Re: ssl connection from Eudora or Outlook

2001-12-03 Thread Lutz Jaenicke

On Sat, Dec 01, 2001 at 12:05:43AM -0800, Edgar Hodge wrote:
 I have a ssl connection problem and would like to know if anyone out there 
 can assist with resolving the problem.
 
 I am using stunnel/ssl to connect on port 995 (Unix Solaris 8.0) from a 
 Windows machine running Eudora 5.1.
 
 Upon trying to connect from the Eudora client to check my mail, I get the 
 following error:
 
 Logging into POP Server,
 SSL Negotiation Failed: You have configured this personality/protocol to 
 reject any exchange key lengths below 0. , But the negotiated exchange key 
 length is -1.  Hence this established secure channel is 
 unacceptable.  Connection will be dropped.  Cause: (-6992)
 
 If I use the openssl client to connect with the following command from the 
 Unix Prompt:
 
 #openssl s_client -connect localhost:995
 
 I get the following error message: CONNECTED(0003)
 write:errno=131

My HP-UX box does not offer errno=131...

Anyway: your problem seems to be at the server side. Please check out
the logs of stunnel...

Best regards,
Lutz
-- 
Lutz Jaenicke [EMAIL PROTECTED]
BTU Cottbus   http://www.aet.TU-Cottbus.DE/personen/jaenicke/
Lehrstuhl Allgemeine Elektrotechnik  Tel. +49 355 69-4129
Universitaetsplatz 3-4, D-03044 Cottbus  Fax. +49 355 69-4153
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



[no subject]

2001-12-03 Thread charaf . echchatbi

Hello everybody,

  I use now openssl library for implement a protocol over ssl. for test it I
want to create a certificate Authority CA(root), an other CA called(CA Member)
signed by Root certificate and a certificate for a user(Allan) as client.

  My protocol use a connection ssl between a client and a server. The server
require a client's certificate and vice-versa. the trusted party is the CA
Member.
  
 My problem is :

 Do necessary to be a root for creating a root CA? if yes how to do so?

 How do create a member CA signed by root certificate?

 Thank you for your help.

 CHaraf from Lausanna.
 Switzerland.
   

-
This mail sent through IMP: imapwww.epfl.ch
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



21ÊÀ¼ÍµÄÌØ´óÉÌ»ú

2001-12-03 Thread zhenye

 
Èç¹ûÕâ·âÐÅÓ°Ïìµ½ÄúµÄ¹¤×÷£¬»òÕ¼ÓÃÁËÄúµÄʱ¼ä£¬¾ÍÇëÄúÁ¢¼´É¾³ý¡£Èç¹ûÄúÄܳé³öÒ»µãʱ¼äÀ´Á˽â21ÊÀ¼ÍµÄÌØ´óÉÌ»ú£¬¿ÉʹÄúºÍÄúµÄÆóÒµ´ïµ½³É¹¦µÄ¶¥·å£¬Ò»ÇÐÉúÃüµÄ½¡¿µ¿É³ÖÐø·¢Õ¹¶¼²»ÄÜÀ뿪µÄÊÂÒµ¡£Î人ÕñÒµ£¨EVERPURE£©ÒûË®É豸¿ª·¢ÓÐÏÞ¹«Ë¾ÏòÈ«¹ú¸÷µØ³ÏÕдúÀí¡¢¾­ÏúÉÌ¡£¸÷µØÇøÏÞ±¨Ò»Ãû£¬ÁãͶÈ룬Áã·çÏÕ£¬ÎÞÏ޻ر¨£¡

ÎÒÃÇÓÀÔ¶³Ðŵ£¬Èç¹ûÄãÄÜÔÚµØÇòÉÏÕÒµ½¾»Ë®ÄÜÁ¦³¬¹ýÕñÒµ¹«Ë¾EVERPUREÉúÒû»úµÄͬÀà²úÆ·£¬ÕñÒµ¹«Ë¾½«¸øÄã100ÍòÔªÈËÃñ±Ò£¡

Ò»¡¢ÉêÇë´úÀíÌõ¼þ£º
¡ñÉêÇëÈË»òÆóÒµ·¨ÈË´ú±í±ØÐë¾ß±¸Á¼ºÃµÄ×ÛºÏËØÖÊ¡£
¡ñ×Ô¾õ¡¢×ÔÔ¸½ÓÊÜË®ÎÄ»¯½ÌÓý£¬Ìá¸ßˮ֪ʶ¡£
¡ñÔÚËù´úÀíµØÇøÓй̶¨µÄ¾ÓסµØ¡¢¹Ì¶¨µç»°¡£

¶þ¡¢ÕñÒµEVERPUREÈ«ÇòÖªÃûÓû§£º
¡ñÈ«Çò²¨Òô747¡¢DC¿Í»úµÈ100¼ÒÒÔÉϺ½¿Õ¹«Ë¾¼°Êýǧ¼ÜÃñº½»úÉ϶¼ÓÐÕâÖÖÉ豸£» 
¡ñÈ«ÇòÂóµ±ÀÍ¡¢¿ÏµÂ»ù¡¢¿É¿Ú¿ÉÀÖ¡¢°ÙÊ¿ÉÀÖÕâЩÖøÃûµÄ²ÍÒûÒµºÍÒûÁÏÐÐÒµ£» 
¡ñ»¹ÓÐÈ«ÊÀ½çÖªÃû´óÆóÒµÈçÃÀ¹ú¶Å°î¹«Ë¾¡¢µÏ˹ÄáÀÖÔ°¡¢»¨»¨¹«×Ó¾ãÀÖ²¿µÈ£» 
¡ñÈ«Çò±ãÀûÉ̵ꡢʳƷ¹¤ÒµîÒÇæ¼°90%ÒÔÉÏ×Ô¶¯··Âô»úÒµÒ²¶¼ÊÇEVERPUREÖÒʵµÄÓû§£» 
¡ñÃÀ¹ú½¡¢º£¡¢¿ÕÈý¾üºÍÃÀ¹úº£ÉÏ·þÒÛµÄÿËÒ½¢Í§ÉÏ£¬ÉõÖÁÔÚÃÀ¹ú×ÜͳµÄ×ù»ú¿Õ¾üÒ»ºÅÉ϶¼Å䱸ÁËEVERPUREÉúÒû»ú¡£
 
