RE: Changing the expiry date of a cert

2007-10-17 Thread Mouse
> > "Is it possible to extend the expiry of this certificate > > without changing any other fields in the certificate?" > > > > to which it seems that the answer is > > > > "Yes", > > How could the answer be anything other than yes? All too easily. Because as you ourself point out, such a change

RE: Error while encryption or Decrypting

2007-07-30 Thread Mouse
That line means "if benc still points at something, free it". The problem is - more likely than not, somebody has already freed benc, but did not set benc to zero (or NULL). As a result, this check (line 640) says "benc is not zero, so it must be pointing at something that must be freed, so invoke

RE: Certificates, users and machines

2007-05-25 Thread Mouse
> For both the responses I got, it looks like the server need > to access the information (whether identity or attribute or > whatever) present in the certificate and use that to decide > the permissions for the peer that represented this certificate. > Is my understanding correct? Partially so

RE: Certificates, users and machines

2007-05-25 Thread Mouse
> Well, the Subject Distinguished Name should have the > Organization... Can you envision long-lived certs issued by gov't - like passports? In that case, Organization would not have the same semantics. But this is less relevant for our discussion. > ...but I strongly disagree with you if you th

RE: Certificates, users and machines

2007-05-25 Thread Mouse
> > ... is it necessary to > > issue ONE certificate to EACH individual. > > Yes. The problem of granting access based on membership in a > group is an authorization problem. Correct. > This doesn't have > anything to do with certificates -- permissions and roles > change independently of

RE: RE: HTTPS security model

2006-12-07 Thread Mouse
> > There are security paradigms such as SSH where you use "leap of > > faith": strictly you haven't authenticated the remote end, but you > > "know" that your peer is the other box next to you, you > > verified its PK fingerprint visually, so you approve ("authorize") > > that peer from now on.

RE: How to check if the certificate is self signed

2006-10-25 Thread Mouse
Traditionally the term "self-signed" applied to certificates that are NOT signed by anybody but the owner of the given key pair. With all the relevant security implications. What is the purpose of checking for "self-signed cert"? To see if only the owner signed that key? Of to see that key owner A

RE: Attribute Certificate with OpenSSL?

2006-09-14 Thread Mouse
d, 30 > 28911 Leganés (Madrid/Spain) > Tel: (+34) 91-624-8817, Fax: -8749 > Web: www.it.uc3m.es/dds > web: http://www.it.uc3m.es/pervasive > Mail: dds[at].it.uc3m.es > Skype: dds.it.uc3m.es > > > -Mensaje original- > De: [EMAIL PROTECTED] > [mailto:[EMAIL P

RE: Attribute Certificate with OpenSSL?

2006-09-14 Thread Mouse
t: Re: Attribute Certificate with OpenSSL? > > On 9/14/06, Mouse <[EMAIL PROTECTED]> wrote: > > Did anybody use OpenSSL successfully for creating and processing > > Attribute Certificates? > > very much .. chek dis link.. http://openpmi.sourceforge.net/ > &

Attribute Certificate with OpenSSL?

2006-09-13 Thread Mouse
Did anybody use OpenSSL successfully for creating and processing Attribute Certificates? Is there any helpful HOWTO or TFM? __ OpenSSL Project http://www.openssl.org User Support Mailing List

RE: Including attributes in the signed certificate

2006-09-06 Thread Mouse
There is one more problem with attributes and official CA's. If you are your own CA, it makes a big difference (less trust around in the world - but you can enforce any attribute verification policy that you choose yo). Atttributes are added at the time of certification (good - so they can't be ma

RE: extending a PKCS12 certificate

2006-08-07 Thread Mouse
his helps. > > Regards, > > Dmitrij > > > > -Original Message- > > From: [EMAIL PROTECTED] > > [mailto:[EMAIL PROTECTED] On Behalf Of Mouse > > Sent: Friday, August 04, 2006 5:10 PM > > To: openssl-users@openssl.org > > Subjec

RE: extending a PKCS12 certificate

2006-08-04 Thread Mouse
It doesn't makes much sense to add attributes to certs if values of those attributes can't be verified. Attribute Certificate seems the right way to go (thanks, Vijay!). The question is - do our "mainstream" CA's (such as VeriSign, etc.) support Attribute Certificate? Tnx! > -Original Mess

RE: What does "PEM" mean?

2006-07-31 Thread Mouse
PEM = Privacy-Enhanced Mail. > -Original Message- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED] On Behalf Of Bo Xie > Sent: Monday, July 31, 2006 20:08 > To: openssl-users@openssl.org > Subject: What does "PEM" mean? > > I know openSSL supports .pem format. But what does "PEM" m

RE: Using OpenSSL over a high level peer-to-peer middleware

2005-10-21 Thread Mouse
> The security work in SNMPv3 is old and outdated and years > behind current practice. Some of that is understandable, but > but even back then we knew enough to know that raw UDP is > almost architecturally flawed. Not quite on the list topic - but if you were aware of the constraints placed

RE: Using OpenSSL over a high level peer-to-peer middleware

2005-10-19 Thread Mouse
> > openSSL 0.9.8 comes with support for DTLS, which is TLS over UDP. > > Another point for the original poster to keep in mind is that > SSL/TLS can require multiple read/writes for a single > application-level packet exchange. SA establishment cost... > This isn't always obvious to folks st