On Thu, May 03, 2012, Tammany, Curtis wrote:
> Well...
> If by "trusted store" you mean my one cert file pointed to by
> SSLCACertificateFile, then yes I added the Common Policy, SHA-1 Federal Root
> CA and DoD Interoperability Root CA certs to the cert file on my development
> site and increased
> From: owner-openssl-us...@openssl.org On Behalf Of Jeffrey Walton
> Sent: Monday, 30 April, 2012 02:39
> On Sun, Apr 29, 2012 at 5:40 PM, Mike Hoy wrote:
> > We use McAfee to scan our website for vulnerabilities. They
> claim the
> > following:
> >>
> >> Configure SSL/TLS servers to only use T
> From: owner-openssl-us...@openssl.org On Behalf Of ml
> Sent: Tuesday, 01 May, 2012 15:21
Aside: this question isn't really related to OpenSSL.
> i work on small projet
> https://github.com/fakessh/openprojectssl/blob/master/smtp.c
> https://github.com/fakessh/openprojectssl/blob/master/smtp.h
> From: owner-openssl-us...@openssl.org On Behalf Of Alex Chen
> Sent: Thursday, 03 May, 2012 13:47
> Thanks for the reply Erwin. Let me clarify the goal: the client
> wants to send an encrypted message to the server for security reason
> and the connection ... can be SSL [but
Well...
If by "trusted store" you mean my one cert file pointed to by
SSLCACertificateFile, then yes I added the Common Policy, SHA-1 Federal Root
CA and DoD Interoperability Root CA certs to the cert file on my development
site and increased the depth. I got a user with a long cert chain to try to
Well...
If by "trusted store" you mean my one cert file pointed to by
SSLCACertificateFile, then yes I added the Common Policy, SHA-1 Federal Root
CA and DoD Interoperability Root CA certs to the cert file on my development
site and increased the depth. I got a user with a long cert chain to try to
Hello, if requires a patch or some special flags for cpu VIA Nehemiah?
> For clarity, could you please add the following info:
> 1. Actual 12 hex code bytes from 0xb76bc1f3 to 0xb76bc1ff
> inclusive.
root@gatto:/tmp# gdb -c core /usr/bin/openssl
GNU gdb (GDB) 7.4.1
Program terminated with signal
Thanks for the reply Erwin. Let me clarify the goal: the client wants to send
an encrypted message to the server for security reason and the connection may
not be secured (cannot be changed during communication). Although the
connection can be set up to use SSL, it is configured by the user an
On Thu, May 03, 2012, Tammany, Curtis wrote:
> > It sounds like some clients have the correct intermediate certificate(s)
> > installed and some do not.
> >
> > They should select the certificate, click the "view" button and see if the
> > certificate path is complete (i.e. it says it is OK).
>
>
> It sounds like some clients have the correct intermediate certificate(s)
> installed and some do not.
>
> They should select the certificate, click the "view" button and see if the
> certificate path is complete (i.e. it says it is OK).
On systems (XP and some Win7) where the user can access the
On 2012-05-02 at 22:29 +0200, Dr. Stephen Henson wrote:
> > Problem 1: given:
> > tls_require_ciphers =
> > ALL:!SSLv2:!LOW:!EXPORT:!EDH:!ADH:!aNULL:!NULL:!DES:@STRENGTH
> > openssl_options = -all +no_tlsv1_1 +no_tlsv1_2
> > then on connection with { s_client -starttls smtp } I see:
> > 6430
Hi,
I wanted to upgrade the openssl to 0.9.8w, which is the latest and did the
following steps to build the tar.
On command prompt:
>perl Configure VC-WIN32 --prefix=c:\Packages\openssl-0.9.8w\inst
>ms\do_ms
From Visual Studio 2003 command prompt:
C:\Packages\openssl-0.9.8w>nmake -f ms
12 matches
Mail list logo