dpiquet / pve-monitor

pve-monitor is a tool to monitor hypervisor and virtual machines in a proxmox cluster
37 stars 24 forks source link

SSL_​VERIFY_​NONE for client is deprecated #29

Open SUS-EDV opened 8 years ago

SUS-EDV commented 8 years ago

Hello,

I'm using pve-monitor 1.07 on CentOS 7 and getting this warning on every command execution :

Using the default of SSL_​verify_​mode of SSL_​VERIFY_​NONE for client is deprecated! Please set SSL_​verify_​mode to SSL_​VERIFY_​PEER together with SSL_​ca_​file If you really don't want to verify the certificate and keep the connection open to Man-​In-​The-​Middle attacks please set SSL_​verify_​mode explicitly to SSL_​VERIFY_​NONE in your application. ******************************************************************* at /usr/lib64/perl5/LWP/Protocol/http.​pm line 35. length​() used on @array (did you mean "scalar​(@array)​"?) at /usr/lib64/perl5/IO/Compress/Zlib/Extra.​pm line 198. ******************************************************************* Using the default of SSL_​verify_​mode of SSL_​VERIFY_​NONE for client is deprecated! Please set SSL_​verify_​mode to SSL_​VERIFY_​PEER together with SSL_​ca_​file If you really don't want to verify the certificate and keep the connection open to Man-​In-​The-​Middle attacks please set SSL_​verify_​mode explicitly to SSL_​VERIFY_​NONE in your application. ******************************************************************* at /usr/lib64/perl5/LWP/Protocol/http.​pm line 35. ******************************************************************* Using the default of SSL_​verify_​mode of SSL_​VERIFY_​NONE for client is deprecated! Please set SSL_​verify_​mode to SSL_​VERIFY_​PEER together with SSL_​ca_​file If you really don't want to verify the certificate and keep the connection open to Man-​In-​The-​Middle attacks please set SSL_​verify_​mode explicitly to SSL_​VERIFY_​NONE in your application. ******************************************************************* at /usr/lib64/perl5/LWP/Protocol/http.​pm line 35. ******************************************************************* Using the default of SSL_​verify_​mode of SSL_​VERIFY_​NONE for client is deprecated! Please set SSL_​verify_​mode to SSL_​VERIFY_​PEER together with SSL_​ca_​file If you really don't want to verify the certificate and keep the connection open to Man-​In-​The-​Middle attacks please set SSL_​verify_​mode explicitly to SSL_​VERIFY_​NONE in your application. ******************************************************************* at /usr/lib64/perl5/LWP/Protocol/http.​pm line 35. OPENVZ OK 5 / 5 working VMs

It is saying that it is possible to "SSL​verify​mode explicitly to SSL​VERIFY​NONE" but it'd be insecure.

I have installed it as follows:

yum install perl-CPAN perl-JSON perl-libwww-perl perl-IO-Socket-SSL perl-Switch
cpan install Net::Proxmox::VE