¡ñÎÞÊýÁìµ¼ÐÔ¹¤ÉÌÆóÒµÒÔ¼°Å·ÃÀÈÕǧÍò¸ö¼ÒÍ¥Óû§Ò²¶¼¹ã·ºÊ¹ÓÃEVERPUREÉúÒû»ú¡£

Èý¡¢²úÆ·ÌØÉ«£º
Òý½øÃÀ¹úEVERPURE¹«Ë¾¸ß¼¼ÊõÖÕ¶ËË®´¦Àí¼¼Êõ£¬ÈÙ»ñÃÀ¹ú¹ú¼Ò×î¸ßÎÀÉú±ê×¼ºÍ×î¸ßÒûË®±ê×¼¡£ 
EVERPUREÉúÒû»úͬʱҲ±»ÃÀ¹ú¹ú¼ÒÎÀÉú»ù½ð»áÆÀ¶¨µÚÒ»¼¶³¬¾«ÃÜÉúÒûÓÃË®É豸¡£

ÕñÒµ¹«Ë¾ÒѾ­Ôì¾ÍÁËÊ®¼¸Î»°ÙÍò¸»ÎÌ£¬ÏÂÒ»¸ö¾ÍµÈÄãÁË¡£
  
   ´ËÖÂ
¾´Àñ

   ÕñÒµEVERPUREµç×ÓÉÌÎñ²¿
   ÍøÕ¾£º http://www.china-everpure.com
   µç×ÓÐÅÏ䣺 [EMAIL PROTECTED]
   µç»°£º027-86796627
   ´«Õ棺027-86775406

ͬʱ£¬ÕñÒµ.µç×ÓÉÌÎñ²¿Ê×ÅúÌرðÍƳö£º

1¡¢¸÷ÐÐÒµÓʼþµØÖ·ÁÐ±í£¨6000ÍòµÄÓʼþµØÖ·Êý¾Ý¿â£©£«¸ßËÙÓʼþȺ·¢Èí¼þÌײͣ¬²¢Äܸù¾ÝÄúµÄÐèÒªÌṩ¸÷ÖÖ²»Í¬µÄÓʼþµØÖ·ÁÐ±í¡£
2¡¢ÎªÄúÌṩ¿í´ø£¨10M£©ÉÌÎñÐÅÏ¢´úÀí·¢²¼·þÎñ£¬¿ÉÒÔ°´ÄúµÄÐèÒª½«Ö¸¶¨µÄÄÚÈÝ·¢²¼µ½¸÷ÆóÒµ¡¢¸öÈËÓÊÏä¡£
3¡¢Ìṩһ´Î¹ºÂò£¬ÖÕÉúÉý¼¶£¬²»¶ÏΪÄú¹ºÂòµÄÓʼþµØÖ·ÌṩÉý¼¶¡¢¸üС£

   ÎÒÃÇÓµÓÐ6000ÍòµÄÓʼþµØÖ·Êý¾Ý¿â£¬ÎÒÃǽ«ÎªÄúÌṩ×îÓÅÖʵķþÎñ£¡
ÐÐÒµ·ÖÀ฽±í£º
Ò»¡¢¹ú¼Ò»ú¹Ø£¨332Íò£©
1¡¢ÈË´óίԱ»á  2¡¢ÈËÃñÕþ¸®  3¡¢·¨Ôº   4¡¢¼ì²ìÔº  5¡¢Ïû·À  6¡¢¹«°²  7¡¢¹¤ÉÌ
8¡¢Ë°Îñ  9¡¢¹úÍÁ¾Ö  10¡¢³Ç½¨  11¡¢¹æ»®¾Ö  12¡¢»·ÎÀ  13¡¢¼ìÒß  14¡¢ÓÊÕþ  15¡¢µçÐÅ  
16¡¢ÌúµÀ  17¡¢²ÆÕþ¾Ö  18¡¢ÈËÊÂ¾Ö  19¡¢ÀͶ¯¾Ö  20¡¢Ë®Àû  21¡¢Éó¼Æ  22¡¢²¿¶Ó  23¡¢º£¹Ø

¶þ¡¢Õþµ³»ú¹Ø£¨1Íò£©
1¡¢Öйú¹²²úµ³  2¡¢ÃñÖ÷µ³ÅÉ  3¡¢ÕþЭ

Èý¡¢Éç»áÍÅÌ壨311Íò£©
1¡¢¹¤»á  2¡¢¹²ÇàÍÅ¡¢ÇàÁª¡¢Ñ§Áª  3¡¢¸¾Áª  4¡¢ÎÄÁª  5¡¢²ÐÁª  6¡¢¹¤ÉÌÁª  7¡¢Ð­»á  8¡¢Ñ§»á 
 9¡¢ºìÊ®×Ö»á  10¡¢»ù½ð»á  11¡¢¹ØÐÄÏÂÒ»´úЭ»á  12¡¢ÀÏÁäίԱ»á  13¡¢×Ú½ÌÍÅÌå  
14¡¢Éç»áÍÅÌå

ËÄ¡¢ÊÂÒµÐÔµ¥Î»£¨874Íò£©
1¡¢Ñ§Ð£  2¡¢Ò½Ôº  3¡¢ÊÂÎñËù  4¡¢Íâó  5¡¢¼¼Êõ¼à¶½¾Ö  6¡¢×ʲúÆÀ¹À  7¡¢½Ìί
8¡¢±£°²  9¡¢¿ÆÑÐËù  10¡¢Ô°ÒÕ  11¡¢µç̨  12¡¢µçÊǪ́  13¡¢³ö°æ¾Ö  14¡¢±¨Éç
15¡¢ÖÆƬ³§  16¡¢ÖÐ½é  17¡¢¹«Ö¤

