in other words, you have to install them together. SSL , then SSH. As far
as version information, check out the readme files for the ssh application.
They will tell you what version of SSL you will need to have installed
first.
-Original Message-
From: Steven Bade [mailto:[EMAIL PROTECT
No, SSL and SSH are two distinct and separate protocols. openSSH relys
on openSSL for the cryptographic algorithms.
Le-Vazquez, Thuy wrote:
> I've written an SSL server, will the server communicate with SSH client?
> If not, does anyone know how to hook this two together?
>
> -Thuy
>
"Le-Vazquez, Thuy" <[EMAIL PROTECTED]> writes:
> I've written an SSL server, will the server communicate with SSH client?
> If not, does anyone know how to hook this two together?
You don't. They're different protocols.
-Ekr
--
[Eric Rescorla [EMAIL PROTECTED]
I've written an SSL server, will the server communicate with SSH client?
If not, does anyone know how to hook this two together?
-Thuy
__
OpenSSL Project http://www.openssl.org
User Support Mailing
Hello,
I've searched the web regarding this issue but found
little to no information
that didn't cover what I've already tried.
Running Apache 1.3.26 with OpenSSL 0.9.6g on Solaris 2.7.
I was able to successfully test the initial configuration
with a test certificate but am now
http://www.rtfm.com/ssldump
If you downloaded ssldump from the link on the ssldump web site this
morning, please make sure you got version 0.9b3 and not version
0.9b2. The link on the web site had not been adjusted to point to
0.9b3.
You can check this by checking either the name on the
tarball
Hi
Embedding the public key in the code will solve your problem. Instead of
giving a certificate as a license, you could sign some arbitrary ASN1
structure that contains license information. That way, it will make it
even more difficult for someone to guess your license structure.
Be careful whe
There is no need to call RAND_screen() more than once.
0.9.4 is vulnerable to attacks because the random number generator is
not seeded with sufficient entropy. 0.9.6e takes more time in order
to generate the necessary entropy.
Using a hardcoded seed value with make your connections vulnerable.
Jasper Spit wrote:
> Hi,
>
> The following scenario. I'm running a company that sells software.
> When selling software to a new client I create a certificate for
> that client and sign it using my company's root certificate.
> The software in turn on startup checks if the client's certificate
>
Ultimately, you cannot prevent it; as long as the user has control of
their machine, they can "spoof" anything they want. You can, however,
make it more difficult/inconvenient for them.
For example, encode the DER form of your CA key directly into your
executable, then call d2i_xxx to get the
ANNOUNCE: ssldump: an SSL protocol analyzer v 0.9b3
Version 0.9b3
http://www.rtfm.com/ssldump/
RTFM, Inc. is pleased to announce the availability of ssldump 0.9b3
ssldump is an SSLv3/TLS network protocol analyzer. It identifies TCP
connections on the chosen network interface and attempts to inte
Hi,
The following scenario. I'm running a company that sells software.
When selling software to a new client I create a certificate for
that client and sign it using my company's root certificate.
The software in turn on startup checks if the client's certificate
was signed by my company, by matc
Hi,
Thanks for the reply.
But, I have another problem:
My appln was initially using openssl 0.9.4 and it
was calling RAND_screen() for each client.
Now I have moved to openssl 0.6e and what I have observed is that the
RAND_screen() takes a significant amount of time ab
I've the same problem if I try to get the private key using the source of
pkread.c. If I call it twice in a row it hangs at PKCS12_parse(p12,
password, &pkey, &cert, &ca).
The resulting error output:
Error parsing PKCS#12 file
1268:error:2306B076:PKCS12 routines:PKCS12_gen_mac:unknown digest
algo
Hi all,
i have a problem with the PKCS12_gen_mac() which is called from within
PKCS12_verify_mac().
I've a function which extracts the private key from a PKCS#12 file. If I
call it once all is fine, but if I call it twice (with the same or another
PKCS#12 file) the second run fails calling PKCS12
On MacOS 10.2, my compiled version of what was in the 096g tar ball
claims to be 096e. Is it just me (like I messed up the install) or
was the version string not updated?
[dhcp-9-238:~/DNS/openssl-0.9.6g/apps] % ./openssl version
OpenSSL 0.9.6e 30 Jul 2002
--
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
On Wed, Sep 11, 2002 at 11:56:00AM +0100, Andy Henson wrote:
> Functions like d2i_RSAPrivateKey are poorly documented at present: the
> docs just say ... for all sections.
>
> Since I investigated how to use them, I've written documentation: it's in
> pod format like the others. Shall I post i
Functions like d2i_RSAPrivateKey are poorly documented at present: the
docs just say ... for all sections.
Since I investigated how to use them, I've written documentation: it's in
pod format like the others. Shall I post it here or should I do something
else?
Andy Henson
d2i_RSAPublicKey.
On Wed, Sep 11, 2002 at 12:17:23PM +0800, How, Leekiau wrote:
> Hi,
>
> I have face some problem after installed SSL,
>
> 1. after SSL instalation, I logout as root user. I cannot login anymore from
> the console. I reboot the system, the screen prompted me "Invalid login"
> without prompt me th
i all
I'm trying to generate my fake client certificate for test purposes.
For this I'm using the "make certificate" command under apache (which
is tied to openssl via modssl).
I have a question in the process, when I reach STEP 3 it tells me:
"STEP 3: Generating X.509 certificate signed by Sn
Here's a one-line patch to Qpopper 4.0.4 that should probably fix all
your problems:
* patch file begins on next line *
diff -c -r popper.old/pop_tls_openssl.c
popper/pop_tls_openssl.c *** popper.old/pop_tls_openssl.c Tue Sep 10
14:48:20 2002 --- popper/pop_tls_openssl.c Tue Sep 10 14:51:
21 matches
Mail list logo