128b SSL

2000-10-15 Thread Stano Paška
I am beginner. I have linux Red Hat 6.1, apache 1.3.12, mod_ssl, openssl 0.9.5. I generated self signed certificate (for intranet use only). When I connect to my www server with browser (IE 5.0 cipher strength 56bit) it connect with 56bit SSL. It is OK. But when I connect to some commercial

No Subject

2000-10-15 Thread Darren Weatherall
<<...>> Darren Weatherall QA Analyst Office: (416) 226-2900 x3301 Cell: (416) 706-9291 [EMAIL PROTECTED] __ OpenSSL Project http://www.openssl.org User Support Mailing List

RE: SSL + VirtualHost in Apache 1.3.x

2000-10-15 Thread David Schwartz
> From: "David Schwartz" <[EMAIL PROTECTED]> > > davids> > TLS doesn't support name-based virtual servers either. > davids> > davids> Someone needs to yell at the TLS working group! A > davids> chance to 'automatically' add support for name-based virtual > davids> hosts to all protocols lay

Re: SSL + VirtualHost in Apache 1.3.x

2000-10-15 Thread Michael T. Babcock
Richard Levitte - VMS Whacker wrote: > This is why upgrading to TLS within the original protocol is a better > idea, as stated in RFC2817, among others. After all, it wouldn't be > that difficult to write a small routine library that deals with this > kind of upgrade, or so I imagine... Exactly

Re: MSIE 4.x - 5.0 and SSL v3

2000-10-15 Thread Michael T. Babcock
> What is mod_ssl anyway, the string "mod_ssl" does not exist in the > whole of OpenSSL and only once in OpenLDAP 2.0.6 as a FIXME? cf. http://www.modssl.org mod_ssl is an SSL extension to Apache that uses OpenSSL. __ OpenSSL P

RE: SSL + VirtualHost in Apache 1.3.x

2000-10-15 Thread Richard Levitte - VMS Whacker
From: "David Schwartz" <[EMAIL PROTECTED]> davids> > TLS doesn't support name-based virtual servers either. davids> davids> Someone needs to yell at the TLS working group! A davids> chance to 'automatically' add support for name-based virtual davids> hosts to all protocols layered on top

Re: Header size, again... Programmers nightmare

2000-10-15 Thread Carsten Rhod Gregersen
Hi I'm waiting on IBM for a detailed report. The site is protected by a firewall so that's why you can't test it. best regards Carsten - Original Message - From: "Dr S N Henson" <[EMAIL PROTECTED]> To: <[EMAIL PROTECTED]> Sent: Sunday, October 15, 2000 7:43 PM Subject: Re: Header size

Re: Header size, again... Programmers nightmare

2000-10-15 Thread Dr S N Henson
Carsten Rhod Gregersen wrote: > > Hi, > > Formerly I posted a report concerning connection test with > client authorisation against a IBM payment gateway. > > You requested that I tried with the openssl program again > but with debug turned on. > > I've done that and now I'm experiencing every

RE: SSL + VirtualHost in Apache 1.3.x

2000-10-15 Thread David Schwartz
> TLS doesn't support name-based virtual servers either. Someone needs to yell at the TLS working group! A chance to 'automatically' add support for name-based virtual hosts to all protocols layered on top of TLS is too good to give up. It would take decades to add that support to each p

Re: MSIE 4.x - 5.0 and SSL v3

2000-10-15 Thread Mark Tiramani
> I am not sure how relevant this is, but I am using SSL on MSIE 5.5 on a MS IIS >server with an > OpenSSL certificate installed and it works OK. The SSL v3 problems seem to have been fixed in IE 5.5 . That is, we have not seen anything obviously broken. it's the 5.0 versions and earlier that

Re: MSIE 4.x - 5.0 and SSL v3

2000-10-15 Thread Jim Hud
I am not sure how relevant this is, but I am using SSL on MSIE 5.5 on a MS IIS server with an OpenSSL certificate installed and it works OK.   I have been trying the get MS Outlook Express 5 to work with SSL and it just crashes.  I can't find any LDAP client apart from OpenLDAP ones that wil

MSIE 4.x - 5.0 and SSL v3

2000-10-15 Thread Mark Tiramani
After much trial-and-error, and after trying all the fixes we could find it appears that a range of IE 4.x and 5.0 browsers simply will not work reliably with mod_ssl built on OpenSSL > 0.9.4 when allowed to negotiate any kind of SSL v3. FYI, our current secure servers are built as follows: Open