is it possible to do SSL (client side) without using RSA? I've checked
into the faq's
from RSA, openssl.org (well, mailing list archives), rsaref, etc. but am
not sure of the answer.
I think the ssl handshake uses a patented key exchange algorithm, is that
true? I think
that is the only obstacl
At 04:39 AM 8/19/99 -0400, Patrick Brewer wrote:
>
> If I get a certificate from a CA can I then become a CA and create
>certificates for machines in my domain? Or for virtual hosted domains?
>
The certificate you receive is 'branded' to the site name in the request, and
can only be used on
OK I'm running Slackware 4.0 kernel 2.2.6 and I've got
apache_1.3.6
apache_1.3.6+ssl_1.36
openssl-0.9.4.tar.gz
I've followed the directions in both the readme's and
the book (2nd edition):
1. compiled openssl-0.9.4 without errors
2. untar apache_1.3.6
3. untar apache_1.3.6+ssl_1
Gerald Pattillo wrote:
>
> I am trying to set up a secure connection using royalty-free protocols.
> Since I will own both ends, I can choose the ciphersuite to use, which
> will be DH_DSS_DES_192_CBC3_SHA. I now have the RSA version
> working, but in order to be avoid RSA royalties, I need to k
You received you private key from the CA??? You published your
private key? Um, your certificate has not essentially been made
useless, you realize, from a security perspective? Your private
key is something you never never ever give out, and you keep
it under lock and key!
Further, you don't enc
hello,
Recently, i get a certificate and my private key from
a CA. The certificate file can be read by openssl, but
the private key file can't be read. I wonder what is the private key
file format it was. The below private key was encoded by base64.
Can anyone can help me to find out ho
I am trying to set up a secure connection using royalty-free protocols.
Since I will own both ends, I can choose the ciphersuite to use, which
will be DH_DSS_DES_192_CBC3_SHA. I now have the RSA version
working, but in order to be avoid RSA royalties, I need to know how to
generate a certificate
How do i do it?
Which flag? Which header?
Looked in the FAQ, mod_ssl docs, but hard enough, maybe.
Apache 1.3.6 (Unix) mod_ssl/2.2.6 OpenSSL/0.9.2b
HTTP_USER_AGENT = Mozilla/4.61
SSL_CIPHER = EXP-RC4-MD5
SSL_CIPHER_ALGKEYSIZE = 128
SSL_CIPHER_EXPORT = true
SSL_CIPHER_USEKEYSIZE = 40
SSL_PROTOCOL
Roberto Lopez Navarro wrote:
>
> You were deadly right!!
>
> Thaks a lot.
>
> But why can't i do something like ca -cert_type [client, server, CA]?
>
> I think that openssl.cnf is designed to work like this, but it seems that ca
> doesn't care about it, or, more probably, I don't know how
You were deadly right!!
Thaks a lot.
But why can't i do something like ca -cert_type [client, server, CA]?
I think that openssl.cnf is designed to work like this, but it seems that ca
doesn't care about it, or, more probably, I don't know how to make it work.
The people at OpenCA has devel
Hi!
You can find a binary version of openssl-0.9.4 (openssl.exe + DLLs) for
win32 on ftp.replay.com (presently in /pub/crypto/incoming, will be shifted
to /pub/crypto/crypto/OpenSSL). If you intend to develop your own SSL-based
apps you can use the accompanying develop-version (binaries + headers
11 matches
Mail list logo