Re: How do calculate the

2011-05-20 Thread G S
>Or is that an attacker wouldn't be able to figure out how to format the parameters? Bingo. Nor will he know valid values for those parameters. If someone goes to the trouble to run the app in an environment where he can scrutinize memory contents, then he can figure all this out. But that's bey

Re: How do calculate the

2011-05-20 Thread David Schwartz
On 5/18/2011 3:27 AM, G S wrote: I'm probably being obtuse here, but I don't see how encrypting your request with a public key would help you with your original problem. What stops a rogue app from doing the same encryption? They can't see what the parameters are. So what are they

Re: [openssl-users] CA

2011-05-20 Thread Alex Bergmann
Hi Erwann! On 05/19/2011 10:20 AM, Erwann ABALEA wrote: "old" end-user certificates can only be verified by the "old" CA certificate, of course (in case the CA is "renewed", with its key changed, etc). I didn't "renew" the CA certificate, I've used the existing private key to create thr new o

Re: [openssl-users] CA

2011-05-20 Thread Alex Bergmann
Hi Erwann! On 05/19/2011 10:20 AM, Erwann ABALEA wrote: "old" end-user certificates can only be verified by the "old" CA certificate, of course (in case the CA is "renewed", with its key changed, etc). I didn't "renew" the CA certificate, I've used the existing private key to create thr new

RE: [openssl-users] Quick eyeball requested - self generate openssl certs/CA

2011-05-20 Thread Eduardo Navarro
Serial Number/Randomness apart; how many certificates would you expect to issue in a year? How would you deploy the cert for trust among the different browsers? You should ensure that your certificates for SSL usage specify the appropriate EKU OID, in addition to path and issuance restricti

Re: [openssl-users] CA

2011-05-20 Thread Erwann ABALEA
Hodie XIV Kal. Iun. MMXI, Dave Thompson scripsit: > > From: owner-openssl-us...@openssl.org On Behalf Of Erwann ABALEA > > Sent: Thursday, 19 May, 2011 04:20 > > > Hodie XV Kal. Iun. MMXI, Alex Bergmann scripsit: > > > > The only way I found was to give the new Root Certificate the same > > > ser