Seeking advice on document

2006-11-23 Thread Stephen Liu
Hi folks, Ubuntu-6.06.1-LAMP-server-amd64 Apache2 SSL I'm installing/config a web/apache2 server for experiment/testing and encountering difficulty on googling document. Either the document found is out off day or not for Ubuntu. I found following document; Apache 2 with SSL/TLS: Step-by-Step,

Re: PKI design question

2006-11-23 Thread Victor Duchovni
On Thu, Nov 23, 2006 at 06:46:23PM -0300, Mart?n Coco wrote: > My main goal is to design a PKI for our server infrastructure (ldaps, > https, mail, vpn, etc.) The problem is that, for example, when reading > the mentioned book, all the examples are based on people, but not on > systems or services

RE: WIN32 winsock vs winsock2 coexistence?

2006-11-23 Thread Brown, Michael A
Thanks for your thoughts, William. I confess I'm still uneasy. Actually, I'm coming not so much from a Unix perspective as from a Windows perspective where we've dealt with dueling DLLs and DLL Hell for years. I don't recall previously looking at an app (single .exe file) where different compo

Re: PKI design question

2006-11-23 Thread Bernhard Froehlich
Martín Coco wrote: Hi, [...] I've been reading the man for OpenSSL, this mailing list, and also acquired the book "Planning for PKI". I've not read the book. Maybe I can nevertheless give you some helpful hints. My main goal is to design a PKI for our server infrastructure (ldaps, https, ma

Re: PKI design question

2006-11-23 Thread Patrick Patterson
Hi Martin: On Thursday 23 November 2006 16:46, Martín Coco wrote: > Hi, > > We're in the process of designing a PKI infrastracture for our company, > and I have a couple of design questions about it. I know this is an > OpenSSL mailing list, but it seems a right place to discuss this. If > it's no

Re: ECC curve problem

2006-11-23 Thread Nils Larsch
Abhishek Tripathi wrote: Hi Nils, Now you got my point but the code on which I am working uses the too much internals of those structures .That why I needed the change log.In old OpenSSL code for the EC_KEY_METH_DATA they used some ECDSA_DATA_new() as follows EC_KEY *key ;

PKI design question

2006-11-23 Thread Martín Coco
Hi, We're in the process of designing a PKI infrastracture for our company, and I have a couple of design questions about it. I know this is an OpenSSL mailing list, but it seems a right place to discuss this. If it's not, I'll appreciate if you can hand me some links to a more proper place. I've

Access violation when stopping a handshake in progress

2006-11-23 Thread Andrew Dennison
I have an application with a timeout feature on the connection handshake. Recently, the timeout was exercised and it generated an access violation in SSLEAY32.DLL. First, a bit of background. The implementation in question uses a non-blocking socket. The actual process of connection occurs in i

Re: best practices application design question

2006-11-23 Thread Victor Duchovni
On Thu, Nov 23, 2006 at 08:51:20AM -0500, Chris Covington wrote: > My thoughts were in this scenario, the best way to implement (HTTPS) > SSL/TLS would be for Server A (with a server certificate) to only > accept HTTPS connections from Servers 1, 2, 3, etc. who have valid > client certificates, ra

Re: WIN32 winsock vs winsock2 coexistence?

2006-11-23 Thread William A. Rowe, Jr.
Brown, Michael A wrote: > I’m looking at an app where the app and all libs/DLLs it uses EXCEPT > openssl use ws2_32, and openssl uses wsock32. Is this a problem or can > the two coexist peacefully? It makes me somewhat uneasy. Well, using winsock period makes me uneasy ;-) Seriously - no - there'

Re: best practices application design question

2006-11-23 Thread Goetz Babin-Ebell
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Chris Covington schrieb: > Hi all, Hello Chris, > Suppose one wants to secure a server application which accepts > incoming HTTPS connections from anywhere. We'll call this Server A. > This server application is intended to only accept connections fr

best practices application design question

2006-11-23 Thread Chris Covington
Hi all, I made the classic newbie mistake of asking how to solve a particular pointed implementation detail without explaining the overall problem that I'm trying to solve. Suppose one wants to secure a server application which accepts incoming HTTPS connections from anywhere. We'll call this S