On Fri, Mar 20, 2015 at 03:51:17PM +, Matt Caswell wrote:
> >> I am trying to use ECDH-RSA-AES256-SHA with ssl3 with s_client and
> >> s_server on
> >> the master branch. (cloned at commit
> >> f7683aaf36341dc65672ac2ccdbfd4a232e3626d) and then retested with a more
> >> recent clone: (commit
I assume it says it is a FIPS 140-2 approved mode because it is approved
by FIPS 140-2 ;). Don't confuse the concepts of being 'FIPS approved' or
'FIPS compliant' with being 'secure'. They are not the same thing, and
can sometimes conflict.
On 20/03/2015 12:01, Philip Bellino wrote:
Hello,
On Fri, Mar 20, 2015, jonetsu wrote:
>
>
> > From: "Dr. Stephen Henson"
> > Date: 03/20/15 12:48
>
> > OPENSSL_FIPS=1 openssl ciphers -v
> > openssl ciphers -v FIPS
>
> Thanks, this works great, on the workstation where I have installed at
> default development location /usr/loc
> From: "Dr. Stephen Henson"
> Date: 03/20/15 12:48
> OPENSSL_FIPS=1 openssl ciphers -v
> openssl ciphers -v FIPS
Thanks, this works great, on the workstation where I have installed at default
development location /usr/loca/ssl/, using OpenSSL 1.0.1.k.
However, we have built D
On Fri, Mar 20, 2015, jonetsu wrote:
> Hello,
>
> I have the impression that the 'ciphers -v' option to openssl, when OpenSSL
> is compiled in FIPS mode, lists more than FIPS-only. There are RC5 and RC4
> in there, for instance. Is there a specific openssl command that will list
> only the
Hello,
I have the impression that the 'ciphers -v' option to openssl, when OpenSSL
is compiled in FIPS mode, lists more than FIPS-only. There are RC5 and RC4 in
there, for instance. Is there a specific openssl command that will list only
the ones that are FIPS-allowed ?
Regards.
___
On 20/03/15 12:44, Linsell, StevenX wrote:
> On Thu, Mar 19, 2015, Steve Linsell wrote:
>>
>> I am trying to use ECDH-RSA-AES256-SHA with ssl3 with s_client and s_server
>> on
>> the master branch. (cloned at commit
>> f7683aaf36341dc65672ac2ccdbfd4a232e3626d) and then retested with a more
>> r
On Thu, Mar 19, 2015, Steve Linsell wrote:
>
> I am trying to use ECDH-RSA-AES256-SHA with ssl3 with s_client and s_server on
> the master branch. (cloned at commit
> f7683aaf36341dc65672ac2ccdbfd4a232e3626d) and then retested with a more
> recent clone: (commit da27006df06853a33b132133699a7aa9d4
Hello,
I am using the Openssl-1.0.2 with openssl-fips-2.0.9 and have a question?
If AES CBC Encryption is considered vulnerable to an attacker with the
capability to inject arbitrary traffic into the plain-text stream, then why is
it listed as an approved algorithm/option in table 4A on page 14
Title: ORCOZOL - ASSESSORIA E CONSULTORIA DE COBRANÇA LTDA
ORCOZOL - ASSESSORIA E CONSULTORIA DE COBRANÇA LTDA
Prezado(a) Cliente, ( #EMAIL# )
Conforme foi firmado o acordo estamos enviando a 2a via do Boleto vencido n° 176498236 para pagamento imediato.
Boleto 2a via Orcozol.
10 matches
Mail list logo