On Thu, Jun 03, 1999, Jens-Uwe Mager wrote:
On Thu, Jun 03, 1999 at 10:28:20AM -0700, Brian Behlendorf wrote:
Yay for Germany. =) (relevant because - Ralf correct me if I'm mistaken
- modssl.org is hosted in Germany)
This is good news for us! But it probably does not impact modssl,
On Fri, Jun 04, 1999, [EMAIL PROTECTED] wrote:
Full_Name: Matthew J. Ryan
Version: 2.3.1-1.3.6
OS: Solaris 2.6
Submission from: false.exodus.net (216.32.248.134)
It appears there is a but in pkg.eapi/eapi.patch, starting at about
line 96:
+if [ "x$EAPI_MM" = "xSYSTEM" ]; then
+
On Fri, Jun 04, 1999, Brian Dale wrote:
I'm trying to compile Apache 1.3.6 with OpenSSL 0.9.3 for mod_ssl 2.2.8
support on a RedHat Linux 5.2 out-of-box install. It looks like the
out-of-box Apache was a binary-only install (I can find no source from
prevous install on the box) to RedHat
I believe you need mod_ssl 2.3.1 with openssl 0.9.3
Brian Dale wrote:
Hello mod_ssl'ers!
I'm trying to compile Apache 1.3.6 with OpenSSL 0.9.3 for mod_ssl 2.2.8
support on a RedHat Linux 5.2 out-of-box install. It looks like the
out-of-box Apache was a binary-only install (I can find no
session cache)
can grab the latest mod_ssl snapshot and try out the new "SSLSessionCache
shm:/path/to/file/(bytes)" feature. For this grab:
ftp://ftp.modssl.org/snapshot/mod_ssl-SNAP-19990604.tar.gz
For those who still don't know the background: The shared memory based session
cache uses a
Hello:
Not sure if this is the right place to post this question, but
maybe someone can direct me.
I am a Certificate Authority for an office project. We use Netscape
Certificate Server software (part of Suitespot). Currently, when a
user requests a certificate, they have to go through
Is there a way to have the user email me information applicable
to the project, and I go through a series of windows that creates
the certificate for them, and make the importation of the certificate
as painless as possible.
Yes, you can save pain for them, but it
The user is supposed to create his key pair on his machine and send out the
certificate request. If you are doing everything, then you have the
opportuty to compromise his private key. Technically, this is not a
corrrect way to do certification.
Cheers
lin geng
-Original Message-