: 8F25F000h Length: 00000510h
    POLIMGR.NLM NetWare License Policy Manager
    Version 6.27 November 3, 2005
    Code Address: 8F918000h Length: 00013F5Ch
    Data Address: 8F92C000h Length: 00008E90h
    TIMESYNC.NLM NetWare Time Synchronization Services
    Version 6.61.01 October 14, 2005
    Code Address: 8F8EF000h Length: 0000E13Ch
    Data Address: 8F835000h Length: 00004240h
    CLXNLM32.NLM NetWare NWCLX Runtime Library
    Version 6.01.03 August 26, 2008
    Code Address: 8F833000h Length: 000011F3h
    Data Address: 8F245000h Length: 000001B0h
    DSAPI.NLM NetWare NWNet Runtime Library
    Version 6.00.04 January 27, 2006
    Code Address: 8F243000h Length: 00000043h
    Data Address: 8F244000h Length: 00000024h
    DSEVENT.NLM NetWare DSEvent Runtime Library
    Version 6.01.03 August 26, 2008
    Code Address: 8F241000h Length: 00000633h
    Data Address: 8F242000h Length: 00000034h
    NETNLM32.NLM NetWare NWNet Runtime Library
    Version 6.01.03 August 26, 2008
    Code Address: 8F8B9000h Length: 00035B77h
    Data Address: 8F82A000h Length: 00004DA5h
    NCPNLM32.NLM NetWare NWNCP Runtime Library
    Version 6.01.03 August 26, 2008
    Code Address: 8F899000h Length: 0001F473h
    Data Address: 00000000h Length: 00000000h
    CLNNLM32.NLM NetWare NWClient Runtime Library
    Version 6.01.03 August 26, 2008
    Code Address: 8F824000h Length: 00001CC2h
    Data Address: 8F240000h Length: 00000150h
    CLIB.NLM (Legacy) Standard C Runtime Library for NLMs
    Version 5.90.15 March 10, 2008
    Code Address: 8F85B000h Length: 0001898Eh
    Data Address: 8EEA4000h Length: 00002FB0h
    NIT.NLM NetWare Interface Tools Library for NLMs
    Version 5.90.15 March 10, 2008
    Code Address: 8F83E000h Length: 0001C694h
    Data Address: 8F23E000h Length: 00000690h
    NLMLIB.NLM Novell NLM Runtime Library
    Version 5.90.15 March 10, 2008
    Code Address: 8F7F5000h Length: 000263EDh
    Data Address: 8EE9D000h Length: 000038C0h
    STREAMS.NLM NetWare STREAMS PTF
    Version 6.00.06 May 4, 2005
    Code Address: 8F7DA000h Length: 0001206Dh
    Data Address: 8F7ED000h Length: 000010A0h
    Global Code Address: 8F23D000h Length: 00001000h
    REQUESTR.NLM Novell NCP Requestor for NLMs
    Version 5.90.15 March 10, 2008
    Code Address: 8F7A0000h Length: 00020DE3h
    Data Address: 8F7C1000h Length: 000010D0h
    THREADS.NLM Novell Threads Package for NLMs
    Version 5.90.15 March 10, 2008
    Code Address: 8F775000h Length: 00018CF8h
    Data Address: 8F78E000h Length: 000116A0h
    LIB0.NLM Novell Ring 0 Library for NLMs
    Version 5.90.15 March 10, 2008
    Code Address: 8F506000h Length: 000250EAh
    Data Address: 8F52C000h Length: 00228070h
    MASV.NLM Mandatory Access Control Service
    Version 2.00.01 September 2, 2008
    Code Address: 8F1B6000h Length: 00012386h
    Data Address: 8EE91000h Length: 000023A0h
    NSPSLP.NLM NetWare Winsock 2.0 NSPSLP.NLM Name Service Provider
    Version 6.20.04 December 6, 2007
    Code Address: 8F119000h Length: 00005ED3h
    Data Address: 8F11F000h Length: 00000B30h
    PMLODR.NLM PMLodr for NW65
    Version 1.26 October 7, 2005
    Code Address: 8F123000h Length: 0000E63Ah
    Data Address: 8F132000h Length: 00001658h
    SLP.NLM SERVICE LOCATION PROTOCOL (RFC2165/RFC2608)
    Version 2.13 November 15, 2005
    Code Address: 8F0EC000h Length: 0001A658h
    Data Address: 8F107000h Length: 00005384h
    CCS.NLM Controlled Cryptography Services from Novell, Inc.
    Version 27610.01.01 March 30, 2009
    Code Address: 8F081000h Length: 00019EE4h
    Data Address: 006A2000h Length: 00002F90h
    DSLOADER.NLM Novell eDirectory Version 8.8.5 Loader SMP
    Version 20506.07 March 18, 2011
    Code Address: 8F002000h Length: 0000CB1Ch
    Data Address: 8F00F000h Length: 00001720h
    XENGUSC.NLM NICI U.S./Worldwide XENG from Novell, Inc.
    Version 27610.01.01 March 30, 2009
    Code Address: 8EFEE000h Length: 00000058h
    Data Address: 00000000h Length: 00000000h
    XNGAUSC.NLM NICI U.S./Worldwide XMGR Assistant XENG from Novell, Inc.
    Version 27610.01.01 March 30, 2009
    Code Address: 8EFBB000h Length: 000153E4h
    Data Address: 00098000h Length: 00004864h
    XENGEXP.NLM NICI Import Restricted XENG from Novell, Inc.
    Version 27610.01.01 March 30, 2009
    Code Address: 8961D000h Length: 00050DD4h
    Data Address: 0068D000h Length: 00014C3Ch
    XENGNUL.NLM NICI NULL XENG from Novell, Inc.
    Version 27610.01.01 March 30, 2009
    Code Address: 8EFAE000h Length: 00001DC9h
    Data Address: 32EC4000h Length: 00000860h
    XMGR.NLM NICI XMGR from Novell, Inc.
    Version 27610.01.01 March 30, 2009
    Code Address: 8EE2D000h Length: 00025F01h
    Data Address: 00682000h Length: 0000AA10h
    XSUP.NLM NICI XSUP from Novell, Inc.
    Version 27610.01.01 March 30, 2009
    Code Address: 8EDB8000h Length: 00006EF2h
    Data Address: 0065E000h Length: 00023170h
    XIM.XLM Novell NICI Signed Loader
    Version 27510.02.01 August 25, 2008
    Code Address: 8ED56000h Length: 0002C680h
    Data Address: 00656000h Length: 00007CE4h
    WS2_32.NLM NetWare Winsock 2.0 NLM
    Version 6.24.01 February 14, 2008
    Code Address: 8E5C0000h Length: 00037F28h
    Data Address: 8E5F8000h Length: 00011B84h
    NCP.NLM NetWare Core Protocol (NCP) Engine
    Version 5.61.01 September 30, 2008
    Code Address: 8E577000h Length: 00026DEFh
    Data Address: 8E59E000h Length: 00018B24h
    QUEUE.NLM NetWare Queue Services NLM
    Version 5.60 May 24, 2001
    Code Address: 8E56E000h Length: 00006D8Dh
    Data Address: 8E575000h Length: 00000473h
    VDISK.NLM NetWare Virtual Disk
    Version 1.00 November 30, 2004
    Code Address: 8E52A000h Length: 00001FEEh
    Data Address: 8E52D000h Length: 00001160h
    NWTERMIO.NLM NetWare Terminal Emulation
    Version 1.00 September 11, 2006
    Code Address: 89DB8000h Length: 00007570h
    Data Address: 89DC0000h Length: 00004560h
    MALHLP.NLM NSS Configure help messages (Build 212 MP)
    Version 3.27.02 November 11, 2009
    Code Address: 89547000h Length: 000000BAh
    Data Address: 89548000h Length: 0000002Ah
    CDDVD.NSS NSS Loadable Storage System (LSS) for CD/UDF (Build 212 MP)
    Version 3.27.02 November 11, 2009
    Code Address: 89DC9000h Length: 00014B00h
    Data Address: 89972000h Length: 00001050h
    NSSIDK.NSS NSS Pool Configuration Manager (Build 212 MP)
    Version 3.27.02 November 11, 2009
    Code Address: 8943D000h Length: 000039C5h
    Data Address: 89544000h Length: 00000090h
    PARTAPI.NLM Partition APIs for NetWare 6.1
    Version 2.00 April 17, 2002
    Code Address: 89543000h Length: 00000007h
    Data Address: 00000000h Length: 00000000h
    VOLMN.NSS NSS Distributed Volume Manager (Build 212 MP)
    Version 3.27.02 November 11, 2009
    Code Address: 89D99000h Length: 0000A6A3h
    Data Address: 8953C000h Length: 000005B0h
    NWSA.NSS NSS NetWare Semantic Agent (NWSA) (Build 212 MP)
    Version 3.27.02 November 11, 2009
    Code Address: 898B3000h Length: 0004ADEEh
    Data Address: 89CE6000h Length: 000A1390h
    ZLSS.NSS NSS Journaled Storage System (ZLSS) (Build 212 MP)
    Version 3.27.02 November 11, 2009
    Code Address: 89C0C000h Length: 000CD166h
    Data Address: 89CDA000h Length: 0000BE30h
    MAL.NSS NSS Media Access Layer (MAL) (Build 212 MP)
    Version 3.27.02 November 11, 2009
    Code Address: 89439000h Length: 00003196h
    Data Address: 89531000h Length: 00000170h
    MANAGE.NSS NSS Management Functions (Build 212 MP)
    Version 3.27.02 November 11, 2009
    Code Address: 89914000h Length: 0004F275h
    Data Address: 8952F000h Length: 00000C20h
    COMN.NSS NSS Common Support Layer (COMN) (Build 212 MP)
    Version 3.27.02 November 11, 2009
    Code Address: 899F5000h Length: 000EF408h
    Data Address: 89AE5000h Length: 00015E50h
    NSS.NLM NSS (Novell Storage Services) (Build 212 MP)
    Version 3.27.02 November 11, 2009
    Code Address: 8978E000h Length: 00030420h
    Data Address: 8949D000h Length: 00091830h
    SYSLOG.NLM NetWare Logfile Daemon
    Version 6.05.03 October 22, 2007
    Code Address: 89417000h Length: 0000616Ah
    Data Address: 89727000h Length: 00026140h
    LIBNSS.NLM Generic Library used by NSS (Build 212 MP)
    Version 3.27.02 November 11, 2009
    Code Address: 89428000h Length: 0000464Ch
    Data Address: 8949C000h Length: 000003D0h
    NSSWIN.NLM NSS ASCI Window API Library (Build 212 MP)
    Version 3.27.02 November 11, 2009
    Code Address: 89423000h Length: 000047DCh
    Data Address: 8949A000h Length: 000000FCh
    LOCNLM32.NLM NetWare NWLocale Runtime Library
    Version 6.00.04 November 29, 2005
    Code Address: 89412000h Length: 000044BBh
    Data Address: 89499000h Length: 00000B30h
    UNICODE.NLM NetWare Unicode Runtime Library (UniLib-based) [optimized]
    Version 7.00 October 26, 2004
    Code Address: 89619000h Length: 000016F5h
    Data Address: 89466000h Length: 00000504h
    FILESYS.NLM NetWare File System NLM
    Version 5.14 April 16, 2008
    Code Address: 89567000h Length: 0008E4E7h
    Data Address: 895F6000h Length: 00012C90h