Îå¡¢ÆóÒµ£¨¹«Ë¾£©£¨3464Íò£©
1¡¢»úе É豸  2¡¢½¨Öþ ½¨²Ä ×°ÊÎ  3¡¢Îå½ð  4¡¢µç×Ó  5¡¢¼ÆËã»ú 6¡¢»¥ÁªÍø 7¡¢·ÄÖ¯  
8¡¢»¯¹¤  9¡¢¼Òµç  10¡¢·þ×°  11¡¢·¿µØ²ú  12¡¢ÎïÒµ  13¡¢Ó¡Ë¢  14¡¢½ø³ö¿Ú  15¡¢Ê³Æ·  
16¡¢ÒûÁÏ  17¡¢²ÄÁÏ 18¡¢Í¨ÐÅ 19¡¢É̳¡  ³¬ÊÐ 20¡¢°ì¹«É豸  ÎÄ¾ß  21¡¢°ü×°  22¡¢±ö¹Ý  
·¹µê  ¾Æµê  23¡¢³ö°æ  24¡¢¿±Ì½ ²â»æ  25¡¢²ÍÒû  26¡¢Ð¬ ñ  27¡¢º½Ìì º½¿Õ  28¡¢¹¤ÒµÓÃÆ·  
29¡¢»áÒé Õ¹ÀÀ  30¡¢¼Ò¾ß  31¡¢½»Í¨ ÔËÊä  32¡¢¿ó²ú Ò±½ð ½ðÊô¼Ó¹¤  33¡¢ÂÃÐÐÉç ÂÃÓÎ  
34¡¢Å© ÁÖ ÄÁ Óã  35¡¢Æû³µ ĦÍгµ  36¡¢ÇṤ ÊÖ¹¤  37¡¢Çå½à  38¡¢Éç»á·þÎñ  39¡¢Ë®µç ¹©ÈÈ 
 40¡¢Êéµê  41¡¢ÑÌ  42¡¢¾Æ  43¡¢Ò½Ò© ±£½¡  44¡¢ÒÇÆ÷ ÒÇ±í  45¡¢ÒôÏì  46¡¢ÒôÏñ  47¡¢ÔìÖ½ 
Ö½ÖÆÆ·  48¡¢ÉúÎï¼¼Êõ ÉúÎ﹤³Ì  49¡¢Ê¯ÓÍ ÌìÈ»Æø  50¡¢µç×ÓÉÌÎñ  51¡¢ÓéÀÖ  52¡¢ÈÕÓÃÆ· 
Éú»îÓÃÆ·  53¡¢ÖÆÔì  54¡¢ËÜÁÏ Ëܽº

Áù¡¢½ðÈÚ£¨1018Íò£©
1¡¢ÒøÐÐ  2¡¢Ö¤È¯  3¡¢Í¶×ʹ«Ë¾  3¡¢ÅÄÂô  4¡¢ÐÅÍÐ  5¡¢±£ÏÕ  7¡¢·¿µØ²ú  8¡¢ÆóÒµ¹ÜÀí  
9¡¢¹ã¸æ  10¡¢È˲ŠÕÐƸ ÁÔÍ·  11¡¢´úÀí
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



REMOVE

2001-12-03 Thread Benoit Chausse
Title: REMOVE





REMOVE





Q about padding

2001-12-03 Thread Keresztfalvi Laszlo


Gens,

I'm new to encryption and just thinking about an application using SSL to
communicate and also for data (file) encryption both by OpenSSL (of course :-)

I found the next paragraphs in the EVP doc
(http://www.openssl.org/docs/crypto/EVP_EncryptInit.html#)

quote
When decrypting the final block is checked to see if it has the correct
form. 

Although the decryption operation can produce an error if padding is
enabled, it is not a strong test that the input data or key is correct. A
random block has better than 1 in 256 chance of being of the correct format
and problems with the input data earlier on will not produce a final decrypt
error. 
/quote


Would you please tell me what exactly can be the problem with padding? 

I hope this does not mean that I cannot decrypt what I encrypt with the same
parameter (padding enabled). Does this mean that padding can be tricked too
easily or what?

Many thanks
Laszlo

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



RE: ssl-cert-HOWTO.txt for review

2001-12-03 Thread Andrew Finnell
Title: RE: ssl-cert-HOWTO.txt for review





 If openssl can generate random data and spit it out in a file then why use a file to begin with? Can't openssl ( tool ) just generate its random data internally and use that? I think that's a lot safer than spitting it out to a file and prevents less problems with the random data getting deleted/viewed. 

- Andrew


-
Andrew T. Finnell
Software Engineer
eSecurity Inc
(321) 394-2485 



 -Original Message-
 From: Marcus Redivo [mailto:[EMAIL PROTECTED]] 
 Sent: Saturday, December 01, 2001 7:14 PM
 To: [EMAIL PROTECTED]
 Subject: RE: ssl-cert-HOWTO.txt for review
 
 
 Hello Fiel,
 
 Thanks for the comments.
 
 At 10:45 AM 12/1/01 -0800, Fiel Cabral wrote:
 
 My suggestion is to include info about the RANDFILE
 variable. I set RANDFILE=$HOME/.rnd in my environment
 and in the configuration file (the default value: 
 $ENV::HOME/.rnd). If 
 .rnd doesn't exist, I just copy a file to it (usually a 
 binary file or 
 a random-looking log file).
 
 I did not mention the RANDFILE, and in fact left it out of 
 the example configuration, because I was under the impression 
 that if I had /dev/*random I did not need it.
 
 If this is not true, could someone please correct me? Thanks.
 
 Now, the RANDFILE candidate. Using a binary or a log is 
 nowhere near random enough. Fortunately, openssl has a 
 command to create a better random file:
 
 # openssl rand -out $HOME/.rnd 1024
 
 (Don't send the output to your console unless you add the 
 -base64 switch, unless you like abstract art... ;) )
 
 BTW, I'm on the list now.
 
 Marcus Redivo
 
 The Binary Tool Foundry
 PO Box 2087 Stn Main
 Sidney BC Canada
 mailto:[EMAIL PROTECTED]
 http://www.binarytool.com
 
 
 __
 OpenSSL Project http://www.openssl.org
 User Support Mailing List [EMAIL PROTECTED]
 Automated List Manager [EMAIL PROTECTED]
 





REMOVE

2001-12-03 Thread Dutta, Sumanta

REMOVE


--
This message is intended only for the personal and confidential use of the designated 
recipient(s) named above.  If you are not the intended recipient of this message you 
are hereby notified that any review, dissemination, distribution or copying of this 
message is strictly prohibited.  This communication is for information purposes only 
and should not be regarded as an offer to sell or as a solicitation of an offer to buy 
any financial product, an official confirmation of any transaction, or as an official 
statement of Lehman Brothers.  Email transmission cannot be guaranteed to be secure or 
error-free.  Therefore, we do not represent that this information is complete or 
accurate and it should not be relied upon as such.  All information is subject to 
change without notice.


