Re: comment on donations

2014-04-11 Thread Lou Picciano
Thanks, Steve, … for your hard work, and that of the other Team Members. This week's 'excitement' illustrates how important it us to all of us. (would be great to find a way around those 'hefty PayPal fees.) Lou Picciano - Original Message - From: "Steve Mar

Re: simple https client application

2013-09-18 Thread Lou Picciano
There are also some excellent modules for Python designed for exactly this. Very robust, well documented - core python functionality. httplib(2) comes to mind first. Lou Picciano - Original Message - From: "James Marshall" To: openssl-users@openssl.org Sent: Wednesday, Se

Re: Build iOS library of openssl 1.0.1e

2013-03-27 Thread Lou Picciano
our environment) Without getting back to my specific notes, believe there were a minor gotchas - like the script won't accommodate any spaces in directory names(imagine that!) - but it works great. Lou Picciano - Original Message - From: redpath To: openssl-users@openssl.org Sent: W

Re: Handshake failure while trying to connect to imap.gmail.com

2012-09-20 Thread Lou Picciano
Carlo, Have tried your same test with no error - using OpenSSL 0.9.8x: openssl s_client -connect imap.gmail.com:993 Lou Picciano - Original Message - From: "Carlo Wood" To: openssl-users@openssl.org Sent: Thursday, September 20, 2012 10:42:33 AM Subject: Re:

Re: Successfully building openssl-1.0.1 with Microsoft Visual Studio.

2012-03-27 Thread Lou Picciano
with the Windows Certificate Store via the capi engine - happen to have just been researching this. Seem dependent on proper compile, and proper configuration of OpenSSL in order to enable the engine, but it's in there. Lou Picciano

Re: [openssl-users] Re: stateOrProvinceName field problem when signing CSR

2011-12-16 Thread Lou Picciano
ser prompt indicates it expires in '365 days' - in fact, I've never seen it prompt with any number larger than 365 days! Not a huge problem, but... Lou Picciano - Original Message - From: "Erwann Abalea" To: openssl-users@openssl.org Cc: "Jakob

Re: [openssl-users] Re: stateOrProvinceName field problem when signing CSR

2011-12-16 Thread Lou Picciano
OK, Jakob - will try this. Tks for the feedback. (Seems we'd tried the 'utf8' option inline already, but will try again). and my 'read' of the -nameopt multiline config was that utf8 would be included, in absence of its specific de-activation, such as with the -utf

Re: stateOrProvinceName field problem when signing CSR

2011-12-16 Thread Lou Picciano
: Subject: organizationName = ESBJ\C3\96RN.com organizationalUnitName = Esbj\C3\B6rn-Th\C3\B6rstrom Group commonName = \C3\81ki Th\C3\B6rstrom Thanks, Lou Picciano - Original Message - From: "Jakob Bohm" To: openssl-users@openssl.org Sent: Friday, December 16, 2011

Re: Special character in CA name

2011-12-14 Thread Lou Picciano
as I understand it, using the utf8 option should allow any characters you might want. Let us know how you get on; I've had trouble with this, too... Lou Picciano - Original Message - From: "gkout" To: openssl-users@openssl.org Sent: Tuesday, December 13, 2011 5:35

Can the certificate expiration be queried directly?

2011-11-26 Thread Lou Picciano
Can a certificate's expiration date be queried directly? IE, apart from an expired cert being rejected out of hand, or from a CRL being read to determine a cert's validitiy...? I'm interested in reading the expiration from a loaded, currently-valid cert.

Re: Getting exp date from certificate?

2011-04-07 Thread Lou Picciano
Thanks, Victor - Time I started digging into the source code! L - Original Message - From: "Victor Duchovni" To: openssl-users@openssl.org Sent: Thursday, April 7, 2011 12:59:55 PM Subject: Re: Getting exp date from certificate? On Thu, Apr 07, 2011 at 04:50:19PM

Re: Getting exp date from certificate?

2011-04-07 Thread Lou Picciano
Friends, I must admit we've never had to do it before - Can we query the expiration date directly from a certificate, perhaps by using the ASN structure code? (Is there a map of the currently-vailable structure codes, as used by OpenSSL?)

Re: Truststore or Cacerts file?

