Re: howto get IE & Netscape to accept CA?

2000-06-14 Thread Thomas Reinke
not to trust them as a CA. It's that above step, while easy enough to do, that is solved by getting your cert into the Netscape and IE distributions, which appear for all practical purposes to have been locked down at this point. Thomas -

Re: sample client

2000-05-28 Thread Thomas Reinke
SSL Project http://www.openssl.org > User Support Mailing List[EMAIL PROTECTED] > Automated List Manager [EMAIL PROTECTED] -- Thomas Reinke

Re: Using s_client from cmd line

2000-05-26 Thread Thomas Reinke
_ > OpenSSL Project http://www.openssl.org > User Support Mailing List[EMAIL PROTECTED] > Automated List Manager [EMAIL PROTECTED] -- ---- Thomas Rei

Re: Client Authentication??

2000-04-25 Thread Thomas Reinke
, to > okay business transactions and the like. It seems extremely easy to copy > and redistribute one's keys so how exactly does this > give the server authentication? > > TIA, > brian > > -- Thomas Reinke

Re: super-certs

2000-04-21 Thread Thomas Reinke
[EMAIL PROTECTED] > Automated List Manager [EMAIL PROTECTED] -- -------- Thomas ReinkeTel: (905) 331-2260 Director of Technology Fax: (905) 331-2504 E-Soft Inc.

Re: Key storage

2000-04-21 Thread Thomas Reinke
[EMAIL PROTECTED] > >Automated List Manager [EMAIL PROTECTED] > > __ > OpenSSL Project http://www.openssl.org > User Support Mailing List[EMAIL PROTECTED]

Re: super-certs

2000-04-21 Thread Thomas Reinke
_ > OpenSSL Project http://www.openssl.org > User Support Mailing List[EMAIL PROTECTED] > Automated List Manager [EMAIL PROTECTED]

Re: SSL Client in Hostile Environment

2000-04-21 Thread Thomas Reinke
o can authenticate themselves to you. -- -------- Thomas ReinkeTel: (905) 331-2260 Director of Technology Fax: (905) 331-2504 E-Soft Inc. http://www.e-softinc.com

Re: How can I avoid "PEM pass phrase"

2000-04-11 Thread Thomas Reinke
Support Mailing List[EMAIL PROTECTED] > >Automated List Manager [EMAIL PROTECTED] > > ______ > OpenSSL Project http://www.openssl.org > User Sup

Re: Verisign/NSI/Thawte monopoly

2000-03-30 Thread Thomas Reinke
[EMAIL PROTECTED] wrote: > > So it seems to me that while the cert may certify that said organization > is who they say they are - nobody seems to ask if who they say they are > has any relevance to anything. [snip] Look back to the problem it is solving a) SSL makes sure no-one can interc

Re: how to convert Netscape's cert7.db to PEM?

2000-02-17 Thread Thomas Reinke
rt Mailing List[EMAIL PROTECTED] > Automated List Manager [EMAIL PROTECTED] -- -------- Thomas ReinkeTel: (905) 331-2260 Director of Technology

Re: PEM pass phrase

2000-01-27 Thread Thomas Reinke
http://www.openssl.org > User Support Mailing List[EMAIL PROTECTED] > Automated List Manager [EMAIL PROTECTED] -- -------- Thomas Reinke

Re: [apache-ssl] Trust problem with verisign certificate

2000-01-11 Thread Thomas Reinke
http://www.openssl.org > User Support Mailing List[EMAIL PROTECTED] > Automated List Manager [EMAIL PROTECTED] -- Thomas ReinkeTel: (905) 331-2260 D

Re: Seeking officers for Free-software-friendly CA

1999-12-22 Thread Thomas Reinke
from technical and/or experienced people!!! :-D > > C'you, > > Massimiliano Pala ([EMAIL PROTECTED]) -- -------- Thomas ReinkeTel: (905) 331-2260 Director of Technology Fax

Re: Getting root certs

1999-11-30 Thread Thomas Reinke
> Rene G. Eberhard > Mail : [EMAIL PROTECTED] -- Thomas ReinkeTel/Fax: (905) 331-2260 Director of Technology

Re: Authority Key and Verifying a Cert

1999-10-06 Thread Thomas Reinke
Thanks for the reply. For the most part, I think I understand what you're saying, except that I have one gap in my knowledge. If I can bother you to complete one more little gap in my ignorance: In chain verification, (ala Netscape), wouldn't the browser still need to be able to get its hands on

Re: Authority Key and Verifying a Cert

1999-10-05 Thread Thomas Reinke
Dr Stephen Henson wrote: > > Thomas Reinke wrote: > > > > Ok...a touch more information - the problem I think I have > > is that the cert I want to validate has a authorityKeyIdentifier, > > but none of the certs in the cert stores I am using have a > > S

Re: Authority Key and Verifying a Cert

1999-10-05 Thread Thomas Reinke
Dr Stephen Henson wrote: > > Thomas Reinke wrote: > > > > Ok...a touch more information - the problem I think I have > > is that the cert I want to validate has a authorityKeyIdentifier, > > but none of the certs in the cert stores I am using have a > > Subjec

Re: Authority Key and Verifying a Cert

1999-10-05 Thread Thomas Reinke
f 1", means that it can't verify the CA's cert, which I can understand, since I can't manually validate the #$%^& thing either. Am I brain dead? What am I missing Thomas Reinke wrote: > > I'm looking for, as a starter, a birds eye view of some > docs (or high

Authority Key and Verifying a Cert

1999-10-05 Thread Thomas Reinke
se of ;-) Thanks, Thomas -- -------- Thomas ReinkeTel: (416) 460-7021 Director of Technology Fax: (416) 598-2319 E-Soft Inc. http://www.e-softinc.com _

Re: Is it a standard private key structure?

