Both my IRIX on O2 and Linux on PII took one look at the virus,
yawned, and continued on their normal course. :-)
-- Raju
> "Jon" == Jon Earle <[EMAIL PROTECTED]> writes:
>> If you get this email from this guy DO NOT open it, my
>> macafee's virus scanner freaked out saying it was a
What's wrong with NT 4.0?
- Original Message -
> I know that everyday I send 1000 mails but I am desperate, I have no solution
> for my SSL problem.
> I explained it earlier but if you want to know it again, don't hesitate to
> contact me I will email you.
> I wonder if somebody uses SS
Jeffrey Altman wrote:
>
> > Its a bit broken for several reasons...
> >
> > The script that normally creates these things "c_rehash" looks like it
> > will only ever create hashes ending in zero.
>
> That can't be true:
>
> 11/05/99 3:15 1,314 23dbf167.0
> 12/09/99 0:54
Its a virus, don't open it.
-Original Message-
From: Jaime Perez [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, January 26, 2000 11:31 PM
To: [EMAIL PROTECTED]
Subject: Re: Check this
I don't remember you, but what is this VB file supposed to do?
-Jaime
Anjali Koshti wrote:
> Have fun w
There was a bit of a food fight about this subject here last year.
What you need to have for unattended startup is an unencrypted private key.
There are obvious security implications.
Skye Poier is supposed to have written:
>
> What function do you call to avoid the 'Enter PEM pass
> phrase:'
Hi there,
On Thu, 27 Jan 2000, Dr Stephen Henson wrote:
[snip]
> Its a bit broken for several reasons...
[snip]
> This method only works for lookup by subject name: any other kind of
> lookup wont work. You could have multiple links but that would rapidly
> get painful, particularly if you ha
>The ability to represent different certs
>with the same hash value is vital if you adopt a strategy of 2 years
>CA cert validity, 1 year active usage and overlapping validity.
An other solution is to have slightly different CN values by including the
year of validity in the name for example.
N
It seems to me this virus has established a symbiotic relationship
with humankind: Perhaps more messages are generated by
humans commenting about the virus than by the virus itself,
thus in a way fulfilling the viruses replication goals ;-)
May we assume that if one or two warning messages appea
Ben Laurie <[EMAIL PROTECTED]> writes:
> M wrote:
> >
> > [Perhaps I ought to know this already, but...]
> >
> > RFC 2246 says "The differences between [TLS 1.0] and SSL 3.0 are not dramatic, but
>they are significant enough that TLS 1.0 and SSL 3.0 do not interoperate (although
>TLS 1.0 does
Hello everybody!
I am looking for description of format(s) of records in CERT7.DB and
KEY3.DB file.
I have link http://www.drh-consultancy.demon.co.uk/ (many thanks to Dr
Stephen N Henson).
Does any other source exist?
I read that Netscape changes the format of these database: is it still
> Its a bit broken for several reasons...
>
> The script that normally creates these things "c_rehash" looks like it
> will only ever create hashes ending in zero.
That can't be true:
11/05/99 3:15 1,314 23dbf167.0
12/09/99 0:54 4,306 37bb5c86.0
The .0 which is ap
If you remove the password encryption on your private key,
I believe you won't be getting this (it's what I belive
most people do that configure SSL servers to auto start on
boot without manual intervention).
If memory serves, I believe something like
req -key INPUT_KEY_FILE -keyout OUTPUT_KEY_F
>If you get this email from this guy DO NOT open it, my macafee's virus
>scanner freaked out saying it was a virus.. I am assuming it is an actual
>VB Script virus
>
>Here is the info on the virus.
>
>http://vil.nai.com/vil/vbs10225.asp
hehehe... mine did the same. Boss was not impressed. Ins
On Linux look at /etc/logrotate.conf and /etc/logrotate.d/ for any apache,
httpd or httpsd activity.
Robert Sandilands
On Wed, 26 Jan 2000, Aaron Gelner wrote:
> Date: Wed, 26 Jan 2000 16:36:41 -0600
> From: Aaron Gelner <[EMAIL PROTECTED]>
> Reply-To: [EMAIL PROTECTED]
> To: [EMAIL PROTECTED
I'll clarify what I said a bit here.
Yes it does use the hash of the DER encoding of the subject name. I've
re-read my original response and I may have given the impression that it
used a hash of the whole certificate.
The actual hash is the first four bytes of the MD5 hash interpreted as a
big
No, failure is random by observation, but it is probably not
random once the condition is understood (just like: "wherever
you go, there you are").
