This command is called from the same server PMG is running. IPv4 is working but not IPv6.
# ping enguard
PING enguard(enguard.en.com.sg (2001:df1:a800:1::4)) 56 data bytes
64 bytes from enguard.en.com.sg (2001:df1:a800:1::4): icmp_seq=1 ttl=64 time=0.057 ms
64 bytes from enguard.en.com.sg (2001:df1:a800:1::4): icmp_seq=2 ttl=64 time=0.053 ms
64 bytes from enguard.en.com.sg (2001:df1:a800:1::4): icmp_seq=3 ttl=64 time=0.067 ms
However it's working for IPv4
Code:
# netstat -lnp | grep 8006
tcp6 0 0 :::8006 :::* LISTEN 319630/pmgproxy
# ping enguard
PING enguard(enguard.en.com.sg (2001:df1:a800:1::4)) 56 data bytes
64 bytes from enguard.en.com.sg (2001:df1:a800:1::4): icmp_seq=1 ttl=64 time=0.057 ms
64 bytes from enguard.en.com.sg (2001:df1:a800:1::4): icmp_seq=2 ttl=64 time=0.053 ms
64 bytes from enguard.en.com.sg (2001:df1:a800:1::4): icmp_seq=3 ttl=64 time=0.067 ms
Code:
# openssl s_client -crlf -connect enguard.en.com.sg:8006
CONNECTED(00000003)
write:errno=104
---
no peer certificate available
---
No client certificate CA names sent
---
SSL handshake has read 0 bytes and written 309 bytes
Verification: OK
---
New, (NONE), Cipher is (NONE)
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
Early data was not sent
Verify return code: 0 (ok)
---
However it's working for IPv4
Code:
# openssl s_client -crlf -connect 103.255.250.80:8006
CONNECTED(00000003)
Can't use SSL_get_servername
depth=2 C = US, O = Internet Security Research Group, CN = ISRG Root X1
verify return:1
depth=1 C = US, O = Let's Encrypt, CN = R3
verify return:1
depth=0 CN = enguard.en.com.sg
verify return:1
---
Certificate chain
0 s:CN = enguard.en.com.sg
i:C = US, O = Let's Encrypt, CN = R3
1 s:C = US, O = Let's Encrypt, CN = R3
i:C = US, O = Internet Security Research Group, CN = ISRG Root X1
2 s:C = US, O = Internet Security Research Group, CN = ISRG Root X1
i:O = Digital Signature Trust Co., CN = DST Root CA X3
---
Server certificate
Last edited: