not to trust them as a CA. It's that above step,
while easy enough to do, that is solved by getting your
cert into the Netscape and IE distributions, which appear
for all practical purposes to have been locked down at this point.
Thomas
-
SSL Project http://www.openssl.org
> User Support Mailing List[EMAIL PROTECTED]
> Automated List Manager [EMAIL PROTECTED]
--
Thomas Reinke
_
> OpenSSL Project http://www.openssl.org
> User Support Mailing List[EMAIL PROTECTED]
> Automated List Manager [EMAIL PROTECTED]
--
----
Thomas Rei
, to
> okay business transactions and the like. It seems extremely easy to copy
> and redistribute one's keys so how exactly does this
> give the server authentication?
>
> TIA,
> brian
>
>
--
Thomas Reinke
[EMAIL PROTECTED]
> Automated List Manager [EMAIL PROTECTED]
--
--------
Thomas ReinkeTel: (905) 331-2260
Director of Technology Fax: (905) 331-2504
E-Soft Inc.
[EMAIL PROTECTED]
> >Automated List Manager [EMAIL PROTECTED]
>
> __
> OpenSSL Project http://www.openssl.org
> User Support Mailing List[EMAIL PROTECTED]
_
> OpenSSL Project http://www.openssl.org
> User Support Mailing List[EMAIL PROTECTED]
> Automated List Manager [EMAIL PROTECTED]
o can authenticate themselves to you.
--
--------
Thomas ReinkeTel: (905) 331-2260
Director of Technology Fax: (905) 331-2504
E-Soft Inc. http://www.e-softinc.com
Support Mailing List[EMAIL PROTECTED]
> >Automated List Manager [EMAIL PROTECTED]
>
> ______
> OpenSSL Project http://www.openssl.org
> User Sup
[EMAIL PROTECTED] wrote:
>
> So it seems to me that while the cert may certify that said organization
> is who they say they are - nobody seems to ask if who they say they are
> has any relevance to anything.
[snip]
Look back to the problem it is solving
a) SSL makes sure no-one can interc
rt Mailing List[EMAIL PROTECTED]
> Automated List Manager [EMAIL PROTECTED]
--
--------
Thomas ReinkeTel: (905) 331-2260
Director of Technology
http://www.openssl.org
> User Support Mailing List[EMAIL PROTECTED]
> Automated List Manager [EMAIL PROTECTED]
--
--------
Thomas Reinke
http://www.openssl.org
> User Support Mailing List[EMAIL PROTECTED]
> Automated List Manager [EMAIL PROTECTED]
--
Thomas ReinkeTel: (905) 331-2260
D
from technical and/or experienced people!!! :-D
>
> C'you,
>
> Massimiliano Pala ([EMAIL PROTECTED])
--
--------
Thomas ReinkeTel: (905) 331-2260
Director of Technology Fax
> Rene G. Eberhard
> Mail : [EMAIL PROTECTED]
--
Thomas ReinkeTel/Fax: (905) 331-2260
Director of Technology
Thanks for the reply. For the most part, I think I understand what
you're saying, except that I have one gap in my knowledge.
If I can bother you to complete one more little gap in my
ignorance:
In chain verification, (ala Netscape), wouldn't the browser still
need to be able to get its hands on
Dr Stephen Henson wrote:
>
> Thomas Reinke wrote:
> >
> > Ok...a touch more information - the problem I think I have
> > is that the cert I want to validate has a authorityKeyIdentifier,
> > but none of the certs in the cert stores I am using have a
> > S
Dr Stephen Henson wrote:
>
> Thomas Reinke wrote:
> >
> > Ok...a touch more information - the problem I think I have
> > is that the cert I want to validate has a authorityKeyIdentifier,
> > but none of the certs in the cert stores I am using have a
> > Subjec
f 1", means that it
can't verify the CA's cert, which I can understand, since I
can't manually validate the #$%^& thing either.