__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



RE: ssl-cert-HOWTO.txt for review

2001-12-03 Thread Vadim Fedukovich

Andrew,

openssl is rather mixer than generator or random data.
No deterministic (ok, stable) program can make something random.
To make a random secret one need some input unavailable to attacker.
/dev/random is internal enough and could be quite a good one.

regards,
Vadim

On Mon, 3 Dec 2001, Andrew Finnell wrote:

   If openssl can generate random data and spit it out in a file then
 why use a file to begin with? Can't openssl ( tool ) just generate its
 random data internally and use that? I think that's a lot safer than
 spitting it out to a file and prevents less problems with the random data
 getting deleted/viewed.

 - Andrew

 -
 Andrew T. Finnell
 Software Engineer
 eSecurity Inc
 (321) 394-2485


  -Original Message-
  From: Marcus Redivo [mailto:[EMAIL PROTECTED]]
  Sent: Saturday, December 01, 2001 7:14 PM
  To: [EMAIL PROTECTED]
  Subject: RE: ssl-cert-HOWTO.txt for review
 
 
  Hello Fiel,
 
  Thanks for the comments.
 
  At 10:45 AM 12/1/01 -0800, Fiel Cabral wrote:
 
  My suggestion is to include info about the RANDFILE
  variable. I set RANDFILE=$HOME/.rnd in my environment
  and in the configuration file (the default value:
  $ENV::HOME/.rnd). If
  .rnd doesn't exist, I just copy a file to it (usually a
  binary file or
  a random-looking log file).
 
  I did not mention the RANDFILE, and in fact left it out of
  the example configuration, because I was under the impression
  that if I had /dev/*random I did not need it.
 
  If this is not true, could someone please correct me? Thanks.
 
  Now, the RANDFILE candidate. Using a binary or a log is
  nowhere near random enough. Fortunately, openssl has a
  command to create a better random file:
 
  # openssl rand -out $HOME/.rnd 1024
 
  (Don't send the output to your console unless you add the
  -base64 switch, unless you like abstract art... ;) )
 
  BTW, I'm on the list now.
 
  Marcus Redivo
 
  The Binary Tool Foundry
  PO Box 2087 Stn Main
  Sidney BC Canada
  mailto:[EMAIL PROTECTED]
  http://www.binarytool.com
 
 
  __
  OpenSSL Project http://www.openssl.org
  User Support Mailing List[EMAIL PROTECTED]
  Automated List Manager   [EMAIL PROTECTED]
 


__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



IE5 on Mac - Security Problem

2001-12-03 Thread Donald MacLeod

I've seen similar posts on the following topic here but as yet no solution.
I get Security Failure: Data encryption error using IE 5.0 on a Mac when I
attempt to connect to a secure server running openssl 0.9.6.a.

How do I configure the server to get round this?





__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: RSA Keys

2001-12-03 Thread Alexander Kuit


On 03.12.2001 11:39:54 owner-openssl-users wrote:

Hi

Sorry for the resend.
This is a resend with the complete encoding type.


I am getting a file from a MS machine that contains an exported public
key. This data appears to be binary data. It has been exported with the
flag X509_ASN_ENCODING

Trying to read the file with PEM_read_publickkey() does not appear to
work. What is the correct function or other method to use to get this
data into a RSA * struct or a EVP_PKEY structure. Preferably EVP_PKEY to
add to a certificate.

PEM is the ascii version of the binary ASN/DER encoding, so PEM functions
won't work. To convert a binary (der) encoding into an internal OpenSSL
structure, use the d2i_* functions. In your case, probably the d2i_PublicKey()
or a similar function will do. See also the FAQ for more information
about the d2i_* functions.

Alex.

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



bad rsa decrypt

2001-12-03 Thread Dario Prester




Hello,
I am getting this error with Apache Web Server and 
mod_ssl (2.8.3-1.3.19)

OpenSSL: error:1408B076:SSL 
routines:SSL3_GET_CLIENT_KEY_EXCHANGE:bad rsa decrypt

I get this error while testing my http server with 
"openssl s_client -connect localhost:443"
What is wrong ?

Anyone can help me tofix it ?

Dario PresterPT-TPD PAITALTEL SPALocalità Bivio 
Foresta SS. 113Carini (PA) - ITALYtel. +39 091 8615 577fax. 
+39 091 8615 288e-mail: [EMAIL PROTECTED] 



bad rsa decrypt

2001-12-03 Thread Dario Prester




Hello,
I am getting this error with Apache Web Server and 
mod_ssl (2.8.3-1.3.19)

OpenSSL: error:1408B076:SSL 
routines:SSL3_GET_CLIENT_KEY_EXCHANGE:bad rsa decrypt

I get this error while testing my http server with 
"openssl s_client -connect localhost:443"
What is wrong ?

Anyone can help me tofix it ?
Thanks in advance 


Dario PresterPT-TPD PAITALTEL SPALocalità Bivio 
Foresta SS. 113Carini (PA) - ITALYtel. +39 091 8615 577fax. 
+39 091 8615 288e-mail: [EMAIL PROTECTED] 



bad rsa decrypt

2001-12-03 Thread Dario Prester



Hello,
I am getting this error with Apache Web Server and 
mod_ssl (2.8.3-1.3.19)

OpenSSL: error:1408B076:SSL 
routines:SSL3_GET_CLIENT_KEY_EXCHANGE:bad rsa decrypt

I get this error while testing my http server with 
"openssl s_client -connect localhost:443"
What is wrong ?

Anyone can help me tofix it ?

Thanks in advance

Dario PresterPT-TPD PAITALTEL 
SPALocalità Bivio Foresta SS. 113Carini (PA) - ITALYtel. +39 
091 8615 577fax. +39 091 8615 288e-mail: [EMAIL PROTECTED] 



REMOVE

2001-12-03 Thread Celina Rebello

REMOVE

---
Outgoing mail is certified Virus Free.
Checked by AVG anti-virus system (http://www.grisoft.com).
Version: 6.0.286 / Virus Database: 152 - Release Date: 9/10/2001

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: Q about padding

2001-12-03 Thread Dr S N Henson

Keresztfalvi Laszlo wrote:
 
 
 quote
 When decrypting the final block is checked to see if it has the correct
 form.
 
 Although the decryption operation can produce an error if padding is
 enabled, it is not a strong test that the input data or key is correct. A
 random block has better than 1 in 256 chance of being of the correct format
 and problems with the input data earlier on will not produce a final decrypt
 error.
 /quote
 
 Would you please tell me what exactly can be the problem with padding?
 

Its not a problem more a limitation.

