Re: x509 certificate conforming to RFC 3739

2013-02-14 Thread Walter H.
On Fri, February 15, 2013 07:07, Matthew Hall wrote: > On Fri, Feb 15, 2013 at 07:03:20AM +0100, Walter H. wrote: >> Hello, >> >> can someone, please tell me, how to generate a certificate >> that conforms to http://www.ietf.org/rfc/rfc3739.txt (RFC 3739) >> >> Thanks, >> Walter > > Hi Walter, > >

Re: x509 certificate conforming to RFC 3739

2013-02-14 Thread Matthew Hall
On Fri, Feb 15, 2013 at 07:03:20AM +0100, Walter H. wrote: > Hello, > > can someone, please tell me, how to generate a certificate > that conforms to http://www.ietf.org/rfc/rfc3739.txt (RFC 3739) > > Thanks, > Walter Hi Walter, We could help better if we understood what's not working for you a

x509 certificate conforming to RFC 3739

2013-02-14 Thread Walter H.
Hello, can someone, please tell me, how to generate a certificate that conforms to http://www.ietf.org/rfc/rfc3739.txt (RFC 3739) Thanks, Walter __ OpenSSL Project http://www.openssl.org User Supp

Re: DTLS over an alternate transport

2013-02-14 Thread Tom Cocagne
Thanks for the quick reply Joe. I am definitely interested in seeing your example, I've been unable to find many DTLS examples at all and certainly none that use an alternative transport mechanism. Also, have you taken into account the timer for dropped session initialization messages? I'm guessin

Re: DTLS over an alternate transport

2013-02-14 Thread Joel Dice
On Thu, 14 Feb 2013, Tom Cocagne wrote: I've seen examples where BIO pairs are used send SSL traffic over application-controlled data streams instead of using raw file descriptors. Is this possible with DTLS as well? Yes, that's what I'm doing. It seems to work perfectly as long as no packet

DTLS over an alternate transport

2013-02-14 Thread Tom Cocagne
I've seen examples where BIO pairs are used send SSL traffic over application-controlled data streams instead of using raw file descriptors. Is this possible with DTLS as well? Tom __ OpenSSL Project

Re: cipher suites for DTLSv1

2013-02-14 Thread Dr. Stephen Henson
On Thu, Feb 14, 2013, Joel Dice wrote: > Hi all, > > I've been experimenting with the DTLS support in OpenSSL recently > and discovered that my application was receiving garbage plaintext > when packets were lost or reordered. Closer inspection suggested a > possible cause: I was only enabling c

cipher suites for DTLSv1

2013-02-14 Thread Joel Dice
Hi all, I've been experimenting with the DTLS support in OpenSSL recently and discovered that my application was receiving garbage plaintext when packets were lost or reordered. Closer inspection suggested a possible cause: I was only enabling cipher suites which either used stream ciphers l

Re: Creating certification requests with no CN and SAN only

2013-02-14 Thread Matthew Hall
On Thu, Feb 14, 2013 at 11:55:59AM -0800, Matthew Hall wrote: > I used this configuration file: > > [req] > default_bits = 4096 > prompt = no > encrypt_key= no > default_md = sha256 > distinguished_name = dn > req_extensions = san > > [dn] > [san] > subjectAl

Re: Creating certification requests with no CN and SAN only

2013-02-14 Thread Matthew Hall
On Thu, Feb 14, 2013 at 05:37:00AM +, Viktor Dukhovni wrote: > On Thu, Feb 14, 2013 at 04:11:33AM +, Viktor Dukhovni wrote: > A more complete example: > > $ cat openssl.cnf > [ req ] > distinguished_name = dn > req_extensions = san > [ dn ] > [ san ] > subjectAl

Re: [openssl-users] Re: Creating certification requests with no CN and SAN only

2013-02-14 Thread Matthew Hall
Hi Erwann, On Thu, Feb 14, 2013 at 11:09:23AM +0100, Erwann Abalea wrote: > RFC5280 was not "written by the CAs themselves". Some of them are listed in the authorship; they also reference 5280 and other PKI RFCs in their standards they created as part of the CAB Forum and the Webtrust auditing

Re: Building FIPS module on sparc 64bit

2013-02-14 Thread Steve Marquess
On 02/13/2013 06:58 PM, Zeke Evans wrote: > Hi, > > Building the FIPS module on sparc 64-bit is generating a 32-bit > binary. The following message is in the output: > > WARNING! If you wish to build 64-bit library, then you have to > invoke './Configure solaris64-sparcv9-cc' *m

Re: Fips compliance

2013-02-14 Thread Jeffrey Walton
On Thu, Feb 14, 2013 at 5:12 AM, Gayathri Manoj wrote: > Hi All, > > Please let me know if openssl version 1.0.0 is fips compliant? http://www.openssl.org/docs/fips/UserGuide-2.0.pdf __ OpenSSL Project

Re: [openssl-users] Re: Creating certification requests with no CN and SAN only

2013-02-14 Thread Erwann Abalea
RFC5280 was not "written by the CAs themselves". The deprecation of CNs in favor of elements found in the SAN extension is logical and comes from CAs as well as browser vendors; CN use has been abused to contain names (human readable), IP addresses, and host names (either simple or fully quali