RE: A little help would be appreicated

2006-03-08 Thread David C. Partridge
Its not the server cert you need in the trusted certs store - it's the CA root cert. And you'll need any intermediate CA certs in the regular CA store D. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Stuart Halliday Ok, so I put into the Trusted Root

RE: trouble launching an automated script to create a self-signed certificate

2006-03-02 Thread David C. Partridge
This may seem a stupid question, but why do you want or need to do this? You can generate an SS cert with a validity of (say 1 year) and just use it without needing to generate a new one every time the system starts up. Is there something special about the environment that I'm not aware of? D.

RE: Engine issue with LUNA CA3 HSM

2006-01-20 Thread David C. Partridge
Why would you want the private key to leave the token in clear anyway? If you need to performs RSA private keyops, then ask the device to sign/decrypt for you. The CA3 FWIW will not even let you wrap a private key off under another key as this HSM is intended for use as a CA's HSM. If you need t

RE: problem in client authentication -no luck

2006-01-10 Thread David C. Partridge
You don't want to specify the CA's private key as the argument for -CAfile, you need to specify the CA certificate for that. Also an indication of the errors you get would help ... D. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Samy Thiyagarajan Sent

RE: ECB, CBC, CFB, OFB, and when and where you would use them.

2005-10-18 Thread David C. Partridge
Why not encrypt the file using PKCS#7 enveloped or signed and enveloped data. 3DES-CBC or AES for date encryption, key encryption using intended recipient public key, authentication using RSA singer public key? If you need non-expanding data encryption using symmetric cipher, look at EAS in CTR m

RE: Decrypting RSA Private Key

2005-06-22 Thread David C. Partridge
Strictly speaking 1.2.840.113549.1.5.13 is the OID for the "PBES2 encryption scheme" from PKCS#5 V2. Dave __ OpenSSL Project http://www.openssl.org User Support Mailing Listope

RE: nseq vs Thawte freemail certificates

2005-06-16 Thread David C. Partridge
I've not been there, but is it possible that this is a PKCS#12 bag? Dave __ OpenSSL Project http://www.openssl.org User Support Mailing Listopenssl-users@openssl.org Automated

RE: Need objective arguments against double certificate

2005-06-14 Thread David C. Partridge
>If you want to separate the signature key from the encryption key, you should have 2 keys, and not one key with 2 certificates. Totally agreed - the reason for using key separation is that encryption keys will (typically) have a shorter life time than signing keys (at least for certificate valid

RE: Question regarding certificate requests !

2005-06-09 Thread David C. Partridge
Howsabout using openssl req ? That does what U want I think you will find. Dave __ OpenSSL Project http://www.openssl.org User Support Mailing Listopenssl-users@openssl.org Au

RE: Re:

2005-05-04 Thread David C. Partridge
Probably a good thing - all these zip files have been virus infested and I don't think they are related to this mailing list at all in fact. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Rajeev Aggarwal Sent: 04 May 2005 11:47 To: openssl-users@openssl.

RE: CPU horsepower needed to run openssl

2005-04-29 Thread David C. Partridge
3.2 million certs! That's going to be "fun" when you get to certificate rollover time!!! What CA you using (I guess not openssl ca for that volume). Dave -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of ray v Sent: 29 April 2005 05:00 To: openssl-users@

RE: SSLVerifyClient

2005-04-28 Thread David C. Partridge
Also I'm surprised to see V3 cert with no KeyUsage section ... It would also would be more normal to use Extended Key Usage to say it is good for SSL Server etc. rather than use the old NetScape Cert Type ... Dave -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Beh

RE: SSLVerifyClient

2005-04-28 Thread David C. Partridge
X509v3 extensions: X509v3 Basic Constraints: CA:FALSE Netscape Cert Type: SSL Client, S/MIME Netscape Comment: OpenSSL Generated Certificate is why it is failing. The server certificate needs: X509v3 extensions:

RE: RFC3852 CMS specification

2005-04-27 Thread David C. Partridge
2 CMS specification On Tue, Apr 26, 2005, David C. Partridge wrote: > Is there any expectation that openssl will be enhanced in the near future to > support the current CMS specification which I think is RFC3852? If > possible retaining support for the old PKCS#7 "Signed and Enveloped

RFC3852 CMS specification

2005-04-26 Thread David C. Partridge
Is there any expectation that openssl will be enhanced in the near future to support the current CMS specification which I think is RFC3852? If possible retaining support for the old PKCS#7 "Signed and Enveloped" message format? TIA Dave

RE: X509 certificate with S/MIME

2005-02-02 Thread David C. Partridge
Current recommendation is to put in the subjectAltName extension.   Dave

RE: How to add X509v3 Subject Alternative Name into the cert with openssl?

