10 23:20:08 EDT 2002 i686
unknown
OS (config): i686-whatever-linux2
Target (default): linux-elf
Target: linux-elf
Compiler: gcc version 2.96 2731 (Red Hat Linux 7.2 2.96-108.7.2)
Test passed.
--
Michael T. Babcock
CTO, FibreSpeed Ltd. (Hosting, Security, Consulta
ot;) = 21
malloc(96)= 0x08145ef0
memset(0x08145ef0, '\000', 96)= 0x08145ef0
malloc(20)= 0x08145f58
malloc(16) = 0x08145f70
bs
> To whom it may concern,
Please note: since this list munges the reply-to: header, all replies
go to the list unless you manually cut and paste the sender's
address into the To: field.
__
OpenSSL Project
Some of us instead sent much longer and more descript comments to
the postmaster and other addresses at the domain in question.
> cool, direct and to to the point. i guess many of us feel this way, but
not
> able to put it into such a direct statement.
__
l, then a ./config
shared, make, make install, then I delete the .so.0* files and run ldconfig to
create them properly (on Linux).
--
Michael T. Babcock (PGP: 0xBE6C1895)
http://www.fibrespeed.net/~mbabcock/
___
nSSH at all.
I understand that there are other products, but SSH is the only one I've worked with
enough to consider secure and stable.
--
Michael T. Babcock (PGP: 0xBE6C1895)
http://www.fibrespeed.net/~mbabcock/
__
OpenSS
; are right, I can note them down as a live exploitable reflector for the
> next time I need one!
--
Michael T. Babcock (PGP: 0xBE6C1895)
http://www.fibrespeed.net/~mbabcock/
__
OpenSSL Project
> --
> Ger Hobbelt a.k.a. Insh_Allahmailto:[EMAIL PROTECTED]
>
> --
> Peter Pan can fly when he thinks his Happy Thought.
> I want to fly too.
> My Happy Thought is... one part
> OpenSSL Projecthttp://www.openssl.org
> User Support Mailing List[EMAIL PROTECTED]
> Automated List Manager [EMAIL PROT
ything about it because they can't revoke their certificates in a
meaningful way.
--
Michael T. Babcock (PGP: 0xBE6C1895)
http://www.fibrespeed.net/~mbabcock/
__
OpenSSL Project http://www
opers, not the users.
>
> Which browser would that be? Netscape has no default, and with IE the
> default is "no".
Check IE 5.5's advanced options.
Several security related defaults are shut off -- like checking the expiry
on a cert and/or checking if a cert is revoked.
--
er so that the focus
>change is detected."
> [sarcasm off]
>
> What should we expect?
--
Michael T. Babcock (PGP: 0xBE6C1895)
http://www.fibrespeed.net/~mbabcock/
__
OpenSSL Project
Jason Keltz wrote:
> Can someone explain why the server has to pass along the certificates from
> the CAs though? I don't quite understand. I'm new to this all. Isn't it
> up to the server to send out just the certificate, and then up to the
> client to do the checks? I mean, isn't it counter
inked
against a GPL program is the advertising clause. The GPL however, explicitly
states: "Activities other than copying, distribution and modification are not
covered by this License; they are outside its scope." As advertising
paraphenalia has nothing to do with the acts of distr
.
It is better to keep silent and thought a fool ...
--
Michael T. Babcock (PGP: 0xBE6C1895)
http://www.fibrespeed.net/~mbabcock/
__
OpenSSL Project http://www.openssl.org
User Support Mailing List
Are there any good online references for effectively using OpenSSL to
negotiate a key exchange, then set up a random session key?
--
Michael T. Babcock, C.T.O. FibreSpeed
http://www.fibrespeed.net/~mbabcock
__
OpenSSL Project
tomn wrote:
> So, you can run apache-ssl with this scenario:
>
> Port 443
> Listen 1.2.3.4:444
> Listen 1.2.3.4:445
> Listen 1.2.3.4:446
>
> Then, Each VH has the same IP with the corresponding port.
> Each VH has a different Certificate.
> Each VH serves up the correct certificate.
This would a
Richard Levitte - VMS Whacker wrote:
> This is why upgrading to TLS within the original protocol is a better
> idea, as stated in RFC2817, among others. After all, it wouldn't be
> that difficult to write a small routine library that deals with this
> kind of upgrade, or so I imagine...
Exactly
> What is mod_ssl anyway, the string "mod_ssl" does not exist in the
> whole of OpenSSL and only once in OpenLDAP 2.0.6 as a FIXME?
cf. http://www.modssl.org
mod_ssl is an SSL extension to Apache that uses OpenSSL.
__
OpenSSL P
Vadim Fedukovich wrote:
> On Fri, 13 Oct 2000, Norman Mackey wrote:
>
> I believe it was made clear already. The only point to add
> is a recent RFC on "Upgrade to TLS".
I've read that RFC and I tried to find information on whether IE or
Netscape were planning on supporting (or did support) it a
Vadim Fedukovich wrote:
> Beware features of IE on processing wildcarded
> certificates.
Different Michael here ... what "features" ??
__
OpenSSL Project http://www.openssl.org
User Support Maili
I'd like to place an Apache SSL server (Apache + mod_ssl + openssl)
behind a firewall machine that does port-forwarding via ipmasqadm so
that the SSL server can operate on a private IP address. This is
already done for our mail services, but as its set up now, the web
server doesn't seem to be ge
22 matches
Mail list logo