2011-03-30 Thread Lou Picciano
ostgresql.util.PSQLException: The connection attempt failed.” Looks like it’s back to trolling other message lists! Thanks for your help, guys. From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] On Behalf Of Lou Picciano Sent: Wednesday, March 30, 201

Re: Truststore or Cacerts file?

2011-03-30 Thread Lou Picciano
is that you appear to be installing your 'user' cert (postgresql.crt) into the CAcerts store. This would not make sense. Lou Picciano - Original Message - From: "David Patricola" To: "Tomas Gustavsson" , openssl-users@openssl.org Sent: Wednesday

Re: Truststore or Cacerts file?

2011-03-29 Thread Lou Picciano
erver and client(s). Did not see you at PG East last week? Lou Picciano - Original Message - From: "David Patricola" To: openssl-users@openssl.org Sent: Tuesday, March 29, 2011 1:16:03 PM Subject: Truststore or Cacerts file? I have a postgres server running in SSL,

Re: Adding non-root certificates to the list of trusted certificates?

2011-02-10 Thread Lou Picciano
o the root store for that browser. This, then, would allow SSL to verify the Server's cert against this newly-installed CA cert. Thus, your chain is tested. Lou Picciano - Original Message - From: "Matthias Meixner" To: openssl-users@openssl.org Sent: Thursday, Februa

Re: First time attempting PostgreSQL SSL

2011-02-01 Thread Lou Picciano
nSSL list; not really the right place to get the advice you seek? (Am happy to help nonetheless... !) Let me know how you get on! (I will want to know the resolution of all this...) Lou Picciano --- Subject: RE: First time attempting PostgreSQL SSL My server pg_hba.conf file a

Re: First time attempting PostgreSQL SSL

2011-01-31 Thread Lou Picciano
time, is not for the faint of heart, if you have never done it before. It's a bit bigger than just setting the options in pg_hba.conf. Once you've verified SSL as a baseline, then you're ready to move on to certificates! Let me know! Lou Picciano - Original Message -

Re: First time attempting PostgreSQL SSL

2011-01-31 Thread Lou Picciano
hink you're not quite there yet. To get yourself going, why not first set up a pg_hba.conf configuration using hostssl, but skip the certificate usage for the moment... Probably a bit to handle all at once; SSL plus the certificate authentication all in one go... Lou Picciano -

Re: Compatibility/upgrade specific question with Apache

2010-09-10 Thread Lou Picciano
Hello Peter! (You're covering a few things at the same time there...) First off, there would normally be no problem at all running two discrete instances of Apache on the same machine, given that they'll be on separate ports. This is, of course, limited by constraints of the server's resour

Fully UTF8 Subject line? UTF8 commonName?

2010-08-19 Thread Lou Picciano
Dear SSLers, Can someone point us to a hard example of encoding fields within a cert in UTF8? Specifically, we'd like to sign our CSRs with a UTF8-content 'subject' line. Essentially, we're ttying to be sure we spell our users' names correctly! We've already experimented with the UTF encodi

Re: Simulating Mac keychain CSR with OpenSSL

2010-07-28 Thread Lou Picciano
Yes, and as long as we're on the that's-the-least-of-your-lockin-worries thread, you may want to be aware of this bit of news, just today: Significant Ruling by The Library of Congress: In Ruling on iPhones, Apple Loses a Bit of Its Grip Lou - Original Message - From: "Todd Oberly

Re: OpenSSL ca command handles -infiles option more carefully?

2010-04-26 Thread Lou Picciano
commands now, under OpenSSL v1.0.0, the '-infiles' switch appears to be behaving exactly as documented. Having said all this, I know there are those who feel that the ca command should be avoided altogether; my notes here are only for academic/historical(?) interest. Lou Pic

OpenSSL ca command handles -infiles option more carefully?

2010-04-25 Thread Lou Picciano
We've run into an interesting - apparently new? - behavior of the openssl ca command: I believe we've used the following command in the past (pre 1.0.0). (Don't know why we were still using the -infiles option with a single input file - something vestigial, no doubt; Nonetheless, I think it's

Google Chrome certificate idiosyncrasies?