Am I brain dead? What am I missing
Thomas Reinke wrote:
>
> I'm looking for, as a starter, a birds eye view of some
> docs (or high
se of ;-)
Thanks, Thomas
--
--------
Thomas ReinkeTel: (416) 460-7021
Director of Technology Fax: (416) 598-2319
E-Soft Inc. http://www.e-softinc.com
_
Sb/PYJ8=
> __
> OpenSSL Project http://www.openssl.org
> User Support Mailing List[EMAIL PROTECTED]
> Automated List Manager [EMAIL PROTECTED]
--
--
__
> OpenSSL Project http://www.openssl.org
> User Support Mailing List[EMAIL PROTECTED]
> Automated List Manager [EMAIL PROTECTED]
--
--
__
> OpenSSL Project http://www.openssl.org
> User Support Mailing List[EMAIL PROTECTED]
> Automated List Manager [EMAIL PROTECTED]
--
: +49 271 48950-50
> __
> OpenSSL Project http://www.openssl.org
> User Support Mailing List[EMAIL PROTECTED]
> Automated List Manager [EMAIL
ist[EMAIL PROTECTED]
> Automated List Manager [EMAIL PROTECTED]
--
----
Thomas ReinkeTel: (416) 460-7021
Director of Technology Fax: (416) 5
eamwvr.com/mandrake/mandrake-dist.html>
> "As Unique as the Company You Keep.""===0 PGP Key Available
>
>
>
> __
> OpenSSL Project http://www.openssl.org
> User Support Mailing List[EMAIL PR
yway when it ran.
>
> I also copied the include directory openssl onto VC++'s, include tree.
> And make some modifications in the #include statements in order to use
> winsock. Oh, and also changed close() to closesocket(). And that's all.
>
> Help pleez? Pretty pleez?
> ________
or
> Tel: +1-514-868-7813
> Fax: +1-514-868-8357
>
> __
> OpenSSL Project http://www.openssl.org
> User Support Mailing List[EMAIL PROTECTED
http://www.openssl.org
> User Support Mailing List[EMAIL PROTECTED]
> Automated List Manager [EMAIL PROTECTED]
--
Thomas ReinkeTel: (416) 460-7021
Director
_
> OpenSSL Project http://www.openssl.org
> User Support Mailing List[EMAIL PROTECTED]
> Automated List Manager [EMAIL PROTECTED]
--
---
User Support Mailing List[EMAIL PROTECTED]
> Automated List Manager [EMAIL PROTECTED]
Thomas ReinkeTel: (416) 460-7021
Director of Technology
Juergen Rensen wrote:
>
> M2c: Credit card organizations and banks have successfully generated the
> image that strong encryption protecting from fraudaulent use of credit
> cards is solely in the interest of the customer. What the customer is
Hmm...I suspect its actually in the interest of t
http://www.openssl.org
> User Support Mailing List[EMAIL PROTECTED]
> Automated List Manager [EMAIL PROTECTED]
----
Thomas ReinkeTel:
Disable the MONOLITH macro. This will cause all apps to be built
as separate, stand alone programs.
[EMAIL PROTECTED] wrote:
>
> hi,
> I am using the ssleay0.8.1 for the first time.all the applications
> are built into the one program, ssleay, but I want to built The
> applicatons "req"(apps
__
> OpenSSL Project http://www.openssl.org
> User Support Mailing List[EMAIL PROTECTED]
> Automated List Manager
I'm somewhat surprised that you get as far as you indicate - "-quiet"
is modifying the behaviour somewhat. When you run s_client without
it, it will always terminate before getting the http response.
This is because s_client is designed to terminate whenever it
gets an EOF on stdin. When you pipe
What you're basically saying is that if someone can sniff packets, and
brute force their way into decrypting the information, is their
data safe, and is this a possible scenario.
No, their data won't be safe. Yes, this is possible. There are
plenty of studies that have shown how much computing po
GmbH email: [EMAIL PROTECTED]
> Am Werder 1
> 21073 Hamburg, Germany
--
Thomas ReinkeTel: (416) 460-7021
Director of Technology
38 matches
Mail list logo