: I'm trying to write an automated script to check for pending expiry dates in
: SSL certs.
Depending on your end-goal, this may or may not help you -- but if
you're just looking for something to poll your servers and flag
pending cert expirations, you may want to check out Recon:
On Tue, Jan 14, 2003 at 08:26:15PM +, Paul Reilly wrote:
> OpenSSL 0.9.7
> Trying to sign a server key with CA.sh or CA.pl
>
> ./CA.sh -newca
> openssl req -new -nodes -keyout newreq.pem -out newreq.pem
> ./CA.sh -sign
>
> however the CA.sh (or .pl) script core dumps on signing the sig
> at t
OpenSSL 0.9.7
Trying to sign a server key with CA.sh or CA.pl
./CA.sh -newca
openssl req -new -nodes -keyout newreq.pem -out newreq.pem
./CA.sh -sign
however the CA.sh (or .pl) script core dumps on signing the sig
at the commit stage:
Sign the certificate? [y/n]:y
1 out of 1 certificate req
Hi All,
Has anybody sucessfully compiled openssl in a OS/390 mainframe?
I have been researching using Google and it seems that there's nothing out
there about it.
I would appreciate if someone could give me some ideas
Thanks,
Sidney Fortes
___
On Tue, Jan 14, 2003 at 06:23:53AM -0800, Tim Regovich wrote:
> I removed opera from the equation, and went to a basic
> setup whereby I was running only s_server and
> s_client. On the s_server side, I ran using the -tls1
> option which chooses the the TLSv1_server_method call.
> I also set -no_
Thanks for the suggestion Lutz.
The issue is the rollback I think.
I removed opera from the equation, and went to a basic
setup whereby I was running only s_server and
s_client. On the s_server side, I ran using the -tls1
option which chooses the the TLSv1_server_method call.
I also set -no_ssl2