RE: Cipher question...

2000-06-20 Thread Bernard Dautrevaux
> -Original Message- > From: Bill Rebey [mailto:[EMAIL PROTECTED]] > Sent: Tuesday, June 20, 2000 7:52 PM > To: [EMAIL PROTECTED] > Subject: RE: Cipher question... > > > > Even if all 64 bytes in my seed array are the same, (say for instance > 0x03F567A2) isn't > 0x03F567A203

Re: Cipher question...

2000-06-20 Thread Lutz Jaenicke
On Tue, Jun 20, 2000 at 01:51:34PM -0400, Bill Rebey wrote: > Thanks for pointing this out. Like I said, I knew the array would probably > contain 64 instances of the same values, but I didn't know it was so > terrible, largely because I don't even understand what the big pool of data > is really

RE: Cipher question...

2000-06-20 Thread Bill Rebey
Thanks for pointing this out. Like I said, I knew the array would probably contain 64 instances of the same values, but I didn't know it was so terrible, largely because I don't even understand what the big pool of data is really used for. You seem to have some legitimate insight into the random

Error while using BIO's

2000-06-20 Thread DeJuan Jackson
This is on a WIN2000 server using VC++6.0. Eventually the server side will be multi-threaded, that's why the Mutex setup. Any help is appreciated. BTW - I'm also encountering Memory leaks so if anyone has any suggestions along those lines I could use them. Server side Error: 1832:error:1408F10B

Re: Cipher question...

2000-06-20 Thread Goetz Babin-Ebell
Bill Rebey wrote: ... an broken snake oil random generator. > Start by running something like this before you do other SSL stuff: > time_t seed[64]; > for (int ii = 0; ii < 64; ii++) > { > time_t t = time (NULL); >

Re: "Suspending" certificate

2000-06-20 Thread Rich Salz
> I send a message some time-stamping authority, containing the > signature and the date and time at which I pretend to sign it; this > authority will then sign this message with it's own certificate adding the > date and time at which it signed it. Peter Sylvester talked about this a day

RE: "Suspending" certificate

2000-06-20 Thread Bernard Dautrevaux
> -Original Message- > From: Richard Levitte - VMS Whacker [mailto:[EMAIL PROTECTED]] > Sent: Tuesday, June 20, 2000 7:35 AM > To: [EMAIL PROTECTED]; [EMAIL PROTECTED] > Subject: Re: "Suspending" certificate > > > From: Yuji Shinozaki <[EMAIL PROTECTED]> > > ys2n> Hmmm. Doesn't this ge

RE: Cipher question...

2000-06-20 Thread Bill Rebey
Start by running something like this before you do other SSL stuff: time_t seed[64]; for (int ii = 0; ii < 64; ii++) { time_t t = time (NULL); seed[ii] = t; } RAND_seed (

Cipher question...

2000-06-20 Thread Braun Brelin
Hello, I'm getting errors of the following sort between my client and the s_server running under the openssl app... (Note: Using latest OpenSSL 0.95a on a SPARCstation 5 running Solaris 2.6). 15894:error:24064064:random number generator:SSLEAY_RAND_BYTES:PRNG not seeded:m d_rand.c:538: 1589

Re: OT: determining des vs. md5 vs ?

2000-06-20 Thread John Mills
In case this addresses the question, I installed MD5 and shadow passwords on a GNU/Linux system (RH6.1) with an existing user base and short 'crypt' passwords. It was totally painless. On Tue, 20 Jun 2000, John Hartnup wrote: > On Tue, Jun 20, 2000 at 09:47:54AM -0400, Rich Salz wrote: > > > s

Error System broken?

2000-06-20 Thread Bill Rebey
Hi all, I have two problems and could use some help. First problem: I am doing client authentication. It all works fine, until a client sends a bad certificate that is rejected by my server. After that point, my server can't accept any more connections. Every connection attempt - regardles

Compaq Tru64 UNIX + OpenSSL

2000-06-20 Thread Graham Van Epps
Hi. Im trying to get OpenSSL working on two systems running Compaq Tru64 UNIX 5.0. The systems are a DEC Alphaserver 4100 with 1 300mhz proc and 512MB RAM, and a DEC Alphaserver 800 with a 533 proc and 128MB of RAM. On both systems, when i run make to build OpenSSL, it fails saying "not enough

Re: OT: determining des vs. md5 vs ?

2000-06-20 Thread John Hartnup
On Tue, Jun 20, 2000 at 09:47:54AM -0400, Rich Salz wrote: > > sql table. I need to initialize the user/passwd data base with the > > existing data from my current /etc/passwd file (linux). > > No can do. The password file format is one-way. You cannot recover the > password from the password

Re: OT: determining des vs. md5 vs ?

2000-06-20 Thread Rich Salz
> sql table. I need to initialize the user/passwd data base with the > existing data from my current /etc/passwd file (linux). No can do. The password file format is one-way. You cannot recover the password from the password file. /r$ ___

Failing to connect to an OpenSSL server form IE, and Netscape

2000-06-20 Thread John Allen
Trying to connect to my OpenSSL enabled server from IE, and Netscape is failing in s3_pkt.c(249) with an SSL_R_WRONG_VERSION_NUMBER. The version numbers being sent down from IE, and Netscape are 40.1, and 43.1 respectively. Anyone know why this is happening? TIA --  ==

Re: "Suspending" certificate

2000-06-20 Thread Oscar Jacobsson
Mads Toftum wrote: > Does that make sense? If I were to compromise a cert at some point in time, > there would be nothing (except timestamping) that would keep me from > signing something as if it had been signed in the past. > > And the shortcut here would be timestamping - handled by someone els

Re: "Suspending" certificate

2000-06-20 Thread Mads Toftum
On Tue, Jun 20, 2000 at 07:34:53AM +0200, Richard Levitte - VMS Whacker wrote: > > Funny you should mentino this. It was taken up on the ietf-pkix list > just a few days ago, and I think someone concluded that a signature > would always be valid if corresponding to a cert that has once been > va