    LFS.NLM NetWare Logical File System NLM
    Version 5.12 September 21, 2005
    Code Address: 89481000h Length: 000098A2h
    Data Address: 8948B000h Length: 000084BCh
    CONNMGR.NLM NetWare Connection Manager NLM
    Version 5.60.01 September 7, 2006
    Code Address: 89443000h Length: 0001172Bh
    Data Address: 89402000h Length: 00003CE8h
    ACPIPWR.NLM ACPI Power Management Driver for ACPI compliant systems
    Version 1.05.16 January 16, 2007
    Code Address: 89421000h Length: 00000C9Ah
    Data Address: 89422000h Length: 00000904h
    ACPICMGR.NLM ACPI Component Manager for ACPI compliant systems
    Version 1.05.16 January 16, 2007
    Code Address: 89400000h Length: 00000A6Fh
    Data Address: 89401000h Length: 000002F4h
    LSIMPTNW.HAM LSI Corporation Common Architecture NWPA-HAM SAS/Fibre/SCSI Driver.
    Version 5.03.01 January 23, 2008
    Code Address: 89396000h Length: 00033686h
    Data Address: 00A40000h Length: 0000787Eh
    SCSIHD.CDM Novell NetWare SCSI Fixed Disk Custom Device Module
    Version 3.03.10 May 30, 2008
    Code Address: 89380000h Length: 00005523h
    Data Address: 00A4B000h Length: 000017C0h
    ACPIDRV.PSM ACPI Platform Support Module for ACPI compliant systems
    Version 1.05.19 January 16, 2007
    Code Address: 89339000h Length: 0000AD1Eh
    Data Address: 00A4D000h Length: 0000C694h
    ACPICA.NLM ACPI Component Architecture for ACPI compliant systems
    Version 1.05.16 January 16, 2007
    Code Address: 892BD000h Length: 0002BA90h
    Data Address: 892E9000h Length: 00011C74h
    ACPIASL.NLM ACPI Architecture Services Layer for ACPI compliant systems
    Version 1.05.16 January 16, 2007
    Code Address: 88DE1000h Length: 00000F9Bh
    Data Address: 88DE2000h Length: 0000019Ch
    CIOS.NLM Consolidated IO System
    Version 1.60 February 12, 2008
    Code Address: 89230000h Length: 00042C15h
    Data Address: 31961000h Length: 00008B4Ah
    LSL.NLM Novell NetWare Link Support Layer
    Version 4.86 February 2, 2006
    Code Address: 88DE4000h Length: 0000A7A7h
    Data Address: 88DEF000h Length: 00009EC8h
    NWPALOAD.NLM NetWare 5 NWPA Load Utility
    Version 3.00 July 10, 2000
    Code Address: 88D08000h Length: 00000007h
    Data Address: 00000000h Length: 00000000h
    NWPA.NLM NetWare 6.5 NetWare Peripheral Architecture NLM
    Version 3.21.02 October 29, 2008
    Code Address: 88CE5000h Length: 00016C82h
    Data Address: 8823A000h Length: 00002A5Ch
    MM.NLM ENG TEST - NetWare 6.5 Media Manager
    Version 3.22.08 April 24, 2009
    Code Address: 88D1A000h Length: 0004C524h
    Data Address: 88C90000h Length: 0000B84Ch
    SGUID.NLM NetWare GUID Services
    Version 6.01 September 27, 2002
    Code Address: 88C8E000h Length: 00000E04h
    Data Address: 88C8F000h Length: 0000018Ah
    NBI.NLM NetWare Bus Interface
    Version 3.01.01 July 13, 2007
    Code Address: 88C80000h Length: 0000D72Dh
    Data Address: 88233000h Length: 00003D8Dh
    NEB.NLM Novell Event Bus
    Version 5.60 September 27, 2004
    Code Address: 88CA6000h Length: 00005843h
    Data Address: 88316000h Length: 0000097Ch
    DIAG500.NLM Diagnostic/coredump utility for NetWare 6.x
    Version 3.04.03 October 31, 2007
    Code Address: 88C06000h Length: 00007FC0h
    Data Address: 88C0F000h Length: 0001DF84h
    CPUCHECK.NLM NetWare Processor Checking Utility
    Version 5.60.01 December 6, 2007
    Code Address: 88344000h Length: 00001B5Ch
    Data Address: 88CAE000h Length: 00004B3Ch
    NWKCFG.NLM NetWare Kernel Config NLM
    Version 2.16 June 24, 2005
    Code Address: 88228000h Length: 00003F4Fh
    Data Address: 8822C000h Length: 00003CA4h
    CDBE.NLM NetWare Configuration DB Engine
    Version 6.01 September 21, 2006
    Code Address: 88995000h Length: 000116E6h
    Data Address: 889A7000h Length: 000161FAh
    FATFS.NLM FAT Filesystem Module for NetWare
    Version 1.24 August 27, 2007
    Code Address: 8844F000h Length: 00020526h
    Data Address: 88470000h Length: 0002B32Fh
    LIBC.NLM Standard C Runtime Library for NLMs [optimized, 7]
    Version 9.00.05 October 3, 2008
    Code Address: 8834B000h Length: 000D0CD6h
    Data Address: 80140000h Length: 000415E0h
    PVER500.NLM NetWare 6.XX Version Library
    Version 3.00 February 1, 2007
    Code Address: 80135000h Length: 00000837h
    Data Address: 80136000h Length: 000003DCh
    SERVER.NLM NetWare Server Operating System
    Version 5.70.08 October 3, 2008
    Code Address: 00201020h Length: 0016A000h
    Data Address: 00401020h Length: 00216FE0h
    Memory at EAX
    Invalid dump address
    Memory at EBX
    Invalid dump address
    Memory at ECX
    Invalid dump address
    Memory at EDX
    00090009 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
    00090019 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
    00090029 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
    00090039 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
    00090049 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
    00090059 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
    00090069 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
    00090079 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
    00090089 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
    00090099 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
    000900A9 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
    000900B9 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
    000900C9 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
    000900D9 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
    000900E9 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
    000900F9 46656572 46656572-46656572 46656572 Feer Feer Feer Feer
    Memory at ESI
    Invalid dump address
    Memory at EDI
    A00D19D8 A52305C0 A52305C0-00000000 00000000 %#.@ %#.@ .... ....
    A00D19E8 00000000 00000000-00000000 00000000 .... .... .... ....
    A00D19F8 00000000 00000000-72687470 20646165 .... .... rhtp dae
    A00D1A08 6574756D 00000078-00000000 00000000 etum ...x .... ....
    A00D1A18 00000000 00000000-00000000 00000000 .... .... .... ....
    A00D1A28 00000000 00000000-00000000 00000000 .... .... .... ....
    A00D1A38 00000000 00000000-893CA160 A00D1B04 .... .... .<!` ...
    A00D1A48 A00D1984 0000008F-00000001 00000000 ... .... .... ....
    A00D1A58 00000000 00000000-00000000 00000000 .... .... .... ....
    A00D1A68 00000000 00000000-00000000 00000000 .... .... .... ....
    A00D1A78 00000000 34343434-1515071E 00000000 .... 4444 .... ....
    A00D1A88 A52305C0 00000000-000052E6 00000000 %#.@ .... ..Rf ....
    A00D1A98 00000000 A00D1A98-00000000 00000000 .... ... .... ....
    A00D1AA8 00000000 00000000-00000000 00000000 .... .... .... ....
    A00D1AB8 00000000 00000000-72687470 20646165 .... .... rhtp dae
    A00D1AC8 6574756D 00000078-00000000 00000000 etum ...x .... ....
    Memory at EBP
    FBF138DB 6E72654B 64206C65-63657465 20646574 nreK d le cete det
    FBF138EB 61206E61 6D657474-64657470 6E6F6320 a na mett detp noc
    FBF138FB 74786574 69777320-20686374 61206E69 txet iws hct a ni
    FBF1390B 504D206E 6146204B-57207473 002E4454 PM n aF K W ts ..DT
    FBF1391B 616E550A 20656C62-61206F74 636F6C6C anU. elb a ot coll
    FBF1392B 20657461 6F6D656D-66207972 6420726F eta omem f yr d ro
    FBF1393B 20617461 65657274-0A000A73 61766E49 ata eert ...s avnI
    FBF1394B 2064696C 6E616853-206E6F6E 6146202D dil nahS non aF -
    FBF1395B 54206F6E 0A656572-65520A00 70206461 T on .eer eR.. p da
    FBF1396B 20747361 20646E65-7220666F 20646165 tsa dne r fo dae
    FBF1397B 66667562 000A7265-7272450A 2520726F ffub ..re rrE. % ro
    FBF1398B 65722064 6E696461-6F732067 65637275 er d nida os g ecru
    FBF1399B 6C696620 43000A65-00344D4F 434F4C43 lif C..e .4MO COLC
    FBF139AB 4C00244B 2044414F-6F72705B 74636574 L.$K DAO orp[ tcet
    FBF139BB 5D6E6F69 61705B20-6C5D6874 6164616F ]noi ap[ l]ht adao
    FBF139CB 5F656C62 75646F6D-5B20656C 61726170 _elb udom [ el arap
    Memory at ESP
    8FD9DE9C FBF138DB A00D19E0-00000006 A00D19C0 {q8[ ..` .... ..@
    8FD9DEAC 002186BC 00000001-A00D19E0 A00D19D8 .!.< .... ..` ..X
    8FD9DEBC 00000006 A00D19C0-002064BC A00D19E4 .... ..@ . d< ..d
    8FD9DECC A00D1A40 8FD9DEF0-00000000 04B4E504 ..@ .Y^p .... .4e.
    8FD9DEDC 9D96379C 883E6AC9-A00D19C0 04B4E504 ..7. .>jI ..@ .4e.
    8FD9DEEC 00000006 8FD9DEFC-9EDD3AF1 9D96379C .... .Y^| .]:q ..7.
    8FD9DEFC 8FD9DF20 9EDE3ABF-00000009 00000009 .Y_ .^:? .... ....
    8FD9DF0C 9FE9C114 000000F6-9FEC9448 8FD9DF24 .iA. ...v .l.H .Y_$
    8FD9DF1C 04B4E504 8FD9DF48-9EDE3B44 00000009 .4e. .Y_H .^;D ....
    8FD9DF2C 00000009 9FE9C114-000000F6 00000000 .... .iA. ...v ....
    8FD9DF3C 9FEC9448 04B4E504-00000006 8FD9DF70 .l.H .4e. .... .Y_p
    8FD9DF4C 9EDE00AF 04B6E43C-FFFFFFFF 00000009 .^./ .6d< .... ....
    8FD9DF5C 9FE9C114 000000F6-9FEC9448 04B4E504 .iA. ...v .l.H .4e.
    8FD9DF6C 04B4E504 8FD9DF80-9EDE7A81 04B6E404 .4e. .Y_. .^z. .6d.
    8FD9DF7C 00000002 8FD9DF94-9EDE7A2A 046B3A84 .... .Y_. .^z* .k:.
