You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
from a Cygwin console. They then repeated the attempt from an elevated Command prompt.
Same error:
github.com/atc0005/check-cert/cmd/lscert/main.go:200 > Error fetching certificates chain error="error connecting to server (host: host1.example.com, IP: W.X.Y.Z): dial tcp W.X.Y.Z:443: connectex: An attempt was made to access a socket in a way forbidden by its access permissions." age_critical=15 age_warning=30 app_type=inspector cert_check_timeout=10s filename= logging_level=info port=443 server=host1.example.com version="check-cert v0.19.0 (https://github.com/atc0005/check-cert)"
I typed this manually and attempted to sanitize the host details, so I could have introduced a typo somewhere.
I'll try to replicate on a Windows 10 system under different access restrictions.
I should note that this was executed on the host environment and not within VMware Workstation (or similar local hypervisors).
The text was updated successfully, but these errors were encountered:
Everything I'm finding so far points to antivirus or other security software getting in the way. The consensus seems to be "check Windows firewall, then explicitly allow the app".
expand the error/advice mapping used for Nagios plugins to specifically handle this scenario (WSAEACCES)
add explicit handling for this in this project with a focus on lscert, certsum and cpcert since those are the most likely tools to be used from a Windows system
Someone gave this lscert binary a try on a Windows 10 systems:
They attempted to run:
$ ./lscert-windows-amd64 host1.example.com
from a Cygwin console. They then repeated the attempt from an elevated Command prompt.
Same error:
I typed this manually and attempted to sanitize the host details, so I could have introduced a typo somewhere.
I'll try to replicate on a Windows 10 system under different access restrictions.
I should note that this was executed on the host environment and not within VMware Workstation (or similar local hypervisors).
The text was updated successfully, but these errors were encountered: