i am new to puppet and a bit in the dark. i am trying to run puppet master and agent on the same machine (Nov 5 snapshot):
$ sudo puppet agent -t Info: Creating a new SSL key for myhost Info: csr_attributes file loading from /etc/puppet/csr_attributes.yaml Info: Creating a new SSL certificate request for myhost Info: Certificate Request fingerprint (SHA256): 87:A6:96:54:03:DE:BB:6A:BC:E1:33:B7:75:3A:F0:9D:29:52:7A:81:66:A5:80:29:28:2B:CE:34:21:44:56:9B Exiting; no certificate found and waitforcert is disabled $ sudo puppet cert sign myhost Notice: Signed certificate request for myhost Notice: Removing file Puppet::SSL::CertificateRequest myhost at '/etc/puppet/ssl/ca/requests/myhost.pem' $ sudo puppet agent -t Info: Caching certificate for myhost Error: Could not request certificate: SSL_connect returned=1 errno=0 state=SSLv3 read server certificate B: certificate verify failed: [certificate revoked for /CN=myhost] Exiting; failed to retrieve certificate and waitforcert is disabled could this be because of the recent disabling of SSLv3? i found this bit in puppet/util/monkey_patches.rb: # (#19151) Reject all SSLv2 ciphers and handshakes require 'openssl' class OpenSSL::SSL::SSLContext if DEFAULT_PARAMS[:options] DEFAULT_PARAMS[:options] |= OpenSSL::SSL::OP_NO_SSLv2 | OpenSSL::SSL::OP_NO_SSLv3 else DEFAULT_PARAMS[:options] = OpenSSL::SSL::OP_NO_SSLv2 | OpenSSL::SSL::OP_NO_SSLv3 end DEFAULT_PARAMS[:ciphers] << ':!SSLv2' alias __original_initialize initialize private :__original_initialize def initialize(*args) __original_initialize(*args) params = { :options => DEFAULT_PARAMS[:options], :ciphers => DEFAULT_PARAMS[:ciphers], } set_params(params) end end and SSLv3 is also mentioned in puppet/network/http/webrick.rb: class Puppet::Network::HTTP::WEBrick CIPHERS = "EDH+CAMELLIA:EDH+aRSA:EECDH+aRSA+AESGCM:EECDH+aRSA+SHA384:EECDH+aRSA+SHA256:EECDH:+CAMELLIA256:+AES256:+CAMELLIA128:+AES128:+SSLv3:!aNULL:!eNULL:!LOW:!3DES:!MD5:!EXP:!PSK:!DSS:!RC4:!SEED:!IDEA:!ECDSA:kEDH:CAMELLIA256-SHA:AES256-SHA:CAMELLIA128-SHA:AES128-SHA" then there is this ticket that seems to go nowhere: https://tickets.puppetlabs.com/browse/PUP-1521 and finally this article was not very helpful for me: http://puppetlabs.com/blog/impact-assessment-sslv3-vulnerability-poodle-attack -f -- nobody can be exactly like me. even i have trouble doing so.