    8FD9DF8C 9EDF8F2C 00000000-8FD9DFA8 9EDF3660 ._., .... .Y_( ._6`
    Stack Walk
    Current EIP: 0021AB7A SERVER.NLM|ProcessSchedulerAbendTriggers+82
    Stack Contents
    8FD9DEAC 002186BC SERVER.NLM|SchedSwitch+48
    8FD9DEB0 00000001
    8FD9DEC4 002064BC SERVER.NLM|kMutexLock+1AC
    8FD9DEE0 883E6AC9 LIBC.NLM|pthread_mutex_lock+A9
    8FD9DEF4 9EDD3AF1 NILE.NLM|SSL_library_init+26C
    8FD9DEF8 9D96379C A00D19C0 4E8B2056 20500124 8B244811 @.. V .N$.P .H$.
    8FD9DEFC 8FD9DF20 8FD9DF48 9EDE3B44 00000009 00000009 H_Y.D;^.........
    8FD9DF00 9EDE3ABF NILE.NLM|CRYPTO_lock+8F
    8FD9DF04 00000009
    8FD9DF08 00000009
    8FD9DF0C 9FE9C114 5F617372 2E62696C 00000063 5F617372 rsa_lib.c...rsa_
    8FD9DF10 000000F6
    8FD9DF24 9EDE3B44 NILE.NLM|CRYPTO_add_lock+5A
    8FD9DF28 00000009
    8FD9DF2C 00000009
    8FD9DF30 9FE9C114 5F617372 2E62696C 00000063 5F617372 rsa_lib.c...rsa_
    8FD9DF34 000000F6
    8FD9DF4C 9EDE00AF NILE.NLM|RSA_free+2E
    8FD9DF50 04B6E43C 00000001 00000006 00000000 00000000 ................
    8FD9DF54 FFFFFFFF
    8FD9DF58 00000009
    8FD9DF5C 9FE9C114 5F617372 2E62696C 00000063 5F617372 rsa_lib.c...rsa_
    8FD9DF60 000000F6
    8FD9DF74 9EDE7A81 NILE.NLM|EVP_PKEY_free+97
    8FD9DF78 04B6E404 00000000 00000000 9FEAF3AC 00000008 ........,sj.....
    8FD9DF7C 00000002
    8FD9DF84 9EDE7A2A NILE.NLM|EVP_PKEY_free+40
    8FD9DF88 046B3A84 00000006 00000006 00000000 04B6E404 .............d6.
    8FD9DF8C 9EDF8F2C C90CC483 55C3C9C3 5653E589 8310EC83 .D.ICICU.eSV.l..
    8FD9DF98 9EDF3660 NILE.NLM|PKCS7_DIGEST_free+35
    8FD9DF9C 046B3A84 00000006 00000006 00000000 04B6E404 .............d6.
    8FD9DFA0 9FEA2C70 00000001 00000010 9FEA2C3C 00000002 ........<,j.....
    8FD9DFAC 9EDF8E7A NILE.NLM|ASN1_item_ex_free+2A6
    8FD9DFB0 00000003
    8FD9DFB4 009052DC 047E85C4 00000000 00000000 00000000 D.~.............
    8FD9DFB8 9FEA2C70 00000001 00000010 9FEA2C3C 00000002 ........<,j.....
    8FD9DFF0 9EDF8F2C NILE.NLM|ASN1_template_free+8A
    8FD9DFF4 009052DC 047E85C4 00000000 00000000 00000000 D.~.............
    8FD9DFF8 9FEA2C70 00000001 00000010 9FEA2C3C 00000002 ........<,j.....
    8FD9DFFC 00000000
    8FD9E014 9EDF8E55 NILE.NLM|ASN1_item_ex_free+281
    8FD9E018 009052DC 047E85C4 00000000 00000000 00000000 D.~.............
    8FD9E01C 9FE9B6C4 00000000 00000000 00000018 9FE9B627 ............'6i.
    8FD9E020 0000000A
    8FD9E054 9EDF8F2C NILE.NLM|ASN1_template_free+8A
    8FD9E058 04622844 009052C4 00000000 00000000 00000000 DR..............
    8FD9E05C 9FE9B720 00000001 00000010 9FE9B64C 0000000A ........L6i.....
    8FD9E060 00000000
    8FD9E078 9EDF8E55 NILE.NLM|ASN1_item_ex_free+281
    8FD9E07C 04622844 009052C4 00000000 00000000 00000000 DR..............
    8FD9E080 9FE9B768 00000000 00000000 00000000 9FE9B754 ............T7i.
    8FD9E084 0000000A
    8FD9E0B8 9EDF8BCD NILE.NLM|ASN1_item_free+11
    8FD9E0BC 8FD9E0D0 04622844 9FE9B7AC 8FD9E0F0 9EDD8B5E D(b.,7i.p`Y.^.].
    8FD9E0C0 9FE9B7AC 00000001 00000010 9FE9B768 00000003 ........h7i.....
    8FD9E0C4 00000000
    8FD9E0CC 9EDD7D2F NILE.NLM|X509_free+10
    8FD9E0D0 04622844 009052C4 00000000 00000000 00000000 DR..............
    8FD9E0D4 9FE9B7AC 00000001 00000010 9FE9B768 00000003 ........h7i.....
    8FD9E0D8 8FD9E0F0 8FD9E104 9EDD09AF 046F6964 55325B84 .aY./.].dio..[2U
    8FD9E0DC 9EDD8B5E NILE.NLM|ssl_cert_free+8E
    8FD9E0E0 04622844 009052C4 00000000 00000000 00000000 DR..............
    8FD9E0E4 8FD9E0F0 8FD9E104 9EDD09AF 046F6964 55325B84 .aY./.].dio..[2U
    8FD9E0F4 9EDD09AF NILE.NLM|SSL_CTX_free+D1
    8FD9E0F8 046F6964 046F6984 00000000 00000000 00000000 .io.............
    8FD9E0FC 55325B84 00000020 00908E64 9EDC3710 00000000 ...d....7\.....
    8FD9E108 9EDC4825 NILE.NLM|SSLDeRegister+A5
    8FD9E10C 04B4E504 9FEC9398 04B623A4 04B57784 04632484 ..l.$#6..w5..$c.
    8FD9E118 9FEF5542 WSPSSL.NLM|WSPSSL_deleteSktProc+1D2
    8FD9E11C 04B4E504 9FEC9398 04B623A4 04B57784 04632484 ..l.$#6..w5..$c.
    8FD9E134 9FEEFE5A WSPSSL.NLM|SSLMapSessnReleaseWTD+EE
    8FD9E138 9EBBE8A0 00000000 8E7792A0 00000080 0000000A .... .w.........
    8FD9E154 9FEEFD8D WSPSSL.NLM|SSLMapSessnReleaseWTD+21
    8FD9E158 8E7792A0 9FEF83CC 9FEF8430 00000001 00000000 L.o.0.o.........
    8FD9E164 00361298 SERVER.NLM|kDoFastWorkToDo+28
    8FD9E168 9FD2D020 00000000 9FEEFD6C 9FD74C00 00000000 ....l}n..LW.....
    8FD9E184 0022476C SERVER.NLM|kWorkToDoCheckAllRunFast+A4
    8FD9E19C 00224EE8 SERVER.NLM|MpkSystemWork+68
    8FD9E1A8 002181C4 SERVER.NLM|SchedThreadYield+340
    8FD9E1BC 003615F1 SERVER.NLM|TimerInterruptHandlerBackEnd+9A
    8FD9E260 00000000
    EIP invalid.
    Novell Open Enterprise Server, NetWare 6.5
    PVER: 6.50.08
    Server N05 halted Wednesday, November 23, 2011 10:35:58.629 am
    Abend 1 on P00: Server-5.70.08-1315: Kernel detected an attempted context switch in an MPK Fast WTD.
    Registers:
    CS = 0008 DS = 0010 ES = 0010 FS = 0010 GS = 0023 SS = 0010
    EAX = 00000000 EBX = 00000001 ECX = 00000000 EDX = 00090009
    ESI = 00000006 EDI = 9FE40018 EBP = FBF138DB ESP = A4930264
    EIP = 002231BA FLAGS = 00000002
    002231BA 83C404 ADD ESP, 00000004
    EIP in SERVER.NLM at code start +00019B5Ah
    The violation occurred while processing the following instruction:
    002231BA 83C404 ADD ESP, 00000004
    002231BD 833D14D0030000 CMP [SERVER.NLM|SleepNotAllowedUseCount]=00000001
    , 00000000
    002231C4 7482 JZ 00223148
    002231C6 833DACC1030000 CMP [0003C1AC]=00000000, 00000000
    002231CD 0F84D5000000 JZ 002232A8
    002231D3 85DB TEST EBX, EBX
    002231D5 0F84BA000000 JZ 00223295
    002231DB 8B1DE843F0FB MOV EBX, [FBF043E8]=FBF24D68
    002231E1 53 PUSH EBX
    002231E2 E8AF38EFFF CALL LOADER.NLM|Abend
    Running process: Apache_Worker 66 Process
    Thread Owned by NLM: APACHE2.NLM
    Stack pointer: A4931E20
    OS Stack limit: A4922FC0
    CPU 0 (Thread A4921600) is in a NO SLEEP state
    Scheduling priority: 67371008
    Wait state: 5050010 Blocked on a Mutex
    Stack: --FBF138DB ?
    --9FE40020 ?
    --00000006 (LOADER.NLM|KernelAddressSpace+6)
    --9FE40000 ?
    00220CFC (SERVER.NLM|SchedSwitch+48)
    --00000001 (LOADER.NLM|KernelAddressSpace+1)
    --9FE40020 ?
    --9FE40018 ?
    --00000006 (LOADER.NLM|KernelAddressSpace+6)
    --9FE40000 ?
    0020EAFC (SERVER.NLM|kMutexLock+1AC)
    --9FE40024 ?
    --9FE40080 ?
    --A49302B8 ?
    --00000000 (LOADER.NLM|KernelAddressSpace+0)
    --04719004 ?
    --9D9A589C ?
    883E6AC9 (LIBC.NLM|pthread_mutex_lock+A9)
    --9FE40000 ?
    --04719004 ?
    --00000006 (LOADER.NLM|KernelAddressSpace+6)
    --A49302C4 ?
    9F92FAF1 (NILE.NLM|SSL_library_init+26C)
    --9D9A589C ?
    --A49302E8 ?
    9F93FABF (NILE.NLM|CRYPTO_lock+8F)
    --00000009 (LOADER.NLM|KernelAddressSpace+9)
    --00000009 (LOADER.NLM|KernelAddressSpace+9)
    -A007C114 (NILE.NLM|RSA_version+28)
    --000000F6 (LOADER.NLM|KernelAddressSpace+F6)
    -A00A9448 (NILE.NLM|serverPostFix+1968)
    --A49302EC ?
    --04719004 ?
    --A4930310 ?
    9F93FB44 (NILE.NLM|CRYPTO_add_lock+5A)
    --00000009 (LOADER.NLM|KernelAddressSpace+9)
    --00000009 (LOADER.NLM|KernelAddressSpace+9)
    -A007C114 (NILE.NLM|RSA_version+28)
    --000000F6 (LOADER.NLM|KernelAddressSpace+F6)
    --00000000 (LOADER.NLM|KernelAddressSpace+0)
    -A00A9448 (NILE.NLM|serverPostFix+1968)
    --04719004 ?
    --00000006 (LOADER.NLM|KernelAddressSpace+6)
    --A4930338 ?
    9F93C0AF (NILE.NLM|RSA_free+2E)
    --046F21BC ?
    --FFFFFFFF ?
    --00000009 (LOADER.NLM|KernelAddressSpace+9)
    -A007C114 (NILE.NLM|RSA_version+28)
    --000000F6 (LOADER.NLM|KernelAddressSpace+F6)
    -A00A9448 (NILE.NLM|serverPostFix+1968)
    --04719004 ?
    --04719004 ?
    --A4930348 ?
    9F943A81 (NILE.NLM|EVP_PKEY_free+97)
    --046F2184 ?
    --00000002 (LOADER.NLM|KernelAddressSpace+2)
    --A493035C ?
    9F943A2A (NILE.NLM|EVP_PKEY_free+40)
    --04790FC4 ?
    9F954F2C (NILE.NLM|ASN1_template_free+8A)
    --00000000 (LOADER.NLM|KernelAddressSpace+0)
    --A4930370 ?
    9F94F660 (NILE.NLM|PKCS7_DIGEST_free+35)
    --04790FC4 ?
    -A0082C70 (NILE.NLM|X509_PUBKEY_it+0)
    --047571A4 ?
    --A49303B4 ?
    9F954E7A (NILE.NLM|ASN1_item_ex_free+2A6)
    --00000003 (LOADER.NLM|KernelAddressSpace+3)
    --046C809C ?
    -A0082C70 (NILE.NLM|X509_PUBKEY_it+0)
    --9FD8FB40 ?
    -A0082C28 (NILE.NLM|PKCS7_ATTR_VERIFY_it+34)
    -A0082C3C (NILE.NLM|PKCS7_ATTR_VERIFY_it+48)
    --9FD8FB40 ?
    --A49303B0 ?
    -A0082C10 (NILE.NLM|PKCS7_ATTR_VERIFY_it+1C)
    9F94F641 (NILE.NLM|PKCS7_DIGEST_free+16)
    --00000002 (LOADER.NLM|KernelAddressSpace+2)
    --04772F24 ?
    --047571A4 ?
    --04719004 ?
    --00000003 (LOADER.NLM|KernelAddressSpace+3)
    --A49303D8 ?
    9F954F2C (NILE.NLM|ASN1_template_free+8A)
    --046C809C ?
    -A0082C70 (NILE.NLM|X509_PUBKEY_it+0)
    --00000000 (LOADER.NLM|KernelAddressSpace+0)
    --04748004 ?
    --00000005 (LOADER.NLM|KernelAddressSpace+5)
    --046C809C ?
    --00000003 (LOADER.NLM|KernelAddressSpace+3)
    --A4930418 ?
    9F954E55 (NILE.NLM|ASN1_item_ex

