Thanks saw that Ruby one also was not sure of it either and it was in Ruby
but will look at that much deeper. And I also saw the EJBCA and all the
orphans
I had to take in to have it work was too much for me. Geez its just a
responder come on.
--
View this message in context:
http://openssl.
Hi,
when I was looking for an OCSP responder in January I also found
OpenCA.org and I also think it is dead.
If you want to use it, read the mailing list. Someone posted important
patches (against memory leaks and other things).
Another thing is, that I am not sure if an OCSP responder, which on
On 11/30/2012 10:32 PM, Dave Thompson wrote:
...
Hint: OCSP transport is NOT SSL/TLS. It is HTTP-based.
In principle it can be HTTPS, but normally needn't
because it is signed and cert data is public anyway,
and OpenSSL commandline responder only does HTTP
(and a very minimal HTTP at that).
s_c
> From: owner-openssl-us...@openssl.org On Behalf Of Rainer Rill
> Sent: Sunday, 25 November, 2012 08:04 [in zone -5]
I don't know what happened to this post. Headers (as resent)
show originator stamp Nov 25 14:04 +1 and initial transmission
.superkabel.de to .hosteurope.de to master.openssl.org
Hi Tim,
it's quite a while that you've posted this message, but I just ran into
the same problem.
There is a different behavior between openssl versions like 0.9.8n and
1.0.0c listen on the hosts IP addresses. This is exactly what you have
evaluated with your commands.
#> openssl ocsp -por
p going if an error,
like a bad request, occurs.
Regards,
Simon McMahon
"Sowjanya Malika" <[EMAIL PROTECTED]>
12/13/2006 10:40 PM
To
Simon McMahon/Australia/Contr/[EMAIL PROTECTED]
cc
Subject
Re: ocsp responder certificate generation documentation( reg)
Hi,
hope Ia
howto make the OCSP certificate.
This is the section I added to my openssl.cnf file.
[ ocsp_cert ]
# These extensions are added when 'ca' signs a request for an OCSP
responder.
basicConstraints=CA:FALSE
extendedKeyUsage= OCSP Signing
noCheck = yes
...
Then as my other post said:
add "-e
In message <[EMAIL PROTECTED]> on Tue, 16 Apr 2002 00:58:16 +0200,
Averroes <[EMAIL PROTECTED]> said:
averroes> My question is, the OCSP Responder act as a deaom since it listen on
averroes> port and wait for requests. Does openssl OCSP Responder mature
averroes> to support attack throughou