s said about CA certificates with SHA1 signatures and some
> implementations will now reject these as non-compliant even if they were
> issued before 2013.
>
> On Thu, 2022-05-12 at 17:40 +0200, egoitz--- via openssl-users wrote:
>
> Please ignore the line below I said regards in
Please ignore the line below I said regards in my previous mail... it's
there by error...
cheers!
El 2022-05-12 17:38, ego...@ramattack.net escribió:
> Good afternoon,
>
> I'm running a CA, for generating the certificates for the backup clients of
> my network and for the backup servers
Good afternoon,
I'm running a CA, for generating the certificates for the backup clients
of my network and for the backup servers too. The certificates are used
for encrypting the backups stored in the servers and too, for
comunicating over TLS between severs and clients.
This CA has some
Good morning,
We are running our own home ca, for generating certificates for our
backup system. The new operating systems being recently backed up, have
started saying :
_OPENSSL.C:67-0 JCR=0 ERROR LOADING CERTIFICATE FILE:
ERR=ERROR:140AB18E:SSL ROUTINES:SSL_CTX_USE_CERTIFICATE:CA MD TOO
Doing certs
Segmentation Fault - core dumped
RegTP-5R.pem = .0
Segmentation Fault - core dumped
WARNING: Skipping duplicate certificate RegTP-6R.pem
Segmentation Fault - core dumped
[snip]
# ./apps/openssl
Segmentation Fault (core dumped)
# gdb ./apps/openssl
This GDB was configured
On Tue, 30 Oct 2007, [EMAIL PROTECTED] wrote:
Hi
I have one worrying question... I have generated my keys and ca and all
with easy-rsa package and he has generated 1024 bit rsa keys... but as
far
as I have seen openvpn is using blowfish... blowfish in a symetric
encription cypher and rsa
Hi
I have one worrying question... I have generated my keys and ca and all
with easy-rsa package and he has generated 1024 bit rsa keys... but as far
as I have seen openvpn is using blowfish... blowfish in a symetric
encription cypher and rsa is an asymetrical one... shouldn't match keys
and