    Maybe Hamish Speirs can explain it - it was his post in another thread that gave me the idea and commands to try (see http://forums.novell.com/forums/nove...r-10038-a.html).
    We had a confluence of changes at the beginning of the semester (Sept) that no doubt helped contribute to the problem and yet also mask the real cause to a certain extent.
    1. The Thawte cert expired and was replaced with a new cert - Thawte does not support doing renewals on NetWare. This happened around the start of Sept.
    2. School semester begins. Thousands of students return.
    3. We use Pcounter for pay-for-print and it uses httpstk to provide a webpage for students to authorize print jobs.
    4. Printing activity in general goes way up.
    5. All printers are Secure.
    6. Apache, iPrint and httpstk all use the same Thawte certificate
    7. The print server was also hosting the netstorage service which also uses the Thawte cert (via apache).
    8. The print server was recently (August) virtualized (via p2v using the excellent Portlock Storage Manager)
    Eventually I built a new NetWare vm to host print services and got a new cert so at least the netstorage and print services were no longer running together. I suspected at that point that the likely source of the abends was NetStorage since Nile and SSL were almost always involved in the abends.
    After the separation the issues continued - so it wasn't netstorage's fault. Desparate searching of the 'net lead to H.'s post. The rest is history!
    It has now been 9 days up uptime without a single nile/ssl related abend ( I had one abend in pcounter but services survived).
    Ron
    "Seasoned Greasings and Happy New Rear!"

  • Sql server service wont start after disabling TLS 1.0 and SSL 3.0 on windows

    We have been hardening our servers for some time now and recently we disabled SSL 3.0 because of the poodle attack. When I did this on one of our test servers SQL Server failed to start up after the restart.
    I have been able to reproduce this on Windows Server 2012 and Windows 7 by disabling TLS 1.0 and SSL 3.0 through the registry. I am using SQL Server 2012 on the server machine. On my windows 7 machine sql server 2012 and sql server 2005 will not start with
    those disabled.
    These are the event log errors I get: 
    Application Logs: 
    (28/10/2014 8:38:54 AM) SQL Server could not spawn FRunCM thread. Check the SQL Server error log and the Windows event logs for information about possible related problems. 
    (28/10/2014 8:38:54 AM) Could not start the network library because of an internal error in the network library. To determine the cause, review the errors immediately preceding this one in the error log. 
    (28/10/2014 8:38:54 AM) TDSSNIClient initialization failed with error 0x80090331, status code 0x1. 
    (28/10/2014 8:38:54 AM) TDSSNIClient initialization failed with error 0x80090331, status code 0x80. 
    System Logs: 
    (28/10/2014 8:38:54 AM) The SQL Server (MSSQLSERVER) service terminated with service-specific error %%-2146893007. 
    (28/10/2014 8:38:54 AM) A fatal error occurred while creating an SSL server credential. The internal error state is 10013. 
    Done anyone know have we can keep SSL 3.0 and TLS 1.0 disabled and get SQLServer server to start?

    Hi Don,
    I already have TLS 1.0 Disabled to prevent the BEAST exploit. So the values I have for:
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 
    1.0\Server
    HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 
    1.0\Client
    Both have enabled set to ("Enabled"=dword:00000000).
    If change both of these back to ("Enabled"=dword:00000001)
    to enable TLS 1.0, and restart then SQLServer is able to start again. But we are now vulnerable to the BEAST attack once again.
    If I keep server enabled and disable the client or vice versa and restart. Then SQLServer starts but I
    am unable to connect to it. When I check the Event logs I get the same errors as my original past.
    With your last post, do you mean to backup SCHANNEL and delete it so it gets recreated? If that is the case it will probably work because if I re enable SSL 3.0 or TLS 1.0 from here it fix's the issue,  but I then I won't have the exploits patched and
    we need this for some of our customers.
    This is my SCHANNEL Export:
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols]
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0]
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 2.0\Client]
    "DisabledByDefault"=dword:00000001
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 3.0]
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 3.0\Client]
    "DisabledByDefault"=dword:00000001
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\SSL 3.0\Server]
    "Enabled"=dword:00000000
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0]
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Client]
    "Enabled"=dword:00000000
    [HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecurityProviders\SCHANNEL\Protocols\TLS 1.0\Server]
    "Enabled"=dword:00000000

  • IE browser and Web Cache and SSL - Internet Explorer cannot display the web page

