Netscape on Solaris even shows "You have
attempted to establish a connection with "abc.mydomain.com". However the
security certificate presented belongs to "abc.mydomain.com"
Uhhh.. I'm clueless
__
OpenSSL Project
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of Tan Eng Ten
> Sent: Tuesday, March 15, 2005 11:33 PM
> To: openssl-users@openssl.org
> Subject: Re: Field CN and the certificates
>
> Back to your original problem -- You said you were accessing
> the
Back to your original problem -- You said you were accessing the web
server by using IE, was that client machine in the same private network
(as the server)?
Have you tested accessing the web server from another client machine?
Maybe you should start looking from the client-end.
Vu Pham wrote:
-
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of Richard Sexton
> Sent: Tuesday, March 15, 2005 8:45 PM
> To: openssl-users@openssl.org
> Subject: RE: Field CN and the certificates
>
> >> >I use openssl to build a self-signed certificate for my web
>
>> >I use openssl to build a self-signed certificate for my web
>> server. I imported the CA cert to my PC already.
>> >
>> >When I open the web server, IE says the certificate is from
>> >a trusted CA as expected, the security certificate is valid, but it
>> >says the name is invalid.
>>
>> Yo
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of Dr.
> Stephen Henson
> Sent: Tuesday, March 15, 2005 7:08 PM
> To: openssl-users@openssl.org
> Subject: Re: Field CN and the certificates
>
> On Tue, Mar 15, 2005, Vu Pham wrote:
>
> >
> > I use ope
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of Richard Sexton
> Sent: Tuesday, March 15, 2005 5:56 PM
> To: openssl-users@openssl.org
> Subject: Re: Field CN and the certificates
>
> >I use openssl to build a self-signed certificate for my web
> s
On Tue, Mar 15, 2005, Vu Pham wrote:
>
> I use openssl to build a self-signed certificate for my web server. I
> imported the CA cert to my PC already.
> When I open the web server, IE says the certificate is from a trusted CA as
> expected, the security certificate is valid, but it says the name
>I use openssl to build a self-signed certificate for my web server. I
>imported the CA cert to my PC already.
>
>When I open the web server, IE says the certificate is from a trusted CA as
>expected, the security certificate is valid, but it says the name is
>invalid.
You mean like this: https://
I use openssl to build a self-signed certificate for my web server. I
imported the CA cert to my PC already.
When I open the web server, IE says the certificate is from a trusted CA as
expected, the security certificate is valid, but it says the name is
invalid.
I view the certificate and the CN
I've looking at the tests in the snapshots for 0.9.8. I am trying to
figure out what functionality regarding proxy certificates
has been implemented.
Here are 2 things that I am looking for:
1) I need to be able to do a handshake using proxy certificates for
client and server authentication.
2)
Hi All,
I'm not able to make ocsp requests behind our transparent proxy (squid).
The reason seems to be, that squid need http request with the syntax:
POST http://www.ocsp-server.net/ HTTP/1.0
or
POST / HTTP/1.0
Host: www.ocsp-server.net
but openssl sends:
POST / HTTP/1.0
Is this behavior rfc compl
Somebody could help me to resolv this problem?, I am trying to install
the Nessus scanner,so, OpenSSL is needed.
Thanks in advance
On Tue, 15 Mar 2005 11:59:06 -0600, Alejandro Almaraz
<[EMAIL PROTECTED]> wrote:
> I am having problems with OpenSSL 7e, here is the output for commands
> make test a
I am having problems with OpenSSL 7e, here is the output for commands
make test and make install:
#make test
Doing certs
ca-cert.pem => 1f6c59cd.0
dsa-ca.pem => 73912336.0
dsa-pca.pem => 24867d38.0
eng1.pem => 7a9820c1.0
eng2.pem => 56e607f4.0
eng3.pem => 878cf4c6.0
eng4.pem => a3c60019.0
eng5.
Hello!
I need to add more than one signature to PKCS7 struct. I use
openssl-0.9.8 and I've written code like
/*stuff from PKCS7_sign adding the signerinfo*/
/* indata is not NULL on detached signatures, NULL otherwise*/
if (!(p7bio = PKCS7_dataInit(p7, NULL))) {
P
Hi All,
I'm using OpenSSL 0.9.7d binaries on Solaris 10
platform. From the sanity testing it seems to be
working on Solaris 10.
Is anybody aware of OpenSSL officially supporting
Solaris 10 ? Also can you please share your
experience, if anyone of you had come across any
issues with OpenSSL binari
Is there an officially condoned mechanism to avoid caching the peer
certificate of unverified clients? I want to cache the session keys,
but if the peer certificate is not verified, there is not much point in
burning storage saving it in the session cache. Is it perhaps possible to
drop the cert e
try: gcc -Wall foo.c -o foo -lcrypto -lssl
[EMAIL PROTECTED] wrote:
Hi,
I tried to compile my program and ran into trouble. I am new to both: cygwin
and openssl, I don't know what I do wrong. Can someone please help me? I am
happy to provide any information needed.
I have installed the cygwin opens
Hi Brian,
Brian Hurt wrote:
Lecture warning.
On Mon, 14 Mar 2005, alok wrote:
Yeah, you need large key sizes- 128 bits keys just aren't enough
(they allow birthday attacks to be computationally feasible). But I
note that all the AES finalists went to 256 bit key sizes. This
would put a birthday
Hi
All,
When running the
make install for openssl-0.9.7e i get the following error:
making install in
crypto/err...making install in crypto/evp...making install in
crypto/asn1...making install in crypto/pem...making install in
crypto/x509...making install in crypto/x509v3...making insta
20 matches
Mail list logo