On Mon, Aug 27, 2012 at 10:50 PM, Dr. Stephen Henson wrote:
On Mon, Aug 27, 2012, GWu wrote:
The email is available at
http://www.buergerkarte.at/mvnforum/mvnforum/viewthread_thread,272#1180
(German language forum, but the email - or it's significant parts
respectively - is easily visble).
On Tue, Aug 28, 2012, GWu wrote:
On Mon, Aug 27, 2012 at 10:50 PM, Dr. Stephen Henson wrote:
On Mon, Aug 27, 2012, GWu wrote:
The email is available at
http://www.buergerkarte.at/mvnforum/mvnforum/viewthread_thread,272#1180
(German language forum, but the email - or it's significant
On Tue, Aug 28, 2012 at 1:07 PM, Dr. Stephen Henson wrote:
- ba 80 69 57 62 78 03 d4-57 3c 93 83 b9 86 f1 5a ..iWbx..W.Z
0010 - 35 23 58 3d
This isn't a proper DigestInfo structure at all it's just presumably the raw
SHA1 hash (as you can see from its length: 20 bytes). A proper
On Tue, Aug 28, 2012, GWu wrote:
Great, thanks a lot. I've been able to reproduce this on the erroneous
messages as well, and a correctly signed message gives for example
openssl rsautl -verify -certin -inkey s.pem -in sig.der -asn1parse
0:d=0 hl=2 l= 33 cons: SEQUENCE
2:d=1
On Mon, Aug 27, 2012, GWu wrote:
Hello,
I'm trying to verify an email signature using openssl.
I've saved the complete mail to a file named mail.eml, then I'm using
openssl to verify:
openssl smime -inform SMIME -CAfile all.pem -verify -in mail.eml
which gives an error:
On Mon, Aug 27, 2012 at 9:27 PM, Dr. Stephen Henson wrote:
On Mon, Aug 27, 2012, GWu wrote:
[...]
openssl smime -inform SMIME -CAfile all.pem -verify -in mail.eml
which gives an error:
[...]
It sounds like the signature is malformed. That wouldn't cause problems with
asn1parse but would
On Mon, Aug 27, 2012, GWu wrote:
On Mon, Aug 27, 2012 at 9:27 PM, Dr. Stephen Henson wrote:
On Mon, Aug 27, 2012, GWu wrote:
[...]
openssl smime -inform SMIME -CAfile all.pem -verify -in mail.eml
which gives an error:
[...]
It sounds like the signature is malformed. That wouldn't
Mahesh Anantharaman wrote:
openssl smime -verify -noverify -nointern -nochain -in message.txt
-certfile myfile.pem
Note that you normally MUST verify the validity of the sender's
certificate against a trusted root cert which you retrieved in a
secure way. Otherwise you have to make sure that
Dr S N Henson wrote:
The email is always checked against the senders certificate: it is
extracted from the signed email automatically so there is no need to
donwload it manually.
Note: With Outlook (Express) you can turn off adding the sender's
certificate to the S/MIME signature to reduce
Mahesh Anantharaman wrote:
Hi
HELP
When I just use the root ca(vsign1.pem) and do not add my public trusted ca
in the file.
The program is saying verification successful.
What does it mean.
It means the signature on the message is valid (it has not been tampered
with) and the
-Original Message-
From: Dr S N Henson [mailto:[EMAIL PROTECTED]]
Sent: Friday, December 29, 2000 3:35 PM
To: [EMAIL PROTECTED]
Subject: Re: openssl smime verify
Mahesh Anantharaman wrote:
Hi
HELP
When I just use the root ca(vsign1.pem) and do not add my public trusted
ca
in the file
Mahesh Anantharaman wrote:
Hi
I am sorry for the question. Here is what I want.
I am having the senders certificate saved locally downloaded from verisign.
I want to verify the
email received against the sender certificate not with the root ca.
Is it possible.
The email is always
PROTECTED]]
Sent: Friday, December 29, 2000 4:46 PM
To: [EMAIL PROTECTED]
Subject: Re: openssl smime verify
Mahesh Anantharaman wrote:
Hi
I am sorry for the question. Here is what I want.
I am having the senders certificate saved locally downloaded from
verisign.
I want to verify the
email
Mahesh Anantharaman wrote:
Hi
Thanks a lot for your help. I converted the .p7c to .pem using this
openssl pkcs7 -in key.p7c -inform DER -print_certs
And I am trying to verify. I am getting Verification failure.
Why!!! . What should I do.
thanks
regards
mahesh
14 matches
Mail list logo