    When using IE8, IE9, or IE10 with Web Cache and SSL certain pages which display a lot of data returns the error - "Internet Explorer cannot display the web page."
    if we eliminate SSL but continue to use Web Cache, the error does *not* reproduce & If we eliminate Web Cache altogether the error again does *not* reproduce.  The error is only reproducible when we use SSL with Web Cache and if we use IE and we access *large* pages. The error is not reproducible with Firefox or Chrome. This is a Web Tier 11.1.1.7 installation with WebLogic 10.3.6 & Red Hat Enterprise 5 Linux x86-64
    Event_log shows below errors.
    [2013-06-13T16:34:35-04:00] [webcache] [NOTIFICATION:1] [WXE-09002] [logging] [ecid: ] Generated by Oracle Web Cache on Thu Jun 13 16:34:35 2013 - Build 11.1.1.7.0 130113.0721
    [2013-06-13T16:34:36-04:00] [webcache] [NOTIFICATION:1] [WXE-08513] [logging] [ecid: ] Cache server process ID 4469 is starting up.
    [2013-06-13T16:34:36-04:00] [webcache] [NOTIFICATION:1] [WXE-09612] [main] [ecid: ] Oracle Web Cache 11g (11.1.1.6), Build 11.1.1.7.0 130113.0721
    [2013-06-13T16:34:37-04:00] [webcache] [NOTIFICATION:1] [WXE-13002] [config] [ecid: ] Maximum allowed incoming connections are 1000
    [2013-06-13T16:35:00-04:00] [webcache] [NOTIFICATION:1] [WXE-09441] [stats] [ecid: ] DMS enabled
    [2013-06-13T16:35:28-04:00] [webcache] [NOTIFICATION:1] [WXE-12209] [cluster] [ecid: ] A 1 node cluster successfully initialized
    [2013-06-13T16:35:29-04:00] [webcache] [NOTIFICATION:1] [WXE-09614] [main] [ecid: ] The following Oracle Web Cache internal files are pre-populated to the cache: [[
            /nssb-p.adm.fit.edu:7785/_oracle_http_server_webcache_static_.html
            /nssb-p.adm.fit.edu:4448/_oracle_http_server_webcache_static_.html
    [2013-06-13T16:35:29-04:00] [webcache] [NOTIFICATION:1] [WXE-09614] [main] [ecid: ]  [[
    The following Oracle Web Cache internal files are pre-populated to the cache: [[
            /nssb-p.adm.fit.edu:7785/_oracle_http_server_webcache_checkserviceavailability_.html
            /nssb-p.adm.fit.edu:4448/_oracle_http_server_webcache_checkserviceavailability_.html
    [2013-06-13T16:35:29-04:00] [webcache] [NOTIFICATION:1] [WXE-09608] [main] [ecid: ] The cache server process started successfully.
    [2013-06-13T16:35:29-04:00] [webcache] [WARNING:1] [WXE-12104] [utl] [ecid: ] Oracle Web Cache process has page faulted
    [2013-06-13T16:44:22-04:00] [webcache] [ERROR:32] [WXE-11904] [security] [ecid: ] SSL handshake fails SSL-29049
    [2013-06-13T16:44:22-04:00] [webcache] [WARNING:1] [WXE-11905] [security] [ecid: ] SSL additional information: The record type is unknown.
    [2013-06-13T16:44:22-04:00] [webcache] [WARNING:1] [WXE-11905] [security] [ecid: ] SSL additional information: Remote IP [163.118.22.16]:55145
    [2013-06-13T16:44:22-04:00] [webcache] [WARNING:1] [WXE-11905] [security] [ecid: ] SSL additional information: Local IP 163.118.170.70:4448
    [2013-06-13T16:44:22-04:00] [webcache] [WARNING:1] [WXE-11906] [security] [ecid: ] SSL details: SSL error during handshake (details: internal=The record type is unknown. system=Success)
    [2013-06-13T16:44:27-04:00] [webcache] [ERROR:32] [WXE-11904] [security] [ecid: ] SSL handshake fails SSL-29049
    [2013-06-13T16:44:27-04:00] [webcache] [WARNING:1] [WXE-11905] [security] [ecid: ] SSL additional information: The record type is unknown.
    [2013-06-13T16:44:27-04:00] [webcache] [WARNING:1] [WXE-11905] [security] [ecid: ] SSL additional information: Remote IP [163.118.22.16]:55144
    [2013-06-13T16:44:27-04:00] [webcache] [WARNING:1] [WXE-11905] [security] [ecid: ] SSL additional information: Local IP 163.118.170.70:4448
    [2013-06-13T16:44:27-04:00] [webcache] [WARNING:1] [WXE-11906] [security] [ecid: ] SSL details: SSL error during handshake (details: internal=The record type is unknown. system=Success)
    [2013-06-13T16:44:27-04:00] [webcache] [ERROR:32] [WXE-11904] [security] [ecid: ] SSL handshake fails SSL-29049
    [2013-06-13T16:44:27-04:00] [webcache] [WARNING:1] [WXE-11905] [security] [ecid: ] SSL additional information: The record type is unknown.
    [2013-06-13T16:44:27-04:00] [webcache] [WARNING:1] [WXE-11905] [security] [ecid: ] SSL additional information: Remote IP [163.118.22.16]:55148
    [2013-06-13T16:44:27-04:00] [webcache] [WARNING:1] [WXE-11905] [security] [ecid: ] SSL additional information: Local IP 163.118.170.70:4448
    [2013-06-13T16:44:27-04:00] [webcache] [WARNING:1] [WXE-11906] [security] [ecid: ] SSL details: SSL error during handshake (details: internal=The record type is unknown. system=Success)
    [2013-06-13T16:44:35-04:00] [webcache] [ERROR:32] [WXE-11904] [security] [ecid: ] SSL handshake fails SSL-28864
    [2013-06-13T16:44:35-04:00] [webcache] [ERROR:32] [WXE-11904] [security] [ecid: ] SSL handshake fails SSL-28864
    [2013-06-13T16:44:47-04:00] [webcache] [WARNING:1] [WXE-11905] [security] [ecid: ] SSL additional information: This error occurred because the peer closed the connection.
    [2013-06-13T16:44:47-04:00] [webcache] [WARNING:1] [WXE-11906] [security] [ecid: ] SSL details: success during initialization (details: internal=success system=Success)
    [2013-06-13T16:44:47-04:00] [webcache] [WARNING:1] [WXE-11905] [security] [ecid: ] SSL additional information: This error occurred because the peer closed the connection.
    [2013-06-13T16:44:47-04:00] [webcache] [WARNING:1] [WXE-11906] [security] [ecid: ] SSL details: success during initialization (details: internal=success system=Success)
    [2013-06-13T16:44:47-04:00] [webcache] [WARNING:1] [WXE-11905] [security] [ecid: ] SSL additional information: This error occurred because the peer closed the connection.
    [2013-06-13T16:44:47-04:00] [webcache] [WARNING:1] [WXE-11906] [security] [ecid: ] SSL details: success during initialization (details: internal=success system=Success)
    [2013-06-13T16:44:47-04:00] [webcache] [WARNING:1] [WXE-11905] [security] [ecid: ] SSL additional information: This error occurred because the peer closed the connection.
    [2013-06-13T16:44:47-04:00] [webcache] [WARNING:1] [WXE-11906] [security] [ecid: ] SSL details: success during initialization (details: internal=success system=Success)
    [2013-06-13T16:44:47-04:00] [webcache] [WARNING:1] [WXE-11905] [security] [ecid: ] SSL additional information: This error occurred because the peer closed the connection.
    [2013-06-13T16:44:47-04:00] [webcache] [WARNING:1] [WXE-11906] [security] [ecid: ] SSL details: success during initialization (details: internal=success system=Success)
    [2013-06-13T16:44:47-04:00] [webcache] [WARNING:1] [WXE-11905] [security] [ecid: ] SSL additional information: This error occurred because the peer closed the connection.
    [2013-06-13T16:44:47-04:00] [webcache] [WARNING:1] [WXE-11906] [security] [ecid: ] SSL details: success during initialization (details: internal=success system=Success)
    [2013-06-13T16:45:18-04:00] [webcache] [WARNING:1] [WXE-11905] [security] [ecid: ] SSL additional information: This error occurred because the peer closed the connection.
    [2013-06-13T16:45:18-04:00] [webcache] [WARNING:1] [WXE-11906] [security] [ecid: ] SSL details: success during initialization (details: internal=success system=Success)
    [2013-06-13T16:45:22-04:00] [webcache] [ERROR:32] [WXE-11904] [security] [ecid: ] SSL handshake fails SSL-28864
    [2013-06-13T16:45:22-04:00] [webcache] [ERROR:32] [WXE-11904] [security] [ecid: ] SSL handshake fails SSL-28864
    [2013-06-13T16:45:38-04:00] [webcache] [WARNING:1] [WXE-11905] [security] [ecid: ] SSL additional information: This error occurred because the peer closed the connection.
    [2013-06-13T16:45:38-04:00] [webcache] [WARNING:1] [WXE-11906] [security] [ecid: ] SSL details: success during initialization (details: internal=success system=Success)
    [2013-06-13T16:45:38-04:00] [webcache] [WARNING:1] [WXE-11905] [security] [ecid: ] SSL additional information: This error occurred because the peer closed the connection.
    [2013-06-13T16:45:38-04:00] [webcache] [WARNING:1] [WXE-11906] [security] [ecid: ] SSL details: success during initialization (details: internal=success system=Success)
    [2013-06-13T16:45:38-04:00] [webcache] [WARNING:1] [WXE-11905] [security] [ecid: ] SSL additional information: This error occurred because the peer closed the connection.
    [2013-06-13T16:45:38-04:00] [webcache] [WARNING:1] [WXE-11906] [security] [ecid: ] SSL details: success during initialization (details: internal=success system=Success)
    [2013-06-13T16:45:38-04:00] [webcache] [WARNING:1] [WXE-11905] [security] [ecid: ] SSL additional information: This error occurred because the peer closed the connection.
    [2013-06-13T16:45:38-04:00] [webcache] [WARNING:1] [WXE-11906] [security] [ecid: ] SSL details: success during initialization (details: internal=success system=Success)
    [2013-06-13T16:45:41-04:00] [webcache] [WARNING:1] [WXE-11905] [security] [ecid: ] SSL additional information: This error occurred because the peer closed the connection.
    [2013-06-13T16:45:41-04:00] [webcache] [WARNING:1] [WXE-11906] [security] [ecid: ] SSL details: success during initialization (details: internal=success system=Success)
    Any help or suggestions are greatly appreciated
    Tnx a lot,
    Lokesh

    Hello ,
    Try Below Workarounds:
    Workaround 1:
    Open Central Admin
    àApplication Management  à
    Configure Alternate access mapping-->Edit your web application zone and add your server name in Intranet zone. So default can be serverIP and intranet could be servername.
    Workaround 2:
    Might be there is some issue with DNS and try to check that WebApplication is pointing to correct IP or not.  
    Also try to access your Sharepoint site using ip Address .. If you still gets error Kindly share the logs .. 
    Best
    Regards Kuldeep Verma
    Please remember to click "Mark As Answer"
    if a post solves your problem or "Vote As Helpful" if it was useful.

  • EJB/8i deployment and SSL

    Hello JDev Team,
    I want to use SSL encryption and authentication in my InfoSwing BC4J Oracle8i application.
    For Local Deployment it's quite transparent you just define appropriate LocalConnection class and SSL works fine.
    But for EJB/8i Deployment it's not that clear. As I understand EjbConnection class can accept user/password authentication only.
    Do I have to extend oracle.dacf.dataset.connections.Connection class and create my own SSL-oriented Connection with my own setConnectionSpecificEnvs method? Is that a possibility?
    Could you please give me some directions on this case?
    Thanks,
    Victor
    null

    Please check the "How to's" in the JDeveloper section of OTN (http://otn.oracle.com). That should shed some light.
    Happy researching,
    Rajesh

  • Apache Vhosts and SSL

    Hi all,
    Iam having this problem with Virtual Hosts and SSL.
    The subdomains work fine but the problem is when you try to connect to the one with SSL then you get "ssl_error_rx_record_too_long"
    Its not a permission error and the certificate is created with the ssh.mydomain.com as FQDN name if that is of any importance
    Listen 443
    <VirtualHost 172.16.2.250:80>
    DocumentRoot /srv/http/www
    ServerName www.mydomain.com
    </VirtualHost>
    <VirtualHost 172.16.2.250:80>
    DocumentRoot /srv/http/glype
    ServerName proxy.mydomain.com
    </VirtualHost>
    <VirtualHost 172.16.2.250:80>
    DocumentRoot /srv/http/forum
    ServerName forum.mydomain.com
    </VirtualHost>
    <VirtualHost 172.16.2.250:443>
    DocumentRoot /srv/http/ssh
    ServerName ssh.mydomain.com
    SSLEngine ON
    SSLCertificateKeyFile "/etc/httpd/certs/server.key"
    SSLCertificateFile "/etc/httpd/certs/server.crt"
    SetEnvIf User-Agent ".*MSIE.*" nokeepalive ssl-unclean-shutdown
    CustomLog logs/ssl_request_log \
    "%t %h %{SSL_PROTOCOL}x %{SSL_CIPHER}x \"%r\" %b"
    ProxyRequests Off
    <Proxy *>
    Order deny,allow
    Allow from all
    </Proxy>
    ProxyPass / http://localhost:8100/
    ProxyPassReverse / http://localhost:8100/
    </VirtualHost>
    Iam grateful for all the help i can recieve.

