Fwd: Utility of self-signed certs - Re: Questions about legacy apps/req.c code

2021-12-22 Thread David von Oheimb
Yeah, self-signed certs are absolutely useful - you just need to be very careful which ones you trust for what. Such certs are widely used to provide trust anchor information, typically of root CAs, but conceptually and pragmatically, as Jordan also stated below, they can make much sense even

Fwd: Utility of self-signed certs - Re: Questions about legacy apps/req.c code

2021-12-22 Thread David von Oheimb
Yeah, self-signed certs are absolutely useful - you just need to be very careful which ones you trust for what. Such certs are widely used to provide trust anchor information, typically of root CAs, but conceptually and pragmatically, as Jordan also stated below, they can make much sense even

Re: SANs for self signed certs

2013-04-25 Thread Derek Cole
Just to update - I found the section in one of the apps that copies the extensions from the request. I was able to enable the EXT_COPY_ADD and was able to get my SANS in the cert as well as the request. On Wed, Apr 24, 2013 at 6:44 PM, Derek Cole wrote: > Hello, > > I have some code which I am

SANs for self signed certs

2013-04-24 Thread Derek Cole
Hello, I have some code which I am using to generate a CSR and some code which I am using to generate a cert using my cert authority. If I view the CSR, I can see that my alt names were added correctly. If I view the cert itself, the altnames are not there. I had kind of thought that if I had a C

RE: accepting self signed certs

2006-02-02 Thread Konark
6:02 PM To: openssl-users@openssl.org Subject: accepting self signed certs   hi.. My test server has a list of trusted CAs. Now i also want to accept connections requested by clients with self signed certificates. Any simple way to accept the self signed certs ? Thanks in advance. Samy

accepting self signed certs

2006-02-02 Thread Samy Thiyagarajan
hi.. My test server has a list of trusted CAs. Now i also want to accept connections requested by clients with self signed certificates. Any simple way to accept the self signed certs ? Thanks in advance. Samy

Re: self signed certs

2005-11-23 Thread Katie Lucas
On Tue, Nov 22, 2005 at 01:39:29PM -, Mark wrote: > Hi, > > > It is still better to have a CA that signs certificates, > > there are some > > technical reasons in openssl, > > it is simpler to program the trust checking, in fact with self signed > > ce

RE: self signed certs

2005-11-22 Thread Mark
Hi, > It is still better to have a CA that signs certificates, > there are some > technical reasons in openssl, > it is simpler to program the trust checking, in fact with self signed > certs you need callbacks > to accept them, while with a "trusted" CA, you don&#x

Re: Problem with some self-signed certs

2004-08-27 Thread Dr. Stephen Henson
On Fri, Aug 27, 2004, Jim Adams wrote: > I thought that at first, but I made similar certs with critical Key > Usage parameters > using openssl and openssl liked them. > If you certificate signing is absent from key usage (critical or not) then the certificate wont be acceptable as an untrust

RE: Problem with some self-signed certs

2004-08-27 Thread Jim Adams
] Subject: Re: Problem with some self-signed certs Hello Jim, Jim Adams wrote: > I am experiencing a problem with self-signed server certificates > generated by z/OS's pskkyman program in my openssl-enabled telnet > client. Usually, a self- signed certificate will generate an err

Re: Problem with some self-signed certs

2004-08-27 Thread Goetz Babin-Ebell
Hello Jim, Jim Adams wrote: I am experiencing a problem with self-signed server certificates generated by z/OS's pskkyman program in my openssl-enabled telnet client. Usually, a self- signed certificate will generate an error of "self-signed certificate" in my certificate verify callback routine.

Problem with some self-signed certs

2004-08-27 Thread Jim Adams
Hello, I am experiencing a problem with self-signed server certificates generated by z/OS's pskkyman program in my openssl-enabled telnet client. Usually, a self- signed certificate will generate an error of "self-signed certificate" in my certificate verify callback routine. If I add the certi

Re: Newbie question, extending life of self-signed certs beyond 30 days.

2002-07-12 Thread Pascal Chauffour
-users@Subject: Newbie question, extending life of self-signed certs beyond 30 days. opens

Newbie question, extending life of self-signed certs beyond 30 days.

2002-07-11 Thread Zac Taylor
Hi, I have a RH 7.2 system running Apache 2.0.39 and openssl-0.9.6b-8. I used the openssl utilities to create a private key and a self-signed certificate. I noticed that my browser showed the certiciate having a validity of only a month, so I went to the /usr/share/ssl/openssl.cnf file and changed

Re: Self-signed certs

2002-03-15 Thread Aditya Roy
Yeah, IE will complain. And how would people know you are who you say you are.   thanks !   Aditya Roy - Original Message - From: Darren Smith To: [EMAIL PROTECTED] Sent: Friday, March 15, 2002 06:44 PM Subject: Self-signed certs Hello All,   Are there any

Self-signed certs

2002-03-15 Thread Darren Smith
Hello All,   Are there any inherent dangers in using self-signed certificates over those available from Thawte, VeriSign, etc?   Thanks.

