find tools to create pair of public and private key.

1999-09-16 Thread sailor
Hi,all We want to use private and public key created by ourself instead of geting them from CA center. Is there any good tools can do this. Thanks. -- -- * ZhouZhihai * * DASCOM Elec.

Re: find tools to create pair of public and private key.

1999-09-16 Thread Dorian Moore
Depends what type of keys: OpenSSL comes with all the parts to create your own public and private keys, that's if you are using Un*x. But its non-commercial use only. http://www.openssl.org (but it appears to be down ATM) AFAIK: You would generally create your own keys, and just get them signed

Re: find tools to create pair of public and private key.

1999-09-16 Thread Bennett Samowich
Greets, Check out openssl at http://www.openssl.org Hope this helps - Bennett At 01:21 PM 9/16/99 +0800, sailor manipulated the electrons to say: Hi,all We want to use private and public key created by ourself instead of geting them from CA center. Is there any good tools can do this.

Re: Marginally on-topic -- Secure remote email access

1999-09-16 Thread Rory Rogerson
Chris, At last, someone with the same problem as I have. Here is what I've tried and what I'm about to try. First attempt -- We use securid to validate users (Notes pass through and Citrix Client) I set up a MS reverse proxy to forward web requests to the notes server.

Re[2]: Marginally on-topic -- Secure remote email access

1999-09-16 Thread Pete Goodridge
Is there an remote encrypted client for your current firewall? That way they could dial a local ISP, and not have to pay for the long distance call. You also would not have passwords sitting on someone's "secure" web site, like Hotmail. Pete Goodridge Abt

RE: Implementation question

1999-09-16 Thread Sweeney, Patrick
The most common solution you'll see on this list is the establishment of a DMZ by adding a third Network Card to the Firewall. | Internet | Router | Firewall - - - DMZ - - - SMTP Host | Intranet This way if your SMTP Host is compromised your internal network isn't.

RE: Marginally on-topic -- Secure remote email access

1999-09-16 Thread Sweeney, Patrick
Pop3 can be used with SSL. You can obtain a difgital ID, open the POP3 SSL port - I forget whch port number. Obtaining a digital ID may be complicated by the fact that you are an international, non-US entity. (I'm not certain of that, but it is certainly the impression the NSA would like me to

Re: Marginally on-topic -- Secure remote email access

1999-09-16 Thread Michael H. Warfield
Chris Knox enscribed thusly: My company is scattered across North and South America, Europe, Asia, Australia and the Pacific Rim. We currently use Notes for internal email but the size of the data transfers while databases synch up has caused some very expensive phone calls. We're

No Subject

1999-09-16 Thread Sushant Lotlikar
I am a student of final year Computer Engineering doing a project on Firewall. How should I go about building a firewall. __ Do You Yahoo!? Bid and sell for free at http://auctions.yahoo.com - [To unsubscribe, send mail to [EMAIL PROTECTED] with

Re: find tools to create pair of public and private key.

1999-09-16 Thread Bruce Bauer
NetWare 5 will do what you want. Could be quite an investment, however. Here is a quote from http://www.novell.com/catalog/bg/bge14102.html Use PKIS to Manage Public-Key Cryptography and Digital Certificates within NDS Public Key Infrastructure Services (PKIS) is a set of services

Re: IBM Mainframe LPAR isolation (security?)

1999-09-16 Thread Vinci Chou
On Tue, 14 Sep 1999, Ryan Russell wrote: and peripherals to an LPAR. And the LPARs can then be completely invisible to the others. They are just like two physically separated machines. You hope. This is where security holes come in. You will not achieve the same level of security as

RE:

1999-09-16 Thread Robert Driscoll
Buy the book from O'Reilly Associates, Inc. Building Internet Firewalls Chapman Zwicky ISBN # 1-56592-124-0 -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]On Behalf Of Sushant Lotlikar Sent: Thursday, September 16, 1999 8:25 AM To: fire Subject: I am a student

RE: Please try to break into my network? was Re: Firewalls-Digest V8 #600 (****** AUTOMATIC REPLY ******)

1999-09-16 Thread Espinola, Micheal
While I agree that what I did was immature and slightly inappropriate to send to the entire list, I believe it served its purpose to expose the fact that firewalls are not the only form of protection required to prevent access to your internal network. I alluded no information that wasn't

(Fwd) Transient Delivery Failure re: rfc util

1999-09-16 Thread stefmit
Failed first time I sent it ... --- Forwarded Message Follows --- Date sent: Thu, 16 Sep 1999 12:47:34 -0400 From: [EMAIL PROTECTED] Subject: Transient Delivery Failure To: [EMAIL PROTECTED] Send reply to: [EMAIL PROTECTED] The attached message

ftp server on a firewall

1999-09-16 Thread Romero-Lobo, Jose
I'm new to firewalls and there are some things I still don't quite understand, Would there be any dangers with setting up an FTP site on a machine that is running MS Proxy Server? thanks, Jose Romero - [To unsubscribe, send mail to [EMAIL PROTECTED] with "unsubscribe firewalls" in the body

Re: Marginally on-topic -- Secure remote email access

1999-09-16 Thread Smoot Carl-Mitchell
[EMAIL PROTECTED] wrote Obtaining a digital ID may be complicated by the fact that you are an international, non-US entity. (I'm not certain of that, but it is certainly the impression the NSA would like me to have.) You can generate your own certificate and self-sign it for the SSLized POP

Re: Re[2]: Marginally on-topic -- Secure remote email access

1999-09-16 Thread David Lang
I personally would prefer to use https rather then one of the tunnel clients for the firewall. i don't trust the remote users to secure their machines enough. While hotmail had (has??) significant security problems, I don't think those problems are becouse of the web access, I believe they were

Building a Firewall- Step 2 ?

1999-09-16 Thread Sushant Lotlikar
First of all a heartly Thank You for replying to my e-mail on Building a Firewall I have the book Building Internet Firewalls by O'Reilly(as some you had mentioned) What NEXT ? === Sushant P. Lotlikar Sardar Patel College of Engineering(Mumbai-India) Tel - 8091670 Homepage -

Oracle DB Security

1999-09-16 Thread Art Coble
Can anybody point me to a reference or how to guide for doing a security assessment on an Oracle Database configuration. Thanks for your help -Art === Art Coble International Network Services Senior Network Consultant Email: [EMAIL PROTECTED] Page:

Is Private Network Internet on same FR Circuit Ok?

1999-09-16 Thread Roy Mendoza
From a security standpoint, is it acceptable to expose a router interface to the Internet where the Internet and private network are on the same physical circuit? Quick background: Our carrier cannot provide a channelized frame relay circuit, so we must bring their single circuit containing our

Re: ftp server on a firewall

1999-09-16 Thread Alyea
1 - MS Proxy is not a firewall 2 - ftp on a firewall is BAD - clear text authentication to a firewall is a bad thing. "Romero-Lobo, Jose" wrote: I'm new to firewalls and there are some things I still don't quite understand, Would there be any dangers with setting up an FTP site on a

Re: ftp server on a firewall

1999-09-16 Thread Brian Steele
You might consider this a danger: passwords will be passed in plain text. Brian Steele - Original Message - From: Romero-Lobo, Jose [EMAIL PROTECTED] To: [EMAIL PROTECTED] Sent: Thursday, September 16, 1999 3:04 PM Subject: ftp server on a firewall I'm new to firewalls and there are