 I hope this does not mean that I cannot decrypt what I encrypt with the same
 parameter (padding enabled). Does this mean that padding can be tricked too
 easily or what?
 

All it is really saying is that passing the padding test (that is
EVP_DecryptFinal completing without error) is not by itself a realiable
guarantee of the integrity of the decrypted data or indeed the
correctness of the decryption key. The structure of the padding is such
that if the last byte of the last block decrypted is 01 then it is
considered valid. The chance of this happening is 1 in 256 for random
data.

Additionally only the final block is tested so errors earlier in the
data will not produce any error at all.

Protocols which in which integrity of the data is important use
additional techniques such as message digests.

Steve.
-- 
Dr Stephen N. Henson.   http://www.drh-consultancy.demon.co.uk/
Personal Email: [EMAIL PROTECTED] 
Senior crypto engineer, Gemplus: http://www.gemplus.com/
Core developer of the   OpenSSL project: http://www.openssl.org/
Business Email: [EMAIL PROTECTED] PGP key: via homepage.

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



random file???

2001-12-03 Thread Rosner, Seth

I am trying to run the command line /usr/local/ssl/bin/openssl -req -new
-nodes -keyout private.key -out public.csr  to create a verisign
certificate.  I am getting the PRNG not seeded error message.  How do I
create a .rand file?  Any suggestions? Thanks

I read the faq, not a lot of help:

[USER]
1. Why do I get a PRNG not seeded error message?
Cryptographic software needs a source of unpredictable data to work
correctly. Many open source operating systems provide a randomness device
that serves this purpose. On other systems, applications have to call the
RAND_add() ../docs/crypto/RAND_add.html or RAND_seed() function with
appropriate data before generating keys or performing public key encryption.
(These functions initialize the pseudo-random number generator, PRNG.) 
Some broken applications do not do this. As of version 0.9.5, the OpenSSL
functions that need randomness report an error if the random number
generator has not been seeded with at least 128 bits of randomness. If this
error occurs, please contact the author of the application you are using. It
is likely that it never worked correctly. OpenSSL 0.9.5 and later make the
error visible by refusing to perform potentially insecure encryption. 
On systems without /dev/urandom and /dev/random, it is a good idea to use
the Entropy Gathering Demon (EGD); see the RAND_egd()
../docs/crypto/RAND_egd.html manpage for details. Starting with version
0.9.7, OpenSSL will automatically look for an EGD socket at
/var/run/egd-pool, /dev/egd-pool, /etc/egd-pool and /etc/entropy. 
Most components of the openssl command line utility automatically try to
seed the random number generator from a file. The name of the default
seeding file is determined as follows: If environment variable RANDFILE is
set, then it names the seeding file. Otherwise if environment variable HOME
is set, then the seeding file is $HOME/.rnd. If neither RANDFILE nor HOME is
set, versions up to OpenSSL 0.9.6 will use file .rnd in the current
directory while OpenSSL 0.9.6a uses no default seeding file at all. OpenSSL
0.9.6b and later will behave similarly to 0.9.6a, but will use a default of
C:\ for HOME on Windows systems if the environment variable has not been
set. 
If the default seeding file does not exist or is too short, the PRNG not
seeded error message may occur. 
The openssl command line utility will write back a new state to the default
seeding file (and create this file if necessary) unless there was no
sufficient seeding. 
Pointing $RANDFILE to an Entropy Gathering Daemon socket does not work. Use
the -rand option of the OpenSSL command line tools instead. The $RANDFILE
environment variable and $HOME/.rnd are only used by the OpenSSL command
line tools. Applications using the OpenSSL library provide their own
configuration options to specify the entropy source, please check out the
documentation coming the with application. 
For Solaris 2.6, Tim Nibbe [EMAIL PROTECTED] and others have suggested
installing the SUNski package from Sun patch 105710-01 (Sparc) which adds a
/dev/random device and make sure it gets used, usually through $RANDFILE.
There are probably similar patches for the other Solaris versions. However,
be warned that /dev/random is usually a blocking device, which may have some
effects on OpenSSL. 



Seth Rosner
Webmaster - OpenTV.com

 ...OLE_Obj... 

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



FW: updates (SSL-Certificates-HOWTO)

2001-12-03 Thread Franck Martin

For your information

I will now add the comments I have received as well as the
ssl-cert-HOWTO.txt inside it...

Franck Martin
Network and Database Development Officer
SOPAC South Pacific Applied Geoscience Commission
Fiji
E-mail: [EMAIL PROTECTED] mailto:[EMAIL PROTECTED] 
Web site: http://www.sopac.org/
http://www.sopac.org/ Support FMaps: http://fmaps.sourceforge.net/
http://fmaps.sourceforge.net/ 

This e-mail is intended for its addresses only. Do not forward this e-mail
without approval. The views expressed in this e-mail may not be necessarily
the views of SOPAC.



-Original Message-
From: Greg Ferguson [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, 4 December 2001 3:18 
To: [EMAIL PROTECTED]
Subject: updates (SSL-Certificates-HOWTO)


  SSL Certificates HOWTO
  Franck Martin  [EMAIL PROTECTED]
  v0.1  2001-11-18

  A first hand approach on how to manage a certificate authority (CA),
  and issue or sign certificates to be used for secure web, secure
  e-mail, or signing code and other usages.

* NEW entry
http://www.linuxdoc.org/HOWTO/SSL-Certificates-HOWTO/
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Running Apache/SSL and openSSL on Solaris 7

2001-12-03 Thread Waleed Hamad




I need a document 
that states what should be installed first or if it does not matter to install 
APACHE then OPENSSL

Can you please 
answer these questions for me:

I already have 
Apache 1.3.20 installed and running 
I would like 
to get APache/SSL also running, do I remove Apache 1.3.20 and redo the 
installation of Apache and SSL ??
Please help me 
out.

Thanks
Waleed



OpenSSH Keys and JSSE

2001-12-03 Thread Jeremy Levy

Is it possible to use key/certificates that are generated with OPENSSH in
Java Secure Sockets and vice a versa keys created with keytool can be used
with openSSH?  If no, how do I get the 2 to work together?