Re: PRNGd, OpenSSL, self-signed certs: Not enough randomness.

2002-03-14 Thread Lutz Jaenicke
On Thu, Mar 14, 2002 at 09:53:22AM -0800, Randy Bias wrote: > The situation: > > - Running openssl-0.9.6b, apache-1.3.22+ssl, prngd-0.9.23. > - Attempting to created self-signed cert for Apache-SSL > server. > - prngd is running: > > root 569 1 0 Mar 12 ?

PRNGd, OpenSSL, self-signed certs: Not enough randomness.

2002-03-14 Thread Randy Bias
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Gentlepeoples, I'm sure this question has been asked many times, but unfortunately, I can't seem to find any very good information on the subject. I've looked at openssl sites/FAQs, apache-ssl, and others, but it's just plain missing. So

Re: Generating &installing self signed certs in NS 6.x

2002-02-19 Thread Augusto Marcacini
On 18 Feb 2002 at 9:48, Göran Fröjdh wrote: > Hello. > I'm running a small Intranet with various clients (Win32, Linux, Mac OSX). > Now, I want to provide access via client certificates which I sign with my > own CA. > > Everything works just fine when generating pkcs12 certifcates which are > i

Generating &installing self signed certs in NS 6.x

2002-02-18 Thread Göran Fröjdh
Hello. I'm running a small Intranet with various clients (Win32, Linux, Mac OSX). Now, I want to provide access via client certificates which I sign with my own CA. Everything works just fine when generating pkcs12 certifcates which are imported automatically in IE 5.x/6.x on Win 32. However, I c

RE: Importing self-signed certs into Outlook

2001-11-14 Thread Ryan Hurst
Additionally since it is a self signed certificate place it in both the "My" store and the "Root" store. Ryan -Original Message- From: Ryan Hurst [mailto:[EMAIL PROTECTED]] Sent: Wednesday, November 14, 2001 4:33 PM To: '[EMAIL PROTECTED]' Subject: RE: Im

RE: Importing self-signed certs into Outlook

2001-11-14 Thread Ryan Hurst
using the MMC Certificate Management tool to import the certificate instead. Ryan -Original Message- From: Tony Lill [mailto:[EMAIL PROTECTED]] Sent: Wednesday, November 14, 2001 2:27 PM To: [EMAIL PROTECTED] Subject: Importing self-signed certs into Outlook I've managed to get

Re: Importing self-signed certs into Outlook

2001-11-14 Thread Michael Sierchio
Dr S N Henson wrote: > Oops, didn't read the query enough. It may well not be possible to > actually use a self signed user certificate. Netscape also has problems > with this in that the same certificate has to be a user and CA > certificate. You may have to create a self signed root CA and sign

Re: Importing self-signed certs into Outlook

2001-11-14 Thread Dr S N Henson
Dr S N Henson wrote: > > Tony Lill wrote: > > > > I've managed to get outlook to work with stunnel and a self signed > > certificate for both sending and recieving mail. The only problem is > > that outlook keeps whining about not being able to verify the cert > > because the root certificate is

Re: Importing self-signed certs into Outlook

2001-11-14 Thread Dr S N Henson
Tony Lill wrote: > > I've managed to get outlook to work with stunnel and a self signed > certificate for both sending and recieving mail. The only problem is > that outlook keeps whining about not being able to verify the cert > because the root certificate is not trusted. > > I tried importing

Importing self-signed certs into Outlook

2001-11-14 Thread Tony Lill
I've managed to get outlook to work with stunnel and a self signed certificate for both sending and recieving mail. The only problem is that outlook keeps whining about not being able to verify the cert because the root certificate is not trusted. I tried importing it with the Certificate Manager

IE complains about self-signed certs

2000-12-06 Thread Link -
i wonder if it's possible to tell Internet Explorer to trust self-signed certs(aka test certs).. Netscape Navigator/Communicator 3 or above lets me to do this (trust cert for session/until cert expires) but IE seems complain everytime (issuer of cert unknown - cant establish secure conne

dsa self-signed certs serial number

2000-03-20 Thread Richard Dykiel
Hello, I create dsa self-signed certs with the following sequence:  openssl dsaparam -rand rand.txt -out keys\dsa2.par 1024 openssl req -config CAconf.conf -x509 -newkey dsa:keys\dsa2.par -keyout keys\dsa2.prk -out certs\dsass2.pem -days 730 -extensions v3_ca -passin pass:MyTailorIsRich

OAS 4.0.8 self signed certs with openssl 0.9.4

1999-10-20 Thread William Salusky
Sorry if this is a little off topic...   I'm hoping someone has had the experience of using self signed certs for use with the Oracle Application Server(uses Spyglass webserver).  Need to do this for testing SSL enablement of OAS, before moving to production.  After signing (with op

Re: Self Signed certs

1999-07-22 Thread Sean O'Connor
I believe that the following command should do what you need. It's not described in detail in the openssl docs (that I could see), but if you RTFM the docs for related packages, it soon becomes apparent. openssl req -new -x509 -nodes -out .pem -keyout .pem \ -days 999 Anybody else know of a bett