Hi,all
We want to use private and public key created by ourself instead
of geting them from CA center. Is there any good tools can do this.
Thanks.
--
--
* ZhouZhihai *
* DASCOM Elec.
Depends what type of keys:
OpenSSL comes with all the parts to create your own public and private
keys, that's if you are using Un*x. But its non-commercial use only.
http://www.openssl.org (but it appears to be down ATM)
AFAIK: You would generally create your own keys, and just get them
signed
Greets,
Check out openssl at http://www.openssl.org
Hope this helps
- Bennett
At 01:21 PM 9/16/99 +0800, sailor manipulated the electrons to say:
Hi,all
We want to use private and public key created by ourself instead
of geting them from CA center. Is there any good tools can do this.
Chris,
At last, someone with the same problem as I have. Here is what I've tried and
what
I'm about to try.
First attempt
--
We use securid to validate users (Notes pass through and Citrix Client) I set
up a
MS reverse proxy to forward web requests to the notes server.
Is there an remote encrypted client for your current firewall? That
way they could dial a local ISP, and not have to pay for the long
distance call. You also would not have passwords sitting on someone's
"secure" web site, like Hotmail.
Pete Goodridge
Abt
The most common solution you'll see on this list is the establishment of a
DMZ by adding a third Network Card to the Firewall.
|
Internet
|
Router
|
Firewall - - - DMZ - - - SMTP Host
|
Intranet
This way if your SMTP Host is compromised your internal network isn't.
Pop3 can be used with SSL. You can obtain a difgital ID, open the POP3 SSL
port - I forget whch port number.
Obtaining a digital ID may be complicated by the fact that you are an
international, non-US entity. (I'm not certain of that, but it is certainly
the impression the NSA would like me to
Chris Knox enscribed thusly:
My company is scattered across North and South America, Europe, Asia,
Australia and the Pacific Rim. We currently use Notes for internal
email but the size of the data transfers while databases synch up has
caused some very expensive phone calls. We're
I am a student of final year Computer Engineering
doing a project on Firewall.
How should I go about building a firewall.
__
Do You Yahoo!?
Bid and sell for free at http://auctions.yahoo.com
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
NetWare 5 will do what you want. Could be quite an investment, however.
Here is a quote from http://www.novell.com/catalog/bg/bge14102.html
Use PKIS to Manage Public-Key Cryptography and Digital Certificates within
NDS
Public Key Infrastructure Services (PKIS) is a set of services
On Tue, 14 Sep 1999, Ryan Russell wrote:
and peripherals to an LPAR. And the LPARs can then be completely
invisible to the others. They are just like two physically separated
machines.
You hope. This is where security holes come in. You will not achieve the
same level of security as
Buy the book from O'Reilly Associates, Inc.
Building Internet Firewalls
Chapman Zwicky
ISBN # 1-56592-124-0
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of Sushant Lotlikar
Sent: Thursday, September 16, 1999 8:25 AM
To: fire
Subject:
I am a student
While I agree that what I did was immature and slightly inappropriate to
send to the entire list, I believe it served its purpose to expose the fact
that firewalls are not the only form of protection required to prevent
access to your internal network.
I alluded no information that wasn't
Failed first time I sent it ...
--- Forwarded Message Follows ---
Date sent: Thu, 16 Sep 1999 12:47:34 -0400
From: [EMAIL PROTECTED]
Subject: Transient Delivery Failure
To: [EMAIL PROTECTED]
Send reply to: [EMAIL PROTECTED]
The attached message
I'm new to firewalls and there are some things I still don't quite
understand,
Would there be any dangers with setting up an FTP site on a machine that is
running MS Proxy Server?
thanks,
Jose Romero
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body
[EMAIL PROTECTED] wrote
Obtaining a digital ID may be complicated by the fact that you are an
international, non-US entity. (I'm not certain of that, but it is certainly
the impression the NSA would like me to have.)
You can generate your own certificate and self-sign it for the SSLized
POP
I personally would prefer to use https rather then one of the tunnel
clients for the firewall. i don't trust the remote users to secure their
machines enough.
While hotmail had (has??) significant security problems, I don't think
those problems are becouse of the web access, I believe they were
First of all a heartly Thank You for replying to my e-mail on Building
a Firewall
I have the book Building Internet Firewalls by O'Reilly(as some you had
mentioned)
What NEXT ?
===
Sushant P. Lotlikar
Sardar Patel College of Engineering(Mumbai-India)
Tel - 8091670
Homepage -
Can anybody point me to a reference or how to guide
for doing a security assessment on an Oracle Database
configuration.
Thanks for your help -Art
===
Art Coble
International Network Services
Senior Network Consultant
Email: [EMAIL PROTECTED]
Page:
From a security standpoint, is it acceptable to expose a router interface to
the Internet where the Internet and private network are on the same physical
circuit?
Quick background: Our carrier cannot provide a channelized frame relay
circuit, so we must bring their single circuit containing our
1 - MS Proxy is not a firewall
2 - ftp on a firewall is BAD - clear text authentication to a firewall is a bad
thing.
"Romero-Lobo, Jose" wrote:
I'm new to firewalls and there are some things I still don't quite
understand,
Would there be any dangers with setting up an FTP site on a
You might consider this a danger: passwords will be passed in plain text.
Brian Steele
- Original Message -
From: Romero-Lobo, Jose [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Thursday, September 16, 1999 3:04 PM
Subject: ftp server on a firewall
I'm new to firewalls and there are
22 matches
Mail list logo