Thanks

JL

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



REMOVE

2001-12-03 Thread Indika De Silva
REMOVE__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]


Re: Running Apache/SSL and openSSL on Solaris 7

2001-12-03 Thread Edgar Hodge

Waleed,
I would install Apache first, but it really doesn't matter.
Check-out
www.apache-ssl.org
E.
At 06:06 PM 12/3/01 -0600, you wrote:

I need a document that states what should be
installed first or if it does not matter to install APACHE then
OPENSSL

Can you please answer these questions for
me:

I already have Apache 1.3.20 installed
and running 
I would like to get APache/SSL also
running, do I remove Apache 1.3.20 and redo the installation of Apache
and SSL ??
Please help me out.

Thanks
Waleed




ÉÏÍø£¬Äú¿¼ÂǹÜÀíÁËÂð£¿

2001-12-03 Thread ÄãµÄÅóÓÑ





  
  

  

  


  
  
  
  

  


  
  
  

  
  

  


  

  
  

  ÉÏÍø£¬Äú¿¼ÂǹÜÀíÁËÂ𣿡ª¡ªÏêϸ×ÊÁÏÇëµã»÷ 
  ÕâÁ½Ä꣬µ½´¦¶¼ÔÚ¸ãÉÏÍø¹¤³Ì£¬Ì¸ÂÛÈý´óÒªËØ£ºInfrastructure»ù´¡ÉèÊ©¡¢ApplicationÓ¦Óá¢InformationÐÅÏ¢£¬ÕâÈý´óÒªËر»ÐÎÏóµØ±ÈÓ÷ΪÐÅÏ¢¸ßËÙ¹«Â·¡¢³µºÍ»õ¡£µ«ÊÇ£¬ÓÐÒ»¸ö·Ç³£ÖØÒªµÄÒªËر»ºöÂÔÁË£¬ÄǾÍÊǹÜÀí¡£¸ù¾ÝFBIµÄÑо¿±íÃ÷£ºÓÉÓÚÉÏÍøδʵʩ¹ÜÀí¶øÒý·¢µÄ²ÆÎñºÍ°²È«ÎÊÌâÖУ¬97%ÊÇÓÉÓÚÄÚ²¿ÈËÔ±ÀÄÓÃÍøÂç·ÃÎÊ£¬55%ÊÇÄÚ²¿ÈËÔ±·Ç·¨·ÃÎÊ¡£ÔÚʵʩÉÏÍø¹ÜÀíµÄ»ú¹¹£¬³É±¾·ÑÓÃÖ§³öºÍ°²È«ÎÊÌⶼµÃµ½ÓÐЧµÄ¿ØÖÆ£¬Ð§ÂÊ´ó·ù¶ÈÌá¸ß¡£¡­¡­ 
  
  ÄúÒѾ­ÔÚ¿¼ÂÇÉÏÍø¹ÜÀí£¬µ«ÊÇÄúÓÐËù¹ËÂÇ£º 
  ÄúºÜÏ뽫ÉÏÍø¹ÜºÃ£¬µ«ÊÇÄúÓÐËùµ£ÓÇ£»ÄúÒѾ­¿¼ÂÇÉÏÍø¹ÜÀíÁË£¬µ«ÊÇÄúÓöµ½ÁËеÄÂé·³£º
  (1) 
  Ñ¡Ë­µÄºÃÄØ£¿
  (2) 
  ÔõÑù²ÅÄܱÜÃâÅäÖú͹ÜÀíÌ«¸´ÔÓµÄÎÊÌâÄØ£¿
  (3) 
  ÈçºÎ±ÜÃâÖظ´»¨Ç®ÎÊÌâÄØ£¿ 
  Òײ©BroadenGate£¬È«·½Î»ÉÏÍø¹ÜÀí£¬¡°Ò»Õ¾Ê½¡±½â¾ö·½°¸ 
  
  Òײ©Êǹú¼ÊÖªÃûµÄÈí¼þ¿ª·¢É̺ͷþÎñÍâ°üÉÌ£¬ÔÚ»¥ÁªÍø¼¼ÊõÁìÓò¾ßÓÐ6ÄêÒÔÉϵÄרҵ¾­Ñ飬ÏÖÓÐÔ±¹¤½ü400ÈË¡£Òײ©ÒÔ¡°È«·½Î»ÉÏÍø¹ÜÀí¡±ÎªÌØÉ«µÄBroadenGateÉÏÍø¹ÜÀí²úÆ·£¬³«µ¼¡°Ò»Õ¾Ê½¡±½â¾ö·½°¸£¬ÒýÓò¿Êð»¥ÁªÍøÓ¦ÓÃÕâһз½·¨£¬ÈÃÄúµÄÉÏÍø¹ÜÀíʡʱ¡¢Ê¡Á¦¡¢Ê¡ÐÄ¡¢Ê¡Ç®¡£
  Òײ©BroadenGateÉÏÍø¹ÜÀí-È«·½Î»µÄ²úÆ·Ïß 
  
  Òײ©BroadenGateÉÏÍø¹ÜÀí-È«·½Î»µÄ·þÎñÌåϵ 
  
  Òײ©BroadenGateÉÏÍø¹ÜÀí-È«·½Î»¿Í»§µÄÊ¢Óþ 
  
  Òײ©BroadenGateÉÏÍø¹ÜÀí-È«·½Î»ºÏ×÷»ï°éµÄÖ§³Ö
  ¡¡
  ÈçÓûÁ˽â²úÆ·ºÍ·þÎñÏêϸÐÅÏ¢£¬ÇëÁªÏµ£º
  ×îвúÆ·ÏêϸÐÅÏ¢£º²úÆ·¾­Àí£º¶Å°®Æ¼[EMAIL PROTECTED] 
  µç»°£º010-65224665/67ת300
  ÖйúÇøÓò²úÆ·×Éѯ£ºÏúÊÛЭÀí£ºÐ¤½Ý [EMAIL PROTECTED] 
  µç»°£º010-65224665/67ת118
  Öйú±±·½ÇøÓòÏúÊÛ£ºÏúÊÛ¾­Àí£ºÌÆÀö [EMAIL PROTECTED] 
  µç»°£º010-65224665/67ת127
  ÖйúÄÏ·½ÇøÓòÏúÊÛ£ºÏúÊÛ¾­Àí£º·ë½¨Ó [EMAIL PROTECTED] 
  µç»°£º0755-6716652/54ת
  Öйú¶«²¿ÇøÓòÏúÊÛ£ºÏúÊÛ¾­Àí£ºÐ¤Ô½Éî [EMAIL PROTECTED] 
  µç»°£º021-64383414/3854ת
  ±±¾©¹úÐÅÒײ©Èí¼þϵͳÓÐÏÞ¹«Ë¾
  µØÖ·£º£¨15£©±±¾©¶«ËÄÄÏ´ó½Ö249ºÅ±±¼Æ´óÂ¥7²ã
  µç»°£º010-65224665/67 65239715/17/35/36/37/39 
  ´«Õ棺010-65239897 
  