/mrg
Aaron Gelner wrote:
> Hi Michael,
>
> Is it falling out at a specific rate, like once every Sunday or
> fillintheday? :) I've checked one thi
Jason Terry wrote:
>
> The following is a OpenSSL error message I am getting on a fairly regular
> basis... The wierd part is that it doesn't happen on a regular basis. Does
> anyone know what could be causing this error?
>
> [26/Jan/2000 14:36:26 04565] [error] OpenSSL: error:14094412:SSL
> ro
HI,
i try to compile openssl-0.9.4, modssl-2.4.10-1.3.9 apache_1.3.9 every think are ok. i
have no any error messages when i was compile, but when i try to browse to my server
with IE or Netscape they could not get the addresses. ie:https://myserver. My step
installation are:
1. Openssl with th
Dr Stephen Henson wrote:
>
> Julio Rubio wrote:
> >
> >
> > We have revised the list archives and no one answered the question of
> > Mike (Wu Zhigang)!
> >
> > Does anyone know how to extract a private key from an Entrust profile
> > (epf) to an OpenSSL privaye key format???
> >
> > Thanks!
> >
> Does GDBM work on Win32 and all the Unixen we support? In that case,
> this should be perfectly possible. On VMS, we'll just use the
> built-in ISAM (not really, but almost) file format...
when you look at AnyDBM_File manpage of perl you will find following
table:
M wrote:
>
> [Perhaps I ought to know this already, but...]
>
> RFC 2246 says "The differences between [TLS 1.0] and SSL 3.0 are not dramatic, but
>they are significant enough that TLS 1.0 and SSL 3.0 do not interoperate (although
>TLS 1.0 does incorporate a mechanism by which a TLS implementa
I know that everyday I send 1000 mails but I am desperate, I have no solution
for my SSL problem.
I explained it earlier but if you want to know it again, don't hesitate to
contact me I will email you.
I wonder if somebody uses SSL with Windows 2000 beta 3 in generating CA, server
certificat and
From: Dr Stephen Henson <[EMAIL PROTECTED]>
drh> something better that handles multiple lookups. E.g. an index file which
drh> will work on all platforms and GDBM on platforms that support it. Not in
drh> 0.9.5 though...
Does GDBM work on Win32 and all the Unixen we support? In that case,
this
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED]]On Behalf Of Goetz Babin-Ebell
> Sent: Wednesday, January 26, 2000 06:45 PM
> To: [EMAIL PROTECTED]
> Subject: Re: FW: DANGER: Possible virus for sam
>
>
> At 17:03 26.01.00 -, Samuel Liddicott wrote:
> Hallo,
skye> What function do you call to avoid the 'Enter PEM pass phrase:' prompt?
skye> Just won't do; the daemon needs to be started from an rc script.
One way to do it is to write a password callback that you register
through SSL_CTX_set_default_passwd_cb().
However, this means that you need to pr
On Thu, 27 Jan 2000, Dr Stephen Henson wrote:
> Richard Levitte - VMS Whacker wrote:
> >
> > amoskoff> After reading the archive and modssl FAQ I have almost everything
>working.
> > amoskoff> But there is one question. I order to use the CApath in the function
> > amoskoff> ``SSL_CTX_load_veri
[Perhaps I ought to know this already, but...]
RFC 2246 says "The differences between [TLS 1.0] and SSL 3.0 are not dramatic, but
they are significant enough that TLS 1.0 and SSL 3.0 do not interoperate (although TLS
1.0 does incorporate a mechanism by which a TLS implementation can back down t
I haven't used s_server and s_client, but to do this you would need to
call SSL_CTX_set_verify with SSL_VERIFY_NONE on the server and
SSL_VERIFY_PEER | SSL_VERIFY_FAIL_IF_NO_PEER_CERT (that's a binary or)
on the client. If no-one else replies, you should be able to work
backwards from the code t
This is not true!...
Export ciphers also use full-length keys (for ex. 128-bits for Exp_RC4)
and the most significant 88 bits of these keys are not equal to zero.
For export ciphers, only 40 bits of the randomness source used to generate
a 128-bit key is kept secret (see The SSL Protocol Version
Dr Stephen Henson schrieb:
>
> Richard Levitte - VMS Whacker wrote:
> >
> > amoskoff> After reading the archive and modssl FAQ I have almost everything
>working.
> > amoskoff> But there is one question. I order to use the CApath in the function
> > amoskoff> ``SSL_CTX_load_verify_locations'' you
30 matches
Mail list logo