> Rene G. Eberhard
> Mail : [EMAIL PROTECTED]
--
Thomas ReinkeTel/Fax: (905) 331-2260
Director of Technology
from technical and/or experienced people!!! :-D
>
> C'you,
>
> Massimiliano Pala ([EMAIL PROTECTED])
--
--------
Thomas ReinkeTel: (905) 331-2260
Director of Technology Fax
http://www.openssl.org
> User Support Mailing List[EMAIL PROTECTED]
> Automated List Manager [EMAIL PROTECTED]
--
Thomas ReinkeTel: (905) 331-2260
D
http://www.openssl.org
> User Support Mailing List[EMAIL PROTECTED]
> Automated List Manager [EMAIL PROTECTED]
--
--------
Thomas Reinke
rt Mailing List[EMAIL PROTECTED]
> Automated List Manager [EMAIL PROTECTED]
--
--------
Thomas ReinkeTel: (905) 331-2260
Director of Technology
[EMAIL PROTECTED] wrote:
>
> So it seems to me that while the cert may certify that said organization
> is who they say they are - nobody seems to ask if who they say they are
> has any relevance to anything.
[snip]
Look back to the problem it is solving
a) SSL makes sure no-one can interc
Support Mailing List[EMAIL PROTECTED]
> >Automated List Manager [EMAIL PROTECTED]
>
> ______
> OpenSSL Project http://www.openssl.org
> User Sup
o can authenticate themselves to you.
--
--------
Thomas ReinkeTel: (905) 331-2260
Director of Technology Fax: (905) 331-2504
E-Soft Inc. http://www.e-softinc.com
_
> OpenSSL Project http://www.openssl.org
> User Support Mailing List[EMAIL PROTECTED]
> Automated List Manager [EMAIL PROTECTED]
[EMAIL PROTECTED]
> >Automated List Manager [EMAIL PROTECTED]
>
> __
> OpenSSL Project http://www.openssl.org
> User Support Mailing List[EMAIL PROTECTED]
[EMAIL PROTECTED]
> Automated List Manager [EMAIL PROTECTED]
--
--------
Thomas ReinkeTel: (905) 331-2260
Director of Technology Fax: (905) 331-2504
E-Soft Inc.
, to
> okay business transactions and the like. It seems extremely easy to copy
> and redistribute one's keys so how exactly does this
> give the server authentication?
>
> TIA,
> brian
>
>
--
Thomas Reinke
_
> OpenSSL Project http://www.openssl.org
> User Support Mailing List[EMAIL PROTECTED]
> Automated List Manager [EMAIL PROTECTED]
--
----
Thomas Rei
SSL Project http://www.openssl.org
> User Support Mailing List[EMAIL PROTECTED]
> Automated List Manager [EMAIL PROTECTED]
--
Thomas Reinke
not to trust them as a CA. It's that above step,
while easy enough to do, that is solved by getting your
cert into the Netscape and IE distributions, which appear
for all practical purposes to have been locked down at this point.
Thomas
-
GmbH email: [EMAIL PROTECTED]
> Am Werder 1
> 21073 Hamburg, Germany
--
Thomas ReinkeTel: (416) 460-7021
Director of Technology
What you're basically saying is that if someone can sniff packets, and
brute force their way into decrypting the information, is their
data safe, and is this a possible scenario.
No, their data won't be safe. Yes, this is possible. There are
plenty of studies that have shown how much computing po
I'm somewhat surprised that you get as far as you indicate - "-quiet"
is modifying the behaviour somewhat. When you run s_client without
it, it will always terminate before getting the http response.
This is because s_client is designed to terminate whenever it
gets an EOF on stdin. When you pipe
__
> OpenSSL Project http://www.openssl.org
> User Support Mailing List[EMAIL PROTECTED]
> Automated List Manager
Disable the MONOLITH macro. This will cause all apps to be built
as separate, stand alone programs.
