Yes. Ask the person that owns the key :)
Otherwise, you're going to need to figure out how to exploit whatever
encryption was used on the key. I don't think there's any realistic way to
get this information (and there probably shouldn't be).
--Tom
At 08:31 AM 5/2/2000 -0400, you wrote:
>Thanks.
>
>Next question. Is there anyway to determine what the PEM pass phrase is for
>a given key?
>
>-----Original Message-----
>From: [EMAIL PROTECTED]
>[mailto:[EMAIL PROTECTED]]On Behalf Of Michael
>Sent: Monday, May 01, 2000 9:00 PM
>To: [EMAIL PROTECTED]
>Subject: Re: Decrypting a key
>
>
> > I found the answer to this once in the list archives, but neglected
> > to write it down. I have a key that I need to decrypt so that I can
> > run multiple keys on my server without have to type in the PEM
> > phrase.
> >
> > Can someone help me with this?
> >
>
>These are the old directions, just replace the command
>ssleay with openssl
>
>Step two - remove the passphrase from the key (optional):
>
> ssleay rsa -in privkey.pem -out new.cert.key
>______________________________________________________________________
>OpenSSL Project http://www.openssl.org
>User Support Mailing List [EMAIL PROTECTED]
>Automated List Manager [EMAIL PROTECTED]
>
>______________________________________________________________________
>OpenSSL Project http://www.openssl.org
>User Support Mailing List [EMAIL PROTECTED]
>Automated List Manager [EMAIL PROTECTED]
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]