Re: SSL Proxy problems

1999-07-23 Thread Michal Trojnara
Bunny, stunnel (Failed to talk sslv3 properly, generating errors on certain packets. So why didn't you report your problem to stunnel-users, first? I'm sure I could help you. Regards, Mike --- Michal Trojnara * +48 501 00 12 43 IT Security Officer * PTK Centertel

Re: Scripting of s_client

1999-07-23 Thread Holger Reif
Thomas Reinke schrieb: Point 3 is your problem, s_client handles stdin in a special way :( s_client assumes that if either stdin or the ssl socket hits end of file, that it should shut down operation. Unfortunately, when redirecting stdin from a file, what happens is that you read the

Re: SSL Proxy problems

1999-07-23 Thread bugs . bunny
How about using eiterh mod_ssl or Apache-SSL togetehr with ProxyPass directive? It seems like a bit overkill but should work. Furthermore I suggest buying some hardware crypto accelerator that gives you *much* performance gain. A hardware implementation of 48bit SSL seems like a bit of

Re: Scripting of s_client

1999-07-23 Thread thoth
Holger Reif [EMAIL PROTECTED] ,in message 37981BDE.6A611A5@smartring. de, wrote: What about (cat file; sleep 15)| openssl s_client -options? This way stdin is not closd until 15 seconds have elapsed. Or, if s_client and s_server were able to do the subprocess plumbing the same

Bad Protocol Version Number

1999-07-23 Thread Jim Peters
Hi, I'm using OpenSSL 0.9.2b / mod_ssl 2.2.7 / Apache 1.3.6 and trying to get it up and running. When I try to use a cert that was created using 0.9.0b libs I get this message from the server error log: [error] mod_ssl: Unable to configure server private key for connection (OpenSSL library

Re: SSL Proxy problems

1999-07-23 Thread Holger Reif
[EMAIL PROTECTED] schrieb: How about using eiterh mod_ssl or Apache-SSL togetehr with ProxyPass directive? It seems like a bit overkill but should work. Furthermore I suggest buying some hardware crypto accelerator that gives you *much* performance gain. A hardware

Re: Secure transmissions OK, but how store data?

1999-07-23 Thread Bryan Fordham
On Sat, 24 Jul 1999 [EMAIL PROTECTED] wrote: Thirdly, you could download any one of a number of open-source encryption products which will encrypt the data with the public key of the recipient, thus making it available only to whoever has the private key. Start at the PGP site for that sort

Re: Secure transmissions OK, but how store data?

1999-07-23 Thread Barry Hill
Hi, Thanks for the tips! The PGP aspect seems most interesting as I need to be able to access the data securely again via the net, although the other are good interim solutions! Regards, Barry On Sat, 24 Jul 1999 00:22:15 +1200 (NZST), [EMAIL PROTECTED] wrote: emailing the data to

compile problem - bswap

1999-07-23 Thread Mark Heintz
Encountered the error below when running make... I scanned through INSTALL, checked the archive and found somebody with a similar error, but there were no answers to the problem (not encouraging). Config runs fine, I've tried both ./config and ./config no-asm. The system is a fairly fresh

What is this ?

1999-07-23 Thread Spark
Hello All, I recently made a dump from a communication session between a verisign CA and an IPsec client. I tried to find out what system they are using to do the online CERT request etc.. I know they are using somekind of pkcs7/pkcs10 system, like the SMIME CRS.. But i can't figure out how i

SSL-C vs OpenSSL

1999-07-23 Thread Ray Hodel
Hello, What are the differences between OpenSSL and RSA's SSL-C? I would like to get Apache-SSL working commercially within the US, without breaking any patent laws. And, I do know of the available SSL packages, like Stronghold and Raven. I want to know what other options are available. Ray

Re: Memory leaks in strong ciphers

1999-07-23 Thread Bodo Moeller
gic [EMAIL PROTECTED]: I was developing an SSL client (with openssl-0.9.3a) and found memory leaks when using RC4-MD5 (1024/128 bits). HOWEVER, when I switched to "EXP-RC4-MD5" (512/40 bits), there are NO leaks. The best way to reproduce the leaks is to run 's_time' for a long time. (Use

Memory leaks in strong ciphers

1999-07-23 Thread gic
I was developing an SSL client (with openssl-0.9.3a) and found memory leaks when using RC4-MD5 (1024/128 bits). HOWEVER, when I switched to "EXP-RC4-MD5" (512/40 bits), there are NO leaks. The best way to reproduce the leaks is to run 's_time' for a long time. (Use 'top' to monitor its memory