The user is supposed to create his key pair on his machine and send out the
certificate request. If you are doing everything, then you have the
opportuty to compromise his private key. Technically, this is not a
corrrect way to do certification.
Cheers
lin geng
-Original Message-
From
Is there a way to have the user email me information applicable
to the project, and I go through a series of windows that creates
the certificate for them, and make the importation of the certificate
as painless as possible.
Yes, you can save pain for them, but it
Hello:
Not sure if this is the right place to post this question, but
maybe someone can direct me.
I am a Certificate Authority for an office project. We use Netscape
Certificate Server software (part of Suitespot). Currently, when a
user requests a certificate, they have to go through sever
mory based session cache)
can grab the latest mod_ssl snapshot and try out the new "SSLSessionCache
shm:/path/to/file/(bytes)" feature. For this grab:
ftp://ftp.modssl.org/snapshot/mod_ssl-SNAP-19990604.tar.gz
For those who still don't know the background: The shared memory based sessi
I believe you need mod_ssl 2.3.1 with openssl 0.9.3
Brian Dale wrote:
> Hello mod_ssl'ers!
>
> I'm trying to compile Apache 1.3.6 with OpenSSL 0.9.3 for mod_ssl 2.2.8
> support on a RedHat Linux 5.2 out-of-box install. It looks like the
> out-of-box Apache was a binary-only install (I can find
On Fri, Jun 04, 1999, Brian Dale wrote:
> I'm trying to compile Apache 1.3.6 with OpenSSL 0.9.3 for mod_ssl 2.2.8
> support on a RedHat Linux 5.2 out-of-box install. It looks like the
> out-of-box Apache was a binary-only install (I can find no source from
> prevous install on the box) to RedHat
On Fri, Jun 04, 1999, [EMAIL PROTECTED] wrote:
> Full_Name: Matthew J. Ryan
> Version: 2.3.1-1.3.6
> OS: Solaris 2.6
> Submission from: false.exodus.net (216.32.248.134)
>
> It appears there is a but in pkg.eapi/eapi.patch, starting at about
> line 96:
> +if [ "x$EAPI_MM" = "xSYSTEM" ];