  
  
·µ»Ø

  
  

  
°æȨËùÓÐ ±±¾©¹úÐÅÒײ©Èí¼þϵͳÓÐÏÞ¹«Ë¾ 

  
  

  


  ¹ØÓÚBroadenGate
  |
  ºÏ×÷»ï°é
  |
  ÍøÕ¾µ¼º½ 
  |
  ÁªÏµ·½Ê½ 
  |
  °æȨÉùÃ÷ 

  ¡¶µçÐÅÓëÐÅÏ¢·þÎñÒµÎñ¾­ÓªÐí¿ÉÖ¤¡·±àºÅ£º¾©ICPÖ¤000109 




ÉÏÍø£¬Äú¿¼ÂǹÜÀíÁËÂð£¿

2001-12-03 Thread ÄãµÄÅóÓÑ





  
  

  

  


  
  
  
  

  


  
  
  

  
  

  


  

  
  

  ÉÏÍø£¬Äú¿¼ÂǹÜÀíÁËÂ𣿡ª¡ªÏêϸ×ÊÁÏÇëµã»÷ 
  ÕâÁ½Ä꣬µ½´¦¶¼ÔÚ¸ãÉÏÍø¹¤³Ì£¬Ì¸ÂÛÈý´óÒªËØ£ºInfrastructure»ù´¡ÉèÊ©¡¢ApplicationÓ¦Óá¢InformationÐÅÏ¢£¬ÕâÈý´óÒªËر»ÐÎÏóµØ±ÈÓ÷ΪÐÅÏ¢¸ßËÙ¹«Â·¡¢³µºÍ»õ¡£µ«ÊÇ£¬ÓÐÒ»¸ö·Ç³£ÖØÒªµÄÒªËر»ºöÂÔÁË£¬ÄǾÍÊǹÜÀí¡£¸ù¾ÝFBIµÄÑо¿±íÃ÷£ºÓÉÓÚÉÏÍøδʵʩ¹ÜÀí¶øÒý·¢µÄ²ÆÎñºÍ°²È«ÎÊÌâÖУ¬97%ÊÇÓÉÓÚÄÚ²¿ÈËÔ±ÀÄÓÃÍøÂç·ÃÎÊ£¬55%ÊÇÄÚ²¿ÈËÔ±·Ç·¨·ÃÎÊ¡£ÔÚʵʩÉÏÍø¹ÜÀíµÄ»ú¹¹£¬³É±¾·ÑÓÃÖ§³öºÍ°²È«ÎÊÌⶼµÃµ½ÓÐЧµÄ¿ØÖÆ£¬Ð§ÂÊ´ó·ù¶ÈÌá¸ß¡£¡­¡­ 
  
  ÄúÒѾ­ÔÚ¿¼ÂÇÉÏÍø¹ÜÀí£¬µ«ÊÇÄúÓÐËù¹ËÂÇ£º 
  ÄúºÜÏ뽫ÉÏÍø¹ÜºÃ£¬µ«ÊÇÄúÓÐËùµ£ÓÇ£»ÄúÒѾ­¿¼ÂÇÉÏÍø¹ÜÀíÁË£¬µ«ÊÇÄúÓöµ½ÁËеÄÂé·³£º
  (1) 
  Ñ¡Ë­µÄºÃÄØ£¿
  (2) 
  ÔõÑù²ÅÄܱÜÃâÅäÖú͹ÜÀíÌ«¸´ÔÓµÄÎÊÌâÄØ£¿
  (3) 
  ÈçºÎ±ÜÃâÖظ´»¨Ç®ÎÊÌâÄØ£¿ 
  Òײ©BroadenGate£¬È«·½Î»ÉÏÍø¹ÜÀí£¬¡°Ò»Õ¾Ê½¡±½â¾ö·½°¸ 
  
  Òײ©Êǹú¼ÊÖªÃûµÄÈí¼þ¿ª·¢É̺ͷþÎñÍâ°üÉÌ£¬ÔÚ»¥ÁªÍø¼¼ÊõÁìÓò¾ßÓÐ6ÄêÒÔÉϵÄרҵ¾­Ñ飬ÏÖÓÐÔ±¹¤½ü400ÈË¡£Òײ©ÒÔ¡°È«·½Î»ÉÏÍø¹ÜÀí¡±ÎªÌØÉ«µÄBroadenGateÉÏÍø¹ÜÀí²úÆ·£¬³«µ¼¡°Ò»Õ¾Ê½¡±½â¾ö·½°¸£¬ÒýÓò¿Êð»¥ÁªÍøÓ¦ÓÃÕâһз½·¨£¬ÈÃÄúµÄÉÏÍø¹ÜÀíʡʱ¡¢Ê¡Á¦¡¢Ê¡ÐÄ¡¢Ê¡Ç®¡£
  Òײ©BroadenGateÉÏÍø¹ÜÀí-È«·½Î»µÄ²úÆ·Ïß 
  
  Òײ©BroadenGateÉÏÍø¹ÜÀí-È«·½Î»µÄ·þÎñÌåϵ 
  
  Òײ©BroadenGateÉÏÍø¹ÜÀí-È«·½Î»¿Í»§µÄÊ¢Óþ 
  
  Òײ©BroadenGateÉÏÍø¹ÜÀí-È«·½Î»ºÏ×÷»ï°éµÄÖ§³Ö
  ¡¡
  ÈçÓûÁ˽â²úÆ·ºÍ·þÎñÏêϸÐÅÏ¢£¬ÇëÁªÏµ£º
  ×îвúÆ·ÏêϸÐÅÏ¢£º²úÆ·¾­Àí£º¶Å°®Æ¼[EMAIL PROTECTED] 
  µç»°£º010-65224665/67ת300
  ÖйúÇøÓò²úÆ·×Éѯ£ºÏúÊÛЭÀí£ºÐ¤½Ý [EMAIL PROTECTED] 
  µç»°£º010-65224665/67ת118
  Öйú±±·½ÇøÓòÏúÊÛ£ºÏúÊÛ¾­Àí£ºÌÆÀö [EMAIL PROTECTED] 
  µç»°£º010-65224665/67ת127
  ÖйúÄÏ·½ÇøÓòÏúÊÛ£ºÏúÊÛ¾­Àí£º·ë½¨Ó [EMAIL PROTECTED] 
  µç»°£º0755-6716652/54ת
  Öйú¶«²¿ÇøÓòÏúÊÛ£ºÏúÊÛ¾­Àí£ºÐ¤Ô½Éî [EMAIL PROTECTED] 
  µç»°£º021-64383414/3854ת
  ±±¾©¹úÐÅÒײ©Èí¼þϵͳÓÐÏÞ¹«Ë¾
  µØÖ·£º£¨15£©±±¾©¶«ËÄÄÏ´ó½Ö249ºÅ±±¼Æ´óÂ¥7²ã
  µç»°£º010-65224665/67 65239715/17/35/36/37/39 
  ´«Õ棺010-65239897 
  