[EMAIL PROTECTED] wrote:
>
> hi,
> I am using the ssleay0.8.1 for the first time.all the applications
> are built into the one program, ssleay, but I want to built The
> applicatons "req"(apps
http://www.openssl.org
> User Support Mailing List[EMAIL PROTECTED]
> Automated List Manager [EMAIL PROTECTED]
----
Thomas ReinkeTel:
Juergen Rensen wrote:
>
> M2c: Credit card organizations and banks have successfully generated the
> image that strong encryption protecting from fraudaulent use of credit
> cards is solely in the interest of the customer. What the customer is
Hmm...I suspect its actually in the interest of t
User Support Mailing List[EMAIL PROTECTED]
> Automated List Manager [EMAIL PROTECTED]
Thomas ReinkeTel: (416) 460-7021
Director of Technology
_
> OpenSSL Project http://www.openssl.org
> User Support Mailing List[EMAIL PROTECTED]
> Automated List Manager [EMAIL PROTECTED]
--
---
http://www.openssl.org
> User Support Mailing List[EMAIL PROTECTED]
> Automated List Manager [EMAIL PROTECTED]
--
Thomas ReinkeTel: (416) 460-7021
Director
or
> Tel: +1-514-868-7813
> Fax: +1-514-868-8357
>
> __
> OpenSSL Project http://www.openssl.org
> User Support Mailing List[EMAIL PROTECTED
yway when it ran.
>
> I also copied the include directory openssl onto VC++'s, include tree.
> And make some modifications in the #include statements in order to use
> winsock. Oh, and also changed close() to closesocket(). And that's all.
>
> Help pleez? Pretty pleez?
> ________
eamwvr.com/mandrake/mandrake-dist.html>
> "As Unique as the Company You Keep.""===0 PGP Key Available
>
>
>
> __
> OpenSSL Project http://www.openssl.org
> User Support Mailing List[EMAIL PR
ist[EMAIL PROTECTED]
> Automated List Manager [EMAIL PROTECTED]
--
----
Thomas ReinkeTel: (416) 460-7021
Director of Technology Fax: (416) 5
: +49 271 48950-50
> __
> OpenSSL Project http://www.openssl.org
> User Support Mailing List[EMAIL PROTECTED]
> Automated List Manager [EMAIL
__
> OpenSSL Project http://www.openssl.org
> User Support Mailing List[EMAIL PROTECTED]
> Automated List Manager [EMAIL PROTECTED]
--
__
> OpenSSL Project http://www.openssl.org
> User Support Mailing List[EMAIL PROTECTED]
> Automated List Manager [EMAIL PROTECTED]
--
--
Sb/PYJ8=
> __
> OpenSSL Project http://www.openssl.org
> User Support Mailing List[EMAIL PROTECTED]
> Automated List Manager [EMAIL PROTECTED]
--
--
se of ;-)
Thanks, Thomas
--
--------
Thomas ReinkeTel: (416) 460-7021
Director of Technology Fax: (416) 598-2319
E-Soft Inc. http://www.e-softinc.com
_
f 1", means that it
can't verify the CA's cert, which I can understand, since I
can't manually validate the #$%^& thing either.
Am I brain dead? What am I missing
Thomas Reinke wrote:
>
> I'm looking for, as a starter, a birds eye view of some
> docs (or high
Dr Stephen Henson wrote:
>
> Thomas Reinke wrote:
> >
> > Ok...a touch more information - the problem I think I have
> > is that the cert I want to validate has a authorityKeyIdentifier,
> > but none of the certs in the cert stores I am using have a
> > Subjec
Dr Stephen Henson wrote:
>
> Thomas Reinke wrote:
> >
> > Ok...a touch more information - the problem I think I have
> > is that the cert I want to validate has a authorityKeyIdentifier,
> > but none of the certs in the cert stores I am using have a
> > S
Thanks for the reply. For the most part, I think I understand what
you're saying, except that I have one gap in my knowledge.
If I can bother you to complete one more little gap in my
ignorance:
In chain verification, (ala Netscape), wouldn't the browser still
need to be able to get its hands on
38 matches
Mail list logo