Re: Substitute requests [Was: Practical CA problem - modified requests]

2001-08-25 Thread Andrew Cooke
At 10:03 PM 8/24/01 +0200, you wrote: On Fri, Aug 24, 2001 at 05:28:43PM +0100, Andrew Cooke wrote: What I should have asked is how to detect a *substitute* request. It will be self-consistent, but will not match the correct private key. One solution is to show that the certificate and

Re: Substitute requests [Was: Practical CA problem - modified requests]

2001-08-25 Thread Lutz Jaenicke
On Sat, Aug 25, 2001 at 07:41:08AM +0100, Andrew Cooke wrote: How does she create the fingerprint? - I looked and could not find a way to do it with openssl (only fingerprints for certificates seem to be supported). openssl md5 filename (or openssl sha1 fingerprint) Best regards,

Re: Substitute requests [Was: Practical CA problem - modified requests]

2001-08-25 Thread Andrew Cooke
Damn! Thanks! I was looking at openssl req (because openssl x509 or something similar does print a fingerprint). With that, I can fix things... Thanks again, Andrew At 08:50 AM 8/25/01 +0200, you wrote: On Sat, Aug 25, 2001 at 07:41:08AM +0100, Andrew Cooke wrote: How does she create the

decrypt the encrypted private key

2001-08-25 Thread Yu Tang
Dear All, I use openssl-0.9.6b. I want to encrypt the private key before outputing it, so I add the following item in my config file: [req] encrypt_key=yes Then I type the "req" command to generate the key and request file. openssl req -newkey rsa:1024 -keyout key.pem -out req.pem -config

Re: session reuse in client side

2001-08-25 Thread Lutz Jaenicke
On Fri, Aug 24, 2001 at 01:31:07PM -0700, Zhong Chen wrote: I need to reuse the session in ssl client side, I plan to do following: 1. store a database of destinataion host name versus session id (use LHASH) 2. retrieve the session id when user make a new connection based on host name, then

PKCS12 - PEM

2001-08-25 Thread Geert Van Muylem
Hi, Is there a tool to convert pkcs12 (private)keyfile into a PEM keyfile? Thanks, __ OpenSSL Project http://www.openssl.org User Support Mailing List[EMAIL PROTECTED]

Re: [Crypt::SSLeay] Using https proxy

2001-08-25 Thread Joshua Chamas
Bob Niederman wrote: etcetera., where $srvr is 'http://servername.domain/file' or 'https://servername.domain/file' Same general code works fileto the same boxes without proxy (different route not requiring proxy). Works fine for http, ethereal shows nothing leaving the box for https,

Re: decrypt the encrypted private key

2001-08-25 Thread Dr S N Henson
Yu Tang wrote: Dear All, I use openssl-0.9.6b. I want to encrypt the private key before outputing it, so I add the following item in my config file: [req] encrypt_key=yes Then I type the req command to generate the key and request file. openssl req -newkey rsa:1024 -keyout

Re: The same old self-signed CA problem!

2001-08-25 Thread Dr S N Henson
George Walsh wrote: This has been one long battle, made messy later on by my having to work backward from 0.6.6b to 0.9.6 in order to get a compile under UnixWare7.1.1 I have followed the advice Alex Pircher has kindly provided. Basically, that meant following through the creation of

Peer certificate verification

2001-08-25 Thread Steven E. Czerwinski
Hello - I'm trying to use the Net::SSL perl module to do a simple https request to PayPal.com. Everything seems to work fine, except I get the following message embedded in the response: Client-SSL-Warning: Peer certificate not verified Now, from how it looks, it is trying to tell me that