If you look in the gnu website you will find example code for Unix like
based systems. I did this about 12 years ago and it works well. What
the problem was back then is if we use the "fork"() model which to me makes
sense then OpenSSL was never designed for this so we have a clash.
OpenSSL will
Here's a weird one: A friend with a hotmail account tried to access same from
Netscape 4.6 Lo and behold the site:
www.hotmail.com offered a cert from RSA which netscape said it did not recognize as
coming from a recognized CA. I
checked this a couple times... We accepted the cert eventual
Here's another couple options:
1) www.thwaite.com
2) co-locate with a hosting company not in the USA.
On Mon, 29 Nov 1999 09:59:14 -0600, Leland V. Lammert wrote:
>At 03:54 AM 11/24/99 , you wrote:
>
>>Didn't mean for this to run on so, but it's now the wee hours of
>>a holiday
Sorry folks.
The legal issues are %100 percent accuarate. He is on the mark, and its better that
we listen than we challenge
On Mon, 22 Nov 1999 09:45:51 -0600, Leland V. Lammert wrote:
>Jeeze, boobie! Lighten UP!! There have been no court cases on the issue (are you a
>lawyer or a judge??)
I think the short answer is that the user won't know - this is the practical answer.
The technical answer is the the user must be
able to run an app such at MD5 against the browser code that will confirm that the
browser is legit. But of course the md5 app
might have been compromised and par
If RedHat does this - well - there is Suse, Debian, etc. Also we can go with
Apache/modssl and this is my prefered way
anyway... either that or twaite.
On Sat, 13 Nov 1999 15:32:18 -0600, William H. Geiger III wrote:
>In <[EMAIL PROTECTED]>, on 11/13/99
>
> at 10:47 AM, "Erik M. A. Klin
I created a self signed with the following command:
openssl x509 -req -days 365 -in blahcsr.pem -signkey blahkey.pem -out blahcert.pem
blahkey was created with the genrsa command.
Now, docs and info I can gleen state that the -signkey option causes the resulting
output file,
in this case "blah
Would sombody like to shoot Oracle Corp with a silver bullet?
On 21 Oct 1999 11:34:47 -0700, ORAPOST wrote:
>The included message could not be delivered to the following invalid mail names.
>Please verify these names and try them
again.
>
>Bad name: tphan
>
I realise there are lots of ways to get random data including mouse pointers, sound
cards, etc. Often the simplest solution is to
just poke in a card and be done with it.
A couple weeks ago I posted a message to the effect that if a card is a good solution,
we can probably build it. People h
I've been trying to create a proper cert file and so far I've been unable to do so. I
followed the procedures in mod_ssl.org and
that produces a version 3 cert file which to me appears to have the proper goodies in
it. However I have to admit that I'm too
new at this time to be able to tell.
I've been trying to create a proper cert file and so far I've been unable to do so. I
followed the procedures in mod_ssl.org and
that produces a version 3 cert file which to me appears to have the proper goodies in
it. However I have to admit that I'm too
new at this time to be able to tell.
commercial.
On Sat, 16 Oct 1999 20:18:35 -0400, Michael R. Batchelor wrote:
>>Would it make any sense to build a card?
>
>
>As a commercial product or a hobby project?
>
>MB
>
>__
>OpenSSL Project
Would it make any sense to build a card?
On Sat, 16 Oct 1999 11:25:14 -0400, Michael R. Batchelor wrote:
>>My point is not that it doesn't yield useful randomness but that the
>>assertion that it is _completely unpredictable_ is false. This is, of
>>course, quite different to the assertion tha
You know - this is a very good point!!!
On Thu, 14 Oct 1999 11:16:13 "GMT", amanda wrote:
>On Thu, 14 Oct 1999, Robert Sandilands wrote:
>
>> The best idea is to educate users to -not- run anything without the
>> administrators say so, and the administrator should by default say no.
>
>It is a
Well - to put it bluntly I was shocked when I saw it. I did consider that it might be
a coincidence and I've had .mil's come by
before for a visit - but I'd just finished watching a documentary about 3 weeks or so
before on the activities of the NSA and CES
in North America and when I saw tha
think is a good file - then openssl reads it but serv
fails.
The cert file I'm using is attached. Pass phrase is "Terrell Larson"
Thanx.
On Mon, 11 Oct 1999 16:03:10 -0400, Mordy Ovits wrote:
>
>Make sure that the file has proper CRLF. Make sure the first line has
>t
I'm trying to get the minimal client and server code running. It is found in
openssl-0.9.4/demos/ssl under the names of cli.cpp
and serv.cpp.
I've got the code compiled and linked, furthermore the cli.cpp code does seem to work.
Here's where I'm runnign into a problem.
With serv.cpp we need
My god, what a caustic response. Sorry to have hit such a raw nerve.
>military, and from this you draw a conclusion that there's worldwide
>conspiracy involving NSA? Man, that's too many X-Files I'd say.
__
OpenSSL Project
I believe you do not need a license for openssl in _ANY_ country in the world.
OpenSSL is open source and the copyright
specifically allows you to use it for whatever purposes you choose.
Secondly - there is the issue of export of any software you might create which may use
certain features
I'll speculate t the answer to this question is the same answer as to why IBM was so
successful selling mainframes for
decades. It was expalined to me this way: If you go out on a limb as a manager you
might make a breakthrough but the odds
are stacked against you. On the other hand if you
Aaron,
In your situation I would not risk it either - I agree that is simply is not worth it.
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTEC
dave - I agree with you 100%. I can ask my legal counsel for an opinion and they do
have a group that specializes in
specifically this area. If I have a chance I'll ask because it is related to an issue
that I'm dealing with and in my case if the
patent is a problem I'll simply avoid RSA.
22 matches
Mail list logo