"Richard Booth [Web Developer]" <[EMAIL PROTECTED]> writes:
> When performing a post from a non-secure sever to a secure server is the
> connection made secure before any data passes through?
It's not clear what you mean here. Servers don't typically post
to other servers. Perhaps you mean when a
Question:
When performing a
post from a non-secure sever to a secure server is the connection made secure
before any data passes through? If yes or no can you direct me to
documentation if possible?
Thanks for any help
you may provide!
Richard Booth
On Wed, Oct 24, 2001 at 02:56:39PM +0200, Richard Koenning wrote:
> But be warned that WS FTP uses only 40 bit export ciphers, at least the
> versions which i checked (V6.6 and V7.0-Tryout). Another possibility is
> CuteFTP, which uses strong encryption. A possible drawback with both
> clients is
At 09:19 24.10.2001 EDT, you wrote:
>The implementation of AUTH SSL/TLS in the FTP client support that
>comes with Kermit 95 and C-Kermit 8.0
>
> http://www.kermit-project.org/ftpd.html
>
>supports all ciphers supported by OpenSSL; reuses the session for the
>data connections; and properly perfor
The implementation of AUTH SSL/TLS in the FTP client support that
comes with Kermit 95 and C-Kermit 8.0
http://www.kermit-project.org/ftpd.html
supports all ciphers supported by OpenSSL; reuses the session for the
data connections; and properly performs verification of server
certificates unli
At 10:27 24.10.2001 +1300, you wrote:
>
>On Wed 23 Oct 2001, Scott Klement wrote:
>
>>For a MS-Windows client that can connect using FTP over SSL, go here:
>>http://www.wsftp.org/
>
>Thanks Scott. Much appreciated. I do not especially want to write my own
>ssl/ftp client so I'll go with the
While testing CA-Certificate in Stronghold 3.0 that
includes mod_ssl 2.6.4, a client with Netscape 6.1 tries to connect using https,
and seems to hangup, while the server reports in ssl_engine_log:"[date time
00365] [error] SSL handshake failed (server XXX:443, client ipnumber) (OpenSSL
libr
the follow is my opinion:
uninstall: rm libssl.a, libcrypto.a under /usr/local/ssl/lib is OK
newer version:
get newer version, unzip it, make, make install and overwrite the old libssl.a,
libcrypto.a is OK
- Original Message -
From: "Ruby Cruiser" <[EMAIL PROTECTED]>
To: <[EMAIL PR
I'd like to apologise for the infected message that my computer sent
yesterday and all the spam it caused with the automatic replies it sent back
to the list. We cut off all outgoing mail as soon as possible but it was
already too late, some messages had been sent.
I hope no more harm was done to