From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on inbox.vuxu.org X-Spam-Level: X-Spam-Status: No, score=0.2 required=5.0 tests=DKIM_INVALID,DKIM_SIGNED autolearn=no autolearn_force=no version=3.4.4 Received: (qmail 15841 invoked from network); 9 Apr 2023 14:17:04 -0000 Received: from 9front.inri.net (168.235.81.73) by inbox.vuxu.org with ESMTPUTF8; 9 Apr 2023 14:17:04 -0000 Received: from mail2.ecloud.global ([135.181.6.248]) by 9front; Sun Apr 9 10:15:59 -0400 2023 Received: from authenticated-user (mail2.ecloud.global [127.0.0.1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail2.ecloud.global (Postfix) with ESMTPSA id 424C57209C2 for <9front@9front.org>; Sun, 9 Apr 2023 14:15:49 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=e.email; s=mail2; t=1681049749; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=mvltUtBpENrlbJ3LjRs7Vs+GIeB+6F5F7B9VaDNU1cY=; b=gJudDBv2HNpZF98jFaCDaXvJLtD6vZCgFY2J4AUEK23UL+IAjAb9HbiUJk+OELtmlwmmaM cKr49FBsVCAxLeAHBszycyjyjZKButCm9yimTX9HzRFv32aQdYaESPifym85NULyl8o1Cm bd3Fni9F00D+KLwoNw0tHdaUxd1m5AQ= Date: Sun, 9 Apr 2023 14:15:46 +0000 (UTC) From: ooga@e.email To: 9front@9front.org Message-ID: In-Reply-To: <2395b93a-cc5d-4e87-8aae-20de85191293@e.email> References: <2395b93a-cc5d-4e87-8aae-20de85191293@e.email> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Correlation-ID: ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=e.email; s=mail2; t=1681049749; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=mvltUtBpENrlbJ3LjRs7Vs+GIeB+6F5F7B9VaDNU1cY=; b=Zvfqmf5Y/dnW34UPNw5us//d50hp7Ip/3ZfgUq61cBEi5yWUgIKyPDq6rzobBDXFD2O5NQ 8VUC8Asa/8+OBTIbrKzJ0yy/6P2qElatG8jpFrfylrAc3Nae76DljG0NqmP+FzT+ZuwiLP 2/FVQX/ztfF+aNBJW5pdMlzf8/PdW6A= ARC-Seal: i=1; s=mail2; d=e.email; t=1681049749; a=rsa-sha256; cv=none; b=AYNOBnyQtCA5f00yGRP4avxGnd/lTVpsl6obh5JmiILcrwi8nI+ZxHsU+oV/g9xo4UG2S7 ZMAbUUN9CHxzZ1XfLVEcJpAoceC/TjSv26kwRsgINyLsk+VxrOP9CGT8OOluauaszwGBz8 EcGQ/CiZPjngr9cZN52PfLgsQNrPgJM= ARC-Authentication-Results: i=1; mail2.ecloud.global; auth=pass smtp.mailfrom=ooga@e.email List-ID: <9front.9front.org> List-Help: X-Glyph: ➈ X-Bullshit: just-in-time-scale database Subject: [9front] Re: Loading TLS keys from secstore during boot Reply-To: 9front@9front.org Precedence: bulk 2023-04-08T18:59:28Z ooga@e.email: > > Why it doesn't work? > What else can I do? Ha! Found man secstore. I know kung-fu! secstore -n works, but from /cfg/$sysname/cpustart, not cpurc.