  
  
·µ»Ø

  
  

  
°æȨËùÓÐ ±±¾©¹úÐÅÒײ©Èí¼þϵͳÓÐÏÞ¹«Ë¾ 

  
  

  


  ¹ØÓÚBroadenGate
  |
  ºÏ×÷»ï°é
  |
  ÍøÕ¾µ¼º½ 
  |
  ÁªÏµ·½Ê½ 
  |
  °æȨÉùÃ÷ 

  ¡¶µçÐÅÓëÐÅÏ¢·þÎñÒµÎñ¾­ÓªÐí¿ÉÖ¤¡·±àºÅ£º¾©ICPÖ¤000109 




Re: FW: updates (SSL-Certificates-HOWTO)

2001-12-03 Thread Averroes

Hi Franck,

Cool How-to
But it be nice to describe all relevant options in config file
openssl.cnf before to build any certificate.
Since the default option are simple.

You should take in consideration the config file
of pyCA: http://www.pyca.de/config.html

Regards

Franck Martin wrote:
 
 For your information
 
 I will now add the comments I have received as well as the
 ssl-cert-HOWTO.txt inside it...
 
 Franck Martin
 Network and Database Development Officer

 
   SSL Certificates HOWTO
   Franck Martin  [EMAIL PROTECTED]
   v0.1  2001-11-18
 
   A first hand approach on how to manage a certificate authority (CA),
   and issue or sign certificates to be used for secure web, secure
   e-mail, or signing code and other usages.
 
 * NEW entry
 http://www.linuxdoc.org/HOWTO/SSL-Certificates-HOWTO/
 __
 OpenSSL Project http://www.openssl.org
 User Support Mailing List[EMAIL PROTECTED]
 Automated List Manager   [EMAIL PROTECTED]

-- 
# .- ...- . .-. .-. --- . ... .- .-.-.- .- -.-- ...  .-
# Averroes A. Aysha
# Think Linux, Think Slackware!
# e-fingerprint = 63:B0:7D:A1:23:BC:25:96:AE:B7:76:36:F3:07:1F:88
# .- ...- . .-. .-. --- . ... .- .-.-.- .- -.-- ...  .-


smime.p7s
Description: S/MIME Cryptographic Signature


RE: FW: updates (SSL-Certificates-HOWTO)

2001-12-03 Thread Franck Martin

Michael,

As you may read below, I have written an SSL HOWTO. Averroes, suggested to
me to use the text of the configuration file on your site to describe the
openssl.cnf file. I know that you have released your software under GPL, but
I prefer to ask you if you authorise me to include some part of your text
inside my SSL HOWTO. Proper achnowledgement will be done.

Thanks in advance for your positive answer.

Franck Martin
Network and Database Development Officer
SOPAC South Pacific Applied Geoscience Commission
Fiji
E-mail: [EMAIL PROTECTED] mailto:[EMAIL PROTECTED] 
Web site: http://www.sopac.org/
http://www.sopac.org/ Support FMaps: http://fmaps.sourceforge.net/
http://fmaps.sourceforge.net/ 

This e-mail is intended for its addresses only. Do not forward this e-mail
without approval. The views expressed in this e-mail may not be necessarily
the views of SOPAC.



-Original Message-
From: Averroes [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, 4 December 2001 5:36 
To: [EMAIL PROTECTED]
Subject: Re: FW: updates (SSL-Certificates-HOWTO)


Hi Franck,

Cool How-to
But it be nice to describe all relevant options in config file
openssl.cnf before to build any certificate.
Since the default option are simple.

You should take in consideration the config file
of pyCA: http://www.pyca.de/config.html

Regards

Franck Martin wrote:
 
 For your information
 
 I will now add the comments I have received as well as the
 ssl-cert-HOWTO.txt inside it...
 
 Franck Martin
 Network and Database Development Officer

 
   SSL Certificates HOWTO
   Franck Martin  [EMAIL PROTECTED]
   v0.1  2001-11-18
 
   A first hand approach on how to manage a certificate authority (CA),
   and issue or sign certificates to be used for secure web, secure
   e-mail, or signing code and other usages.
 
 * NEW entry
 http://www.linuxdoc.org/HOWTO/SSL-Certificates-HOWTO/
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: P7B to PEM format Conversion.

2001-12-03 Thread Averroes

Hi srinu

Cat the cert in PEM the last one need to be the Root CA

RootCA, SubCa1, Sub-SubCA1

Exemple:

]# cat Sub-SubCA1  ./path/to/cachain.pem
]# cat SubCA1  ./path/to/cachain.pem
}# cat RooCA  ./path/to/cachain.pem

Ciao!


 srinu wrote:
 
 I have a Root Certificate and another Intermediate root Certificate issued by
 the root installed in my browser.
 I imported the intermediate Certificate to a p7b file and also checked the
 option include all Certificates in the path.
 Now i want to Convert this P7B file into PEM text format so that the PEM will
 contain all the certificates in the trusted path. I donno how to do so. what
 utility i need to use for this conversion.
 
 Thanks in advance.
 srinu

-- 
# .- ...- . .-. .-. --- . ... .- .-.-.- .- -.-- ...  .-
# Averroes A. Aysha
# Think Linux, Think Slackware!
# e-fingerprint = 63:B0:7D:A1:23:BC:25:96:AE:B7:76:36:F3:07:1F:88
# .- ...- . .-. .-. --- . ... .- .-.-.- .- -.-- ...  .-


smime.p7s
Description: S/MIME Cryptographic Signature