1999-08-20 Thread Thomas Reinke
Sb/PYJ8= > __ > OpenSSL Project http://www.openssl.org > User Support Mailing List[EMAIL PROTECTED] > Automated List Manager [EMAIL PROTECTED] -- --

Re: Netscape and demo server problem

1999-08-19 Thread Thomas Reinke
__ > OpenSSL Project http://www.openssl.org > User Support Mailing List[EMAIL PROTECTED] > Automated List Manager [EMAIL PROTECTED] -- --

Re: ? Connect to https://banking.wellsfargo.com/

1999-08-15 Thread Thomas Reinke
__ > OpenSSL Project http://www.openssl.org > User Support Mailing List[EMAIL PROTECTED] > Automated List Manager [EMAIL PROTECTED] --

Re: Scripting of s_client

1999-07-22 Thread Thomas Reinke
: +49 271 48950-50 > __ > OpenSSL Project http://www.openssl.org > User Support Mailing List[EMAIL PROTECTED] > Automated List Manager [EMAIL

Re: SSL an multi-threads

1999-07-06 Thread Thomas Reinke
ist[EMAIL PROTECTED] > Automated List Manager [EMAIL PROTECTED] -- ---- Thomas ReinkeTel: (416) 460-7021 Director of Technology Fax: (416) 5

Re: source for PC

1999-07-05 Thread Thomas Reinke
eamwvr.com/mandrake/mandrake-dist.html> > "As Unique as the Company You Keep.""===0 PGP Key Available > > > > __ > OpenSSL Project http://www.openssl.org > User Support Mailing List[EMAIL PR

Re: [Fwd: Stumped Newbie] Additional Info

1999-07-01 Thread Thomas Reinke
yway when it ran. > > I also copied the include directory openssl onto VC++'s, include tree. > And make some modifications in the #include statements in order to use > winsock. Oh, and also changed close() to closesocket(). And that's all. > > Help pleez? Pretty pleez? > ________

Re: openssl and WebSite

1999-06-30 Thread Thomas Reinke
or > Tel: +1-514-868-7813 > Fax: +1-514-868-8357 > > __ > OpenSSL Project http://www.openssl.org > User Support Mailing List[EMAIL PROTECTED

Re: certificates of major CAs

1999-06-25 Thread Thomas Reinke
http://www.openssl.org > User Support Mailing List[EMAIL PROTECTED] > Automated List Manager [EMAIL PROTECTED] -- Thomas ReinkeTel: (416) 460-7021 Director

Re: Certificates and Pass Phrases.

1999-06-10 Thread Thomas Reinke
_ > OpenSSL Project http://www.openssl.org > User Support Mailing List[EMAIL PROTECTED] > Automated List Manager [EMAIL PROTECTED] -- ---

Re: a simple and very rediculous problem.. i think.

1999-05-13 Thread Thomas Reinke
User Support Mailing List[EMAIL PROTECTED] > Automated List Manager [EMAIL PROTECTED] Thomas ReinkeTel: (416) 460-7021 Director of Technology

Re: Verisgin Global ID cert chains question

1999-04-23 Thread Thomas Reinke
Juergen Rensen wrote: > > M2c: Credit card organizations and banks have successfully generated the > image that strong encryption protecting from fraudaulent use of credit > cards is solely in the interest of the customer. What the customer is Hmm...I suspect its actually in the interest of t

Re: Y2K compliance?

1999-04-20 Thread Thomas Reinke
http://www.openssl.org > User Support Mailing List[EMAIL PROTECTED] > Automated List Manager [EMAIL PROTECTED] ---- Thomas ReinkeTel:

Re: how to build the "req" programm stand alone?

1999-03-14 Thread Thomas Reinke
Disable the MONOLITH macro. This will cause all apps to be built as separate, stand alone programs. [EMAIL PROTECTED] wrote: > > hi, > I am using the ssleay0.8.1 for the first time.all the applications > are built into the one program, ssleay, but I want to built The > applicatons "req"(apps

Re: Server cert or site cert ?

1999-03-12 Thread Thomas Reinke
__ > OpenSSL Project http://www.openssl.org > User Support Mailing List[EMAIL PROTECTED] > Automated List Manager

Re: Idea/example needed (s_client)

1999-03-12 Thread Thomas Reinke
I'm somewhat surprised that you get as far as you indicate - "-quiet" is modifying the behaviour somewhat. When you run s_client without it, it will always terminate before getting the http response. This is because s_client is designed to terminate whenever it gets an EOF on stdin. When you pipe

Re: SSL-40bit : Attack-Scenario

1999-02-24 Thread Thomas Reinke
What you're basically saying is that if someone can sniff packets, and brute force their way into decrypting the information, is their data safe, and is this a possible scenario. No, their data won't be safe. Yes, this is possible. There are plenty of studies that have shown how much computing po

Re: Legal to use OpenSSL ?

1999-02-10 Thread Thomas Reinke
GmbH email: [EMAIL PROTECTED] > Am Werder 1 > 21073 Hamburg, Germany -- Thomas ReinkeTel: (416) 460-7021 Director of Technology