dn't suggest it if I didn't do the same for other lists already.
vh
Mads Toftum
--
`Darn it, who spiked my coffee with water?!' - lwall
__
OpenSSL Project http://www.op
On Tue, Feb 24, 2004 at 01:27:05PM +0100, Richard Levitte - VMS Whacker wrote:
>
> I think I misunderstood that question. I honestly don't know what we
> would lose. Maybe a sense of openness.
>
get someone to moderate the list - problem solved.
vh
Mads Toftum
--
`Darn
e (at least on modssl-users it is
not all messages that are duplicated and we're not getting double list
signatures like we did then).
vh
Mads Toftum
--
With a rubber duck, one's never alone.
-- "The Hit
On Wed, Feb 06, 2002 at 10:47:09PM -, Mike Scriven wrote:
> Is anyone else getting duplicate e-mails or is it just me?
>
We have a similar problem on modssl-users which is handled
by the same servers.
vh
Mads Toftum
--
With a rubber duck, one's never alone.
ewline. Something
like:
perl -e 'print "password";' |openssl dgst -sha1 -binary| openssl base64
gets you: W6ph5Mm5Pz8GgiULbPgzG37mj9g=
vh
Mads Toftum
--
With a rubber duck, one's never alone.
-- "The Hitchhiker's Guide to the Galaxy"
finetely be a plus.
Submitting to orbz wouldn't make much of a difference - we have
most of the relays spammers use with openssl-* already listed
at ordb.org. The very few that are not listed is usually because
the mta at openssl.org is br0ken and removes some of the
Recieved headers.
vh
Mads Toftum
her perl module to interface with
> openssl ?
>
There is something in http://search.cpan.org/search?dist=smime - however
it has not been updated for quite a while so YMMV.
vh
Mads Toftum
--
With a rubber duck, one's never alone.
-- "Th
ver anyway.
>
Not true. Ordb.org does not have any manual listings - everything is
based on automated testing, such that only misconfigured servers
that permit relaying (and thus are vulnerable to spammers) can be
listed. And yes! I know this for a fact.
vh
Mads Toftum
--
`Darn i
this stuff out?
>
Sure, just make the mailservers use http://ordb.org/ - that would cut
a major part of the spam that has come through openssl-users lately.
I manually check the spam i get through this list and roughly 8 out 10
are from already listed open relays.
vh
Mads Toftum
--
With a rubber
_ssl users mailing
list instead. The --with-apache directive wants the location of the apache
source - which is _most_ likely not installed on your system - instead
get it from http://httpd.apache.org. exactly like it is described in the
INSTALL document in the mod_ssl tarball.
vh
Mads Toftu
On Mon, Oct 01, 2001 at 06:26:42PM +0100, Laurent Jouannic wrote:
> Does someone have a good script to generate x509 certificates, because I
> have
> troubles whith mine:
Take a look at the cca.sh script in the mod_ssl tarball[1].
[1] see http://www.modssl-org/source/
vh
Mads Toftum
ng_ way.
The Book "SSL and TLS - Designing and Building Secure Systems" by
Eric Rescorla is definetely worth reading. Or you could take a look
at s_client and s_server in the apps dir of the openssl source. Also
take a look at Stunnel (www.stunnel.org).
vh
Mads Toftum
odssl.org/docs/2.8/ssl_reference.html#ToC2
vh
Mads Toftum
--
`Darn it, who spiked my coffee with water?!' - lwall
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMA
Check http://www.modssl.org/docs/2.7/ssl_intro.html
and http://www.modssl.org/docs/apachecon2000/slide-006-l.html
vh
Mads Toftum
--
`Darn it, who spiked my coffee with water?!' - lwall
__
OpenSSL Pr
see" ???
>
The url is correct - and the site is up.
vh
Mads Toftum
--
`Darn it, who spiked my coffee with water?!' - lwall
__
OpenSSL Project http://www.openssl.org
User Support Ma
I thought apache was LDAP aware.
A patch for LDAP support in mod_ssl was posted to the mod_ssl users
mailing list: http://marc.theaimsgroup.com/?l=apache-modssl&m=95798113604790&w=2
vh
Mads Toftum
--
`Darn it, who spik
lar)
environment, where you can say one of three things:
valid or suspended/status unknown or revoked.
vh
Mads Toftum
--
`Darn it, who spiked my coffee with water?!' - lwall
__
OpenSSL Project
ing & configuring OpenSSL+mod_ssl on
> Apache.
>
http://www.modssl.org/example/ is about as QD as it gets.
vh
Mads Toftum
--
`Darn it, who spiked my coffee with water?!' - lwall
__
OpenSSL Project
Uhm - only one idea here: What you see is just as it is supposed to be.
... 'resuming normal operation' should be a dead giveaway ;-)
So, all you see is the message from Apache being shut down in the first
line, and from Apache being started again on the second line. No errors.
vh
at the random number generator has not been seeded
> with much random data.
> Consider setting the RANDFILE environment variable to point at a file that
> 'random' data can be kept in (the file will be overwritten).
This is in the FAQ: http://www.openssl.org/support/faq.html#
ginal EAY license mentions nothing about being able to
terminate the license, then there is no way that they can change it.
No matter who bought who, the RSA claim is just FUD.
vh
Mads Toftum
--
`Darn it, who spiked my coffee with
one else
that stores the original signature along with the timestamp. It would
probably make sense for the time stamping authority to check the validity
of the signers cert via OCSP or something similar.
vh
Mads Toftum
--
`Darn it, who spike
o all the
> SSL webservers. Is it possible to get a *.speedera.com certificate so we can
> avoid this?
Thawte have been selling that kind of certs - and still did the last time I
looked. Check their website at www.thawte.com.
vh
Mads Toftum
--
`Darn it, who spiked my coffee with w
l.com/gadgets/ssl - except for a few typos in the
code, it is rather simple to go through.
vh
Mads Toftum
--
`Darn it, who spiked my coffee with water?!' - lwall
__
OpenSSL Project http://www.o
Lv2. There might be some other suggestions in the mod_ssl list
archive.
vh
Mads Toftum
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automa
On Wed, Apr 12, 2000 at 02:30:42PM -0500, Henrik Johnsen wrote:
[SNIP]
> 29211:error:24064064:random number generator:SSLEAY_RAND_BYTES:prng not
>seeded:md_rand.c:470:
See http://www.modssl.org/docs/2.6/ssl_faq.html#ToC15 and
http://www.openssl.org/support/faq.html#6
vh
Mads
, how do I get the perl client to send
> a client certificate?
Check the docs and examples in Net::SSLeay.
vh
Mads Toftum, QDPH
---
Conway's Law:
In any organization there will always be one person who knows
what is going on.
ackage, then AFAIK
the answer is no. It never really did work.
However there is an alternative: Net::SSLeay (get it from CPAN or
http://www.neuronio.pt/SSLeay.pm.html). It works quite well with
OpenSLL.
vh
Mads Toftum, QDPH
---
Zaphod felt he was teetering on the edge of madness and wondered
whe
28 matches
Mail list logo