    neddie_seagoon wrote:SSL needs to run on a dedicated IP (and responds to all https requests on that IP) so you can't have multiple vhosts with SSL on the same IP. You would need to bring up more IPs and then configure your other vhosts to use them.
    fyi: recent builds of apache and openssl can now do SNI.
    http://wiki.apache.org/httpd/NameBasedSSLVHostsWithSNI
    Also, if you use wildcard certificates, and your vhosts are all subdomains of the same top level domain, then that would work too. I have done this a few times before. Apache squaks a little when it starts up, but it works fine.
    But in the general case, and when using older builds of apache, you are correct regarding the ip requirements.
    Last edited by cactus (2009-08-29 18:44:16)

  • Apache and ssl

    Hi gurus,
    I know this is not the rite place to post this issue.But i gues someone has faced this problem.
    I want to configure ssl on Apache
    if there are any good documents or steps please let me know..
    I already have a certificate,genetrated by CA
    So i just need to configure http.conf file and ssl.conf..
    I have configured Appche and OAS10g,my url opens with default apache port now just want this configuration for https,want configure basically 443 port
    please help
    Thanks in Advance
    Fabian

    Hi Fabs,
    Bhai Try this one...
    Unsecuring the AS Control Application
    To unsecure the AS Control, follow these steps:
    1.     Stop the AS Control $ emctl stop iasconsole
    2.     Update AS Control's standalone OC4J container to support unsecure port in $ORACLE_HOME/sysman/j2ee/config/emd-web-site.xml
    Change the following line:
    <web-site host="[ALL]" port="<port>" display-name="Oracle Enterprise Manager iAS Console Website" secure="true">
    Into:
    <web-site host="[ALL]" port="<port>" display-name="Oracle Enterprise Manager iAS Console Website" secure="false">
    3.     In the same file (emd-web-site.xml), you also need to modify the ssl-config section at the bottom of the file
    Change the following line:
    <ssl-config needs-client-auth="true" keystore="server/keystore.test" keystore-password="%EMD_KEYSTORE_PASSWORD%" />
    Into:
    <ssl-config needs-client-auth="false" keystore="server/keystore.test" keystore-password="%EMD_KEYSTORE_PASSWORD%" />
    4.     Update AS Control Local Management Agent to support the unsecure HTTP protocol.
    The EMD_URL property in $ORACLE_HOME/sysman/config/emd.properties needs to get switched back to the HTTP (non-secure) protocol.
    Change:
    EMD_URL=https://<hostname>:<port>/emd/main
    Into:
    EMD_URL=http://<hostname>:<port>/emd/main
    5.     Update the standAloneConsoleURL property of oracle_ias target.
    Edit the file $ORACLE_HOME/sysman/emd/targets.xml to change the StandaloneConsoleURL property of oracle_ias target to switch back to the HTTP (non-secure) protocol.
    Change the following lines:
    <Target TYPE="oracle_ias" NAME="EnterpriseManager.<hostname>" ...> ... <Property NAME="StandaloneConsoleURL" VALUE="https://<hostname>:<port>/emd/console"/>
    Into:
    <Target TYPE="oracle_ias" NAME="EnterpriseManager.<hostname>" ...> ... <Property NAME="StandaloneConsoleURL" VALUE="http://<hostname>:<port>/emd/console"/>
    6.     Start the AS Control Application: $ emctl start iasconsole
    thanks,
    Santosh.

  • Certificate Based Authentication and SSL

    To whom it may concern,
    I have installed SJES on Solaris 9 x386 (intel version). Everything is running fine, the mails are also coming and going.
    Now, I need Certificate based authentication and SSL. I have downloaded versign.com trial certificate and have install it succesfully in the Messaging Server Console -- > Manage Certificates. The certificate is also visible in its tab.
    Next, I followed the documentation and enable ssl by using ./configutil utility. And also restarted the server.
    I am running my Messenger express (http) like this :
    http://testing.xyz.com:8100
    (I am using port 8100 for http access to mails). After restarting the mail server, I tried :
    https://testing.xyz.com:8100 also,
    http://testing.xyz.com:443 also,
    https://testing.xyz.com:443 also,
    but I cannot see the login page of the mail server. All the above mention url i tried and just given error "the connection was refused when attempting to contact testing.xyz.com. I CAN ONLY SEE THE LOGIN PAGE WHEN I WRITE THE OLD HTTP ADDRESS: i.e. http://testing.xyz.com:8100
    And I also checked the logs and the server is having no problem in starting and there is not a single word regarding SSL enabling in the logs.
    Please help me out, it's really a strange behaviour. I am using SunONE Messaging Server 6.0.
    Thanking you,
    Farhan Ahmed,
    System Engineer
    Dubai, UAE.

    Dear jay,
    I am pasting a line from imap and http logs ... i don't know what this error means and how to resolve it.
    [29/Dec/2004:14:42:45 +0100] testing imapd[888]: General Error: SSL initialization error: ASockSSL_Init: couldn't find cert Server-Cert (-8183)
    strange thing is that my certificate name is lowercase server-cert and also i can see in the GUI console the certificate name as lowercase and I have also set this parameter encryption.rsa.nssslpersonalityssl = server-cert (all lowercase), but the error in the log tells it as "Server-Cert" !!!! though it is "server-cert"
    i got this line from the http log:
    [29/Dec/2004:14:42:47 +0100] testing httpd[894]: General Error: SSL initialization error: ASockSSL_Init: couldn't find cert Server-Cert (-8183)
    I haven't missed the sslpassword.conf file step. I have placed the same password which i provided while generating the certificate request in the GUI.
    Help me out what this errors means and how to resolve them. I have also copied the cert7.db and key3.db to /opt/SUNWms*/config directory from the /var/opt/mps/serverroot/alias
    Thanking you,
    Farhan Ahmed,
    System Engineer,
    Dubai Internet City, Dubai, UAE.

  • 6.1 SP 2 certificate authenticator fails with Apache plugin and SSL

    Hi,
    Does anybody have a certificate authenticator working in WebLogic 6.1
    SP 2, in combination with the Apache HTTP Server plugin and SSL?
    We implemented a certificate authenticator that works correctly in
    WebLogic 6.1 SP 2 when we configure SSL with "Client Certificate
    Required", and access it directly from a browser (the browser hits the
    SSL port of the WebLogic server, like 7002).
    This certificate authenticator also works correctly with a proxy web
    server. We set up a Stronghold server (web server based on Apache) on
    Linux with the Apache HTTP Server plugin from BEA, configured the
    plugin to use SSL, and configured our WebLogic 6.1 SP 1 server without
    "Client Certificate Required". The certificate authenticator gets the
    end user's certificate correctly.
    This same architecture with the proxy web server does not work when we
    upgrade the WebLogic Server to SP 2. WebLogic Server logs the
    "incorrect or missing client cert" error, our certificate
    authenticator is never called, and the browser gets a 401 Unauthorized
    error.
    We looked all over the WebLogic 6.1 SP 2 installation for a newer
    version of the plugin (mod_wl_ssl.so) and found the same version as SP
    1. We double-checked that it was the Linux-specific installer
    (because we'd found that some Linux libraries are missing from the
    generic installer). So it appears to us that the plugin encodes the
    certificate in the request header in such a way that a SP 1 server can
    extract it, but an SP 2 server cannot. We were wondering whether
    there might be changes to the plugin to stay in step with the SP 2
    server that never got ported to Linux, or whether an updated Linux
    plugin never got included in the installer packages.
    So: has anybody gotten a system like
    Apache/Stronghold + WebLogic Plugin <-- SSL --> WebLogic 6.1 SP 2 +
    Cert Auth
    to work?
    Thanks in advance for any help,
    Jim Doyle
    [email protected]

    A correction, I think:
    Now that I rolled back a system to 6.1 SP 1, it looks like 6.1 SP 1
    does include a different mod_wl_ssl.so from that in SP 2. I believe I
    was comparing the wrong file. In fact, trying to compare versions of
    the mod_wl_ssl.so makes things rather confusing:
    A mod_wl_ssl.so from a straight weblogic610sp2_generic.zip install has
    a cksum of "1853014778 1132467".
    A mod_wl_ssl.so from a weblogic610sp1_generic.zip install with a
    subsequent SP 2 upgrade install has a cksum of "1350917183 1147927".
    A mod_wl_ssl.so from a plain 6.1 install with subsequent SP 1 and SP 2
    upgrade installs, followed by an SP 2 uninstall and another SP 1
    upgrade install, has a cksum of "1471948065 1136501".
    I think I may be looking at three different plugin versions here: 6.1,
    6.1 SP 1, and 6.1 SP 2, assuming the upgrade installs don't actually
    change mod_wl_ssl.so. I'm not sure whether there's an easier way to
    verify what version of the plugin you have.
    In any case, we did try each plugin version, and none of them works
    against a 6.1 SP 2 WebLogic server.
    Jim
    [email protected] (Jim Doyle) wrote in message news:<[email protected]>...
    [snip]
    We looked all over the WebLogic 6.1 SP 2 installation for a newer
    version of the plugin (mod_wl_ssl.so) and found the same version as SP
    1. We double-checked that it was the Linux-specific installer
    (because we'd found that some Linux libraries are missing from the
    generic installer). [snip]

  • What are the endpoints attributes collected by NAC Profiler through SNMP and DHCP?