2004-12-17 Thread David C. Partridge
You can do this in the config file - I'll leave others to tell you how as I'm a bit rusty on that stuff. The reason I'm replying is that it is definitely not good form to mark AlternateName extension as critical. Of course it is valid to do that, but why should a relying application be FORCED to

RE: problem about using certificate

2004-11-26 Thread David C. Partridge
Sounds like the client doesn't have a key set and certificate, or the certificate for the CA that issued the client's cert isn't installed at your web server. __ OpenSSL Project http://www.openssl.

RE: serializing certificates

2004-11-24 Thread David C. Partridge
Sounds to me like you're using openssl req rather than openssl ca Dave -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of Michael Weiner Sent: 24 November 2004 14:12 To: [EMAIL PROTECTED] Subject: serializing certificates Is there a way to "force" a serial nu

Creating html from pod files on Windows

2004-09-24 Thread David C. Partridge
I'm trying to build the html files for the docs from the pod files using pod2html The html files are getting built, but the links don't work between them and I get lots of messages like: C:\Perl\bin/pod2html.bat: C:\openssl-0.9.7d\doc\ssl\SSL_CTX_set_ssl_version.pod: cannot resolve L in paragrap

RE: PKI - CA Cross-Cerificate with OpenSSL?

2004-09-24 Thread David C. Partridge
Richard Levitte said: >Note that, as long as you only have applications that really know how >to handle multiple verification paths, then you can throw all kinds of >certificates at them without worrying. Unfortunately, that's not a >reality yet. Richard, is there any useful guidance you can po

RE: signedandenveoped + encryption from commandline

2004-09-23 Thread David C. Partridge
Not at all, there's no man in the middle issue at all because the certificates which are issued by a trusted TP g'tee the ownership of the public key. The logic goes like this: You generate a random DES key known only to you. Let's call this KDE You use this to encrypt the data. Lets call this

RE: signedandenveoped + encryption from commandline

2004-09-23 Thread David C. Partridge
The "one shot" symmetric key is purely random. No it's not a function of anyone's private or public key. Once generated, it is encrypted using the public key of the recipient and included with the message. If multiple recipients, the same key is used to encrypt the data, and for each recipient i

RE: signedandenveoped + encryption from commandline

2004-09-23 Thread David C. Partridge
Not correct. You sign the message with YOUR private key. The signature is verified by the recipient using your certificate which is issued by a CA. If you are also enveloping, then the data is encrypted under a "one-shot" symmetric key, and this symmteric key is then encrypted using the public

RE: Problem signing certificate OpenSSL 0.9.7d

2004-09-20 Thread David C. Partridge
Anyone have any thoughts or an explanation for this??? Dave -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of David C. Partridge Sent: 17 September 2004 15:15 To: Openssl-Users Subject: Problem signing certificate OpenSSL 0.9.7d C:\temp>openssl vers

Problem renaming serial file OpenSSL 0.9.7d

2004-09-17 Thread David C. Partridge
06 GMT (750 days) Sign the certificate? [y/n]:y 1 out of 1 certificate requests certified, commit? [y/n]y Write out database with 1 new entries unable to rename c:/openssl-0.9.7d/apps/demoCA/serial to c:/openssl-.9.7d/apps/demoCA/serial.old reason: File exists Thanks David C. Partridge Te

Problem signing certificate OpenSSL 0.9.7d

2004-09-17 Thread David C. Partridge
3:47:04 2004 GMT Not After : Bad time valueCertificate is to be certified until Bad time value (36525 days) Sign the certificate? [y/n]:n CERTIFICATE WILL NOT BE CERTIFIED Regards, David C. Partridge Technical Products Director Primeur Security Services Tel: +44 (0)1926 511058 Mobile: +4