Yes. Ask the person that owns the key :)

Otherwise, you're going to need to figure out how to exploit whatever 
encryption was used on the key. I don't think there's any realistic way to 
get this information (and there probably shouldn't be).

         --Tom

At 08:31 AM 5/2/2000 -0400, you wrote:
>Thanks.
>
>Next question.  Is there anyway to determine what the PEM pass phrase is for
>a given key?
>
>-----Original Message-----
>From: [EMAIL PROTECTED]
>[mailto:[EMAIL PROTECTED]]On Behalf Of Michael
>Sent: Monday, May 01, 2000 9:00 PM
>To: [EMAIL PROTECTED]
>Subject: Re: Decrypting a key
>
>
> > I found the answer to this once in the list archives, but neglected
> > to write it down.  I have a key that I need to decrypt so that I can
> > run multiple keys on my server without have to type in the PEM
> > phrase.
> >
> > Can someone help me with this?
> >
>
>These are the old directions, just replace the command
>ssleay with openssl
>
>Step two - remove the passphrase from the key (optional):
>
>   ssleay rsa -in privkey.pem -out new.cert.key
>______________________________________________________________________
>OpenSSL Project                                 http://www.openssl.org
>User Support Mailing List                    [EMAIL PROTECTED]
>Automated List Manager                           [EMAIL PROTECTED]
>
>______________________________________________________________________
>OpenSSL Project                                 http://www.openssl.org
>User Support Mailing List                    [EMAIL PROTECTED]
>Automated List Manager                           [EMAIL PROTECTED]

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to