2010-03-19 Thread Lou Picciano
Fellow OpenSSL-ers, We're beginning to look at an apparent discrepancy in the way Google Chrome (OS X) handles certificates. Though Chrome seems to use the same OS X-standard keychain application used by Safari, we are finding that Chrome reports the dreaded 'Handshake Re-negotiation' er

Re: Broadcom & OpenSSL support

2010-03-09 Thread Lou Picciano
Here's the link: http://software.intel.com/en-us/articles/intel-advanced-encryption-standard-aes-instructions-set/ Obviously, I can't speak to any prospective implementation OpenSSL might come up with, but one can only hope... ? Lou Picciano - Original Message - From

Re: Re-negotiation handshake failed: Not accepted by client with OpenSSL 0.98m-beta1

2010-01-24 Thread Lou Picciano
Steve, Tks for your work on this. The renegotiation error had been biting us lately as well... Lou - Original Message - From: "Dr. Stephen Henson" To: openssl-users@openssl.org Sent: Sunday, January 24, 2010 9:12:40 AM GMT -05:00 US/Canada Eastern Subject: Re: Re-negotiation h

Re: Re-negotiation handshake failed: Not accepted by client!?

2010-01-07 Thread Lou Picciano
s don't understand the concept of "security veil", the TLS implementations tend to provide a raw stream of bytes (akin to a read()/write() pair) without the application necessarily being aware of the change. -Kyle H On Thu, Jan 7, 2010 at 12:50 PM, Lou Picciano wrote: > Anyone ha

Re-negotiation handshake failed: Not accepted by client!?

2010-01-07 Thread Lou Picciano
Anyone have any ideas on this? Have recently updated an otherwise working environment to include openSSL v0.9.8l. Suddenly, mod_ssl is reporting: Re-negotiation handshake failed: Not accepted by client!? Other than a refresh of CRL, this configuration has been running AOK through openSSL 0.

Re: Problem building OpenSSL on Mac OS X with Kerberos support

2009-11-17 Thread Lou Picciano
For what it's worth, just built 1.0.0b4, with no problem, using only ./config - with no options passed. This is on OS X 10.6.2, Intel. We don't have a $PERL in our build environment - and why are you needing to pass all those options re Kerberos? Lou Picciano - Origin

Re: how to merge multiple public domain certs into one file?

2009-11-15 Thread Lou Picciano
l SSL domain setup must reference its own cert(s), how would this be accomplished if all your certs, for all domains, were consolidated into one big file? Lou Picciano - Original Message - From: "M C" To: openssl-users@openssl.org Sent: Saturday, November 14, 2009 12:56:09 P

Re: PKCS12 import error into MacOSX keychain access

2009-11-13 Thread Lou Picciano
e you sent... See _only_ the key... Lou Picciano - Original Message ----- From: "Midori Green" To: "Lou Picciano" Sent: Friday, November 13, 2009 5:15:41 PM GMT -05:00 US/Canada Eastern Subject: Re: PKCS12 import error into MacOSX keychain access > Doing som

Re: PKCS12 import error into MacOSX keychain access

2009-11-13 Thread Lou Picciano
(I guess I don't see the 'Use Case') Lou Picciano - Original Message - From: "Dr. Stephen Henson" To: openssl-users@openssl.org Sent: Friday, November 13, 2009 10:06:37 AM GMT -05:00 US/Canada Eastern Subject: Re: PKCS12 import error into MacOSX keychain ac

Re: PKCS12 import error into MacOSX keychain access

2009-11-13 Thread Lou Picciano
at, not key only... How does your p12 file perform in the 'verify' command? Please note that our key(s) is/are generated on UNIX, and are copied directly over to Mac(s) via various filesharing mechanisms or SCP. Lou Picciano - Original Message - From: "Midori Green"

Re: PKCS12 import error into MacOSX keychain access

2009-11-12 Thread Lou Picciano
this is produced on Solaris, and transferred without any further EOL or EOF futzing; works without issue. Please let us know how we can help. Always eager to help a fellow Mac user. Lou Picciano - Original Message - From: "Midori Green" To: openssl-users@openssl.org Sent: Th

Re: Certificate Revocation Lists and Apache...

2009-11-04 Thread Lou Picciano
We were getting the no certificate returned error when signing the cert with the notAfter field (this was in a PostgreSQL context, if it matters). The -verify command reported: error 14 at 0 depth lookup:format error in certificate's notAfter field re-signing the cert with the -days x option