Brian Nelson <[EMAIL PROTECTED]> writes:
>> % cat /dev/random | od -X
>
>I should then be using a 30-character octal random string, yes? I had
>to use urandom.
128-bit (16-byte, 32-character) hexadecimal string (more or less, according
to whatever hash algorithm you pick; 128 bits is for
Hi,
I don't know if this is the right place where I should ask this, but I'll do it
anyway. Is there an HOWTO about setting up an POP3 server with SSL support on a
Linux box?
Thanx.
__
OpenSSL Project
Hi,
Please tell me where I can find an HOWTO about setting up an POP3 server with
SSL on a Linux box?
Thanx.
__
OpenSSL Project http://www.openssl.org
User Support Mailing List
>Where can one find some info on pipesecd? Did not find anything
>on freebsd.org
http://www.freebsd.org/cgi/ports.cgi?query=pipsecd&stype=all
-Michael Robinson
__
OpenSSL Project http://
Hi all,
I'm on RH 6.1, Apache 1.3.9, modssl 2.4.8-1.3.9, and openssl 0.9.4. When
I attempted to establish a secure connection, my Netscape browser
complained about an incorrect "Message Authentication Code." The end of
ssl_engine_log looks like this:
[10/Nov/1999 20:47:25 25706] [info] Conne
I created a self signed with the following command:
openssl x509 -req -days 365 -in blahcsr.pem -signkey blahkey.pem -out blahcert.pem
blahkey was created with the genrsa command.
Now, docs and info I can gleen state that the -signkey option causes the resulting
output file,
in this case "blah
Jan Leßner wrote:
>
> Hello OpenSSL guys
> Does anybody know how to create a PKSC8 formatted private key file?
>
Well I wrote the PKCS#8 code so I might be able to help :-)
> As far as I understood, OpenSSL by default generates private key files
> in PKCS5 format. I was hoping that the pkcs8 t
Hi,
I managed to get a certificate up and running, but whilst running
with apache-ssl, i get :
[Thu Nov 11 11:18:50 1999] [debug] apache_ssl.c(355): Random input
/dev/urandom(1024) -> 1112
[Thu Nov 11 11:18:50 1999] [debug] apache_ssl.c(928): Generating 512 bit
key
[Thu Nov 11 11:18:51 19
Hi again,
I found my problem, I was simply including a .h
file more than once. Sorry about that...
Vince
- Original Message -
From:
Vincent
Levesque
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Tuesday, November 09, 1999 6:07
PM
Subject: VC6 - confli
Michael Robinson wrote:
>
> >2) What kind of key generation do I need for pipsecd?
>
> I use:
>
> % cat /dev/random | od -X
I should then be using a 30-character octal random string, yes? I had
to use urandom.
> That gives you one key per line, once you remove the formatting.
I assu
> >What is the purpose of global CAs such as
> >Verisign if I can't trust the certificates to identify an end user?
>
> That is indeed the question. At least the part before the "if" :)
>
> At least now you can have a single value (subject,issuer,serial#)
> to map "global identity" (sic) into l
>What is the purpose of global CAs such as
>Verisign if I can't trust the certificates to identify an end user?
That is indeed the question. At least the part before the "if" :)
At least now you can have a single value (subject,issuer,serial#)
to map "global identity" (sic) into local credentia
> >What I was hoping to determine from this thread was whether or not by
> >using a verified cert one could determine in a trusted manner who the
> >user is.
>
> You really think X509 certs should be a global ID
> mechanism? You think it's a step backwards that
> they're not?
I wouldn't describ
13 matches
Mail list logo