    Hi Everyone,
    Please help on this.
    I want to know what are the endpoints attributes collected by NAC Profiler to discover and profile the endpoints.through SNMP protocol and DHCP protocol.
    Also if anybody can explain a simple used case on this.
    Please guide me on this.
    Thanks in advance.
    Thanks,
    Abuzar.

    Hi,
    SNMP
    =====
    NetMap queries network devices via SNMP for:
    System information
    Interface information
    Bridge information
    802.1X information (PAE MIB)
    Routing/IP information
    CDP MIB Information
    This information is used to Build and maintain a model of the network topology and endpoint discovery.
    NetMap uses SNMP Get, GetNext and GetBulk (when available) requests to  query the SNMP agents running on the network infrastructure devices to  gather specific Management Information Base (MIB) objects about their  status based on device type (Layer 2 or Layer 3).
    In addition to polling each network device for all MIB data at a regular  interval, NetMap may also be commanded to poll port-specific  information when the NAC Profiler system is notified that an endpoint  has joined or left the network via SNMP traps sent by devices at the  network edge, switches typically.
    Upon receipt and verification of a link state (link up, link down) or  MAC notification trap, NetTrap will notify the NAC Profiler Server that a  change has occurred on the network edge (endpoint joined or left a  network port). If the trapping device is in the NAC Profiler  configuration, the NetMap component module assigned to poll the device  that sent the trap will be commanded by the Server module to initiate a  poll of the device's port information to determine the change to the  endpoint topology that resulted in the trap being sent by the network  device.
    The information gathered by NetMap is processed by the Server  accordingly to update the network topology, noting the endpoint joining  or leaving a port. Note that NetMap SNMP polling of network devices  resulting from a trap is localized to the port specified in the trap.  This is unlike the regular polling that occurs at the frequency  specified for each device type (L2 and L3) which gathers all SNMP  information from the device used by the NAC Profiler system.
    DHCP:
    =====
    The NetWatch module listens for traffic including DHCP traffic.
    The module will collect all the DHCP information on the traffic collected, like mac address, ip address,  DHCP Vendor Class Identifier in DHCP request, host name in DHCP request, requested specified options in DHCP request (option 55) and full list of DHCP options supported by the DHCP client as specified in the DHCP request.
    All the endpointe data can then be used to map endpoints with profiles.
    HTH,
    Tiago
    If  this helps you and/or answers your question please mark the question as  "answered" and/or rate it, so other users can easily find it.

  • CSS 11501 and SSL

    Hi,
    I have a few questions regarding the CSS and SSL certificates.
    I have 2 CSS 11501 and 3 web servers, how many SSL certificates do I need?
    I want to configure the CSS as active - active, is this supported using the SSL accelleration module? If it is, is it configured the same way as a standalone CSS. The documentation only mentions configurations using single module and 2 modules in the same CSS.
    And a clarificacion: Does the term Backend in the CSS SSL config refer to servers on a different subnet (in our case physically separated). Our config is 2 FW -> 2 CSS -> 3 Web servers -> 2 backend FW -> 6 Backend servers (app and DB). Am I correct in assuming that Backend refer to this backend? (This might seem like a silly question but the documentation has me confused)
    Any help is much appreciated.
    Thanks,
    Niels

    Niels,
    there is currently an ASK THE EXPERT event.
    Please join us if you have more questions.
    Regarding the certificate, you could just use one.
    Get 1 certificate for your VIP and upload it on both SSL module.
    However, you might have to get 2, because certificate providers usually say it's one per physical device.
    If you plan on doing SSL on the servers as well, you need 3 more certificates. Or you coul use a single certificate if this is allowed by the company that will give it to you.
    Backend refers to server behind the CSS.
    Like a firewall defines inside and outside interfaces, the CSS define the frontend and the backend.
    The frontend is the client side and the backend the server side.
    When you say active/active, what do you want to achieve exactly ?
    You can indeed have 2 Vip and one is active on CSS1 while the other is active on CSS2.
    However, if the CSS shares the same set of servers, you need to be careful that the return traffic from the server to the client goes back to the same server. This may require client nat (group config).
    Regards,
    Gilles.

  • 11503 and SSL Termination - Cookie Handling

    I'm looking for some insight on how the 11503 handles SSL termination,
    specifically with regard to cookie handling. We are going to be
    installing a 11503, so it can handle load balancing, content switching
    and SSL termination instead of IIS / WLBS. If you move SSL termination
    off of the Web servers and disable SSL in IIS, how does ASP.NET handle
    secure cookies? We want to set requireSSL="true" in Web.config, but
    since the Web server will no longer be running SSL, it won't enforce
    that attribute. I was wondering if the content switch passed any
    special header to IIS, or if the content switch can be configured to
    add the secure attribute to all cookies. I haven't found anything in
    the documentation so far.

    Depending on your software version, this page has links to CSS SSL configuration Guides based upon the software you're running.
    http://www.cisco.com/en/US/customer/products/hw/contnetw/ps792/products_installation_and_configuration_guides_list.html
    You can configure the CSS to issue cookies in place of the actual server.

  • Configuration SAP EP systems in HTTPS and SSL

    Hi,
    Can anyone tell me the regarding the configuration SAP EP systems in HTTPS and SSL.
    The scenario is  Client -->Application gateway( Web Dispatcher) -->EP6
    Regards,
    Moulinath Ray

    Hi,
    I am giving to you the steps we do for our securization (EP 7.0):
    Prerequisites:
    -Download SAP Cryptographic ToolKit at http://service.sap.com/ swdc and -> SAP Crypto-graphic Software -> SAP JAVA CryptoToolkit (J2EE Engine as of Release 6.30)
    -Unzip it with SAPCAR
    Logon in SDM and deploy the file
    Check in Visual Admin -> Dispatcher/Server -> Libraries -> core_libs iaik_jce.jar is included
    Loof for SSL Service in Config Tool in Server and Dispatcher, it should be "always"
    Steps:
    -Asking for a certificate
    Visual Admin -> Cluster -> Server (central instance ) -> Services -> Key storage -> Service_ssl -> Create
    Fill in all the data, and be careful with the common name:
    -It shouldn´t have "http" or "https" on it
    -It shouldn´t have port number on it
    For example: "https
    www.myportal.domain:port", the common name should be "www.myportal.domain"
    Visual Admin -> Key Storage -> service_ssl -> Select your certificate and u201CGenerate CSR Requestu201D
    Send the file to a CA
    -Importing the validated certificate:
    Visual Admin -> Key Storage -> Import CSR Response
    In each Server, under SSL Provider, assign the certificate to port 50001, in each Dispatcher
    Now, the portal is secure, and you can check it now.
    A last step would be export the certificate and send it to your Network Team, so they can export it in the load balancing server, reverse proxy, etc.
    You can have a look at this link:
    http://help.sap.com/saphelp_nw04/helpdata/en/f1/2de3be0382df45a398d3f9fb86a36a/frameset.htm
    Some of the threads link:
    /message/5568001#5568001
    /thread/853387
    Regards,
    Niraj
    Edited by: Niraj Kumar on Jan 22, 2009 3:59 PM

  • Differenct between SNC and SSL

    Hi All,
    I have this question:
    What is the difference between and SNC and SSL?
    What are it's purpose?
    (The context is while using Trust Manager with SAP systems)
    Thanks and Regards, Pradeep

    You can use SSL for encryption where the SAP Web AS is either the server or the client component for the connection, such as:
    . Users connect to the SAP Web AS using their Web browser.
    . The SAP Web AS connects to another SAP Web AS.
    . The SAP Web AS connects to another Web server.
    SSL is supported in all these cases.
    For connections that use SAP protocols (RFC, DIAG), you can also use SNC on
    the SAP Web AS.
    SNC requires the use of an external security product to perform the encryption
    Similar to SNC, for SSL, the SAP Web AS uses the SAP Cryptographic Library
    to perform the cryptographic functions.
    However, for SNC, you can alternatively use a partner product. For SSL, you must
    use the SAP Cryptographic Library.
    Thanks
    Dheeraj

Maybe you are looking for

  • Pdf text inserted in page not sharp

    I have a large pdf document I would like to copy into a page on my site. The problem is that all the text is converted into a picture file together with all the rest of the images and thereby renders somewhat unsharp (the text, that is). Not being an

  • .. very simple issue.. very urgent.

    Hi SDN, We are finding out Longitude and Latitude for getting some output based on the address of customer.. I see there is use of Trignometric functions here.. I Just want to find out TAN 45 degreese value in ABAP.. When I calculate <b>TAN ( 45 )</b

  • Bill of exchange configuration

    Hello experts! I m having a problem. It has to do with bills of exchange. I have done all the configuration is need in testing enviroment and everything works ok. So i passed my requests to the productive enviroment, recreate all the relevant GL Acco

  • Regarding database table to infotype

    hi experts,                 sorry i m going to ask a typical question i m working on hr-abap ,i have developed a module pool in which the database table is updating with some data,what i want that after updation i want to store that data in a infotyp

  • Sql server 2008 service accounts.

    For Sql server agent and Sql Server Database engine a dedicated low privileged separate accounts are assigned while installing  Sql  Server 2008 R2.But when I am specifying Sql Server feature installation in the setup role and in feature selection I