I just installed mod_ssl on my Mac OS X server and when I try to access
it for testing I get the following error message:
SSL_connect:error in SSLv2/v3 read server hello A
404:error:140770FC:SSL routines:SSL23_GET_SERVER_HELLO:unknown
protocol:s23_clnt.c:460:
Any suggestions?
Thanks,
Aaron
On Thu, Jun 06, 2002 at 02:57:28PM -0500, Steve Romero wrote:
Didn't see a bug list, but wanted to let everyone know that I had problems
with this beta release under the following conditions:
+ gcc
+ Solaris 8 (patched)
+ rsaref-2.0
+ openssl-0.9.7-beta1
When compiling openssl I get:
Does anyone know where I can get the latest VeriSign root certificate (that
expires in 2028) in PEM format? It seems to be impossible to get it from
their website in anything other than some script to install it into a web
browser.
Anyone know if there's a central trusted repository for all the
Sorry if this is a dumb question that has been answered in countless threads
and FAQ's I just don't seem to have found those particular ones.
I have installed openssl 0.9.6d and generated a CA and a certificate (in pem
format) using CA.pl.
I configured mod_ssl 2.8.8 and mod_perl into
-Mensaje original-
De: Jeffrey Altman [mailto:[EMAIL PROTECTED]]
Enviado el: jueves, 06 de junio de 2002 19:58
Para: [EMAIL PROTECTED]
CC: [EMAIL PROTECTED]
Asunto: Re: telnetd-ssl
That depends on whose Telnetd you are using and how you want the
client's to be authorized.
-I'm on a
Hi!
I am developing something like "Sniffer".
After establishing TCP connection and SSL
handshake client and server start to transmit the data. If the data is in one
TCP segment it is fine. But when SSL data record is longer than one TCP segment
I need to store them and decrypt after last
On Fri, Jun 07, 2002 at 12:38:00AM -0700, Brian Doyle wrote:
Does anyone know where I can get the latest VeriSign root certificate (that
expires in 2028) in PEM format? It seems to be impossible to get it from
their website in anything other than some script to install it into a web
browser.
On Thu, Jun 06, 2002 at 05:17:48PM -0700, Bob Steele wrote:
This might be a nonsensical question, and if so it
wouldn't be my first foolish question here:
Is it possible or appropriate to add a timestamp object
(RFC 3161) to a PKCS#7 signature during the signature's
creation?
This
Hi Bob,
You are on the right track - it should be possible to attach a time stamp token to a
PKCS7 token. However, there are several options depending on what you want to time
stamp. The two most obvious ones being:
- if you want to prove the existence of the orignal content at a particular
Hi,
I have a problem with openssl 0.9.5a incorporated in Oracle 9iAS 1.0.2.2
for win 2000server.
My target is enable the ssl protocol with both authentication client and
server, only server authentication is OK, client and server fail.
I use a CA certificate for the client which is not included
If you can access IE5 you can export the certs from there. I know they are
available for download somewhere I just can't remember where.
Riaan
-Original Message-
From: Brian Doyle [mailto:[EMAIL PROTECTED]]
Sent: Friday, June 07, 2002 9:38 AM
To: [EMAIL PROTECTED]
Subject: Need root
No, Bob wants to know:
Does PKCS#7 support additional signed attributes?
The answer is yes.
/r$
__
OpenSSL Project http://www.openssl.org
User Support Mailing List
Then it looks like Debian's telnet does not support client
certificates. I don't know what telnet-ssl is or was. If this was
Tim Hudson's old implementation using the TELNET AUTH SSL hack then it
should be abandoned in favor of one that supports the IETF TELNET
START_TLS option. The code that
-Mensaje original-De: Jeffrey Altman [mailto:[EMAIL PROTECTED]]Enviado
el: viernes, 07 de junio de 2002 14:57Para: [EMAIL PROTECTED]CC:
[EMAIL PROTECTED]Asunto: RE: telnetd-sslThen it
looks like Debian's telnet does not support clientcertificates. I
don't know what "telnet-ssl" is
14 matches
Mail list logo