Understanding signatures and creating a p7s file from a given data (e.g. PDF)

2009-01-26 Thread Yves Vogl
Hi, I'm asking you because we at the Ruby talk mailling list are stuck with this problem (http://www.ruby-forum.com/topic/176646) As Ruby OpenSSL is just a wrapper around the SSL functions I'd like to get it on with openssl command line interface first. Maybe I'm understanding a lot of basic

License Question

2009-01-26 Thread Gerhard Gappmeier
Hi, if OpenSSL is included in hardware e.g. in a PLC, where should the copyright notice go? The hardware has no user interface with an about box or something like that. So the only place that remains would be the PLC manual. Would it be enough to write the following acknowledgement from the

X.509 PostalCode bug

2009-01-26 Thread Ilya O.
Hello. When Openssl parses X.509 certeficate (in my case it was DER-encoded, but I doubt that it is important), it expects 'PostalCode' in 'Subject' to be type of ASN1_PRINTABLE (aka PrintableString in terms of RFC3280). But actually PostalCode is allowed to be two types -- PrintableString and

Re: DTLS server implementation experiences and documentation

2009-01-26 Thread Daniel Mentz
Robin Seggelmann wrote: As a workaround you can use connected UDP sockets. Just use accept() and connect() as you would with TCP connections and create new BIO and SSL objects for every connection. I have tested that and it works pretty well so far. Hi Robin, I'm surprised that you can use

Re: License Question

2009-01-26 Thread Kyle Hamilton
The manual must include both the OpenSSL license text (what you quoted) and the SSLeay license text (which is also to be found in the LICENSE file). It just needs to be in the printed documentation or, where no printed documentation exists, in a LICENSE file or equivalent. -Kyle H On Mon, Jan

Re: DTLS server implementation experiences and documentation

2009-01-26 Thread Daniel Mentz
Wes Hardaker wrote: http://www.net-snmp.org/wiki/index.php/DTLS_Implementation_Notes Hi Wes, I have some comments regarding your wiki article. But first of all thanks for taking the time writing down all this information: I'm trying to implement IPFIX on top of DTLS so I also made some

Re: OpenSSL pseudo-psk usage

2009-01-26 Thread Chase Douglas
On Jan 26, 2009, at 4:23 PM, Philipp Gühring wrote: Hello Douglas, I'm wanting to use openssl to provide a psk-like authentication and encryption. While I see that openssl cvs has some TLS-PSK functionality, this does not seem to exist in any of the released tarballs. I run gentoo and I

Re: One certificate for both hostname and IP

2009-01-26 Thread Marco De Vitis
Il giorno 26/gen/09, alle ore 05:14, Crypto Sal ha scritto: Do any other clients (s_client, web browser, etc) exhibit the same behavior or an error message? If yes, what's the error response? Well, I currently do not know how to apply that certificate to an HTTP server to test it with

Re: One certificate for both hostname and IP

2009-01-26 Thread Crypto Sal
On 01/26/2009 08:40 PM, Marco De Vitis wrote: Il giorno 26/gen/09, alle ore 05:14, Crypto Sal ha scritto: Do any other clients (s_client, web browser, etc) exhibit the same behavior or an error message? If yes, what's the error response? Well, I currently do not know how to apply that

revoking a self-signed certificate

2009-01-26 Thread PS
Hi All, Is it possible to revoke a self-signed CA certificate? If yes, then I dont understand why it should be allowed. It does not make sense. The only reason a root CA would want to revoke its own certificate is if its private-key might have been compromised. So, the CA would want to revoke its

Re: revoking a self-signed certificate

2009-01-26 Thread Kyle Hamilton
A self-signed CA certificate (technically, a trust anchor) cannot be revoked via CRL. This is assumed to be a function of the higher-layer security infrastructure which led to the trust anchor being trusted in the first place, and is outside the scope of CRL. -Kyle H On Mon, Jan 26, 2009 at

Re: revoking a self-signed certificate

2009-01-26 Thread PS
Can you please elaborate on how would the higher-layer security infrastructure go about this? To me, it just seems impossible to do this and the issue might only be mitigated by spreading awareness by an out-of-band means but not eliminated until ofcourse, the self-signed CA certificate expires.

Re: revoking a self-signed certificate

2009-01-26 Thread PS
Also, does openssl allow a CA to revoked its own self-signed certificate? What happens when during the openssl verify, it finds that the CRL given by CA contains the CA-certificate in the revoked list? On Mon, Jan 26, 2009 at 9:28 PM, PS mytechl...@gmail.com wrote: Can you please elaborate on

RE: revoking a self-signed certificate

2009-01-26 Thread David Schwartz
Can you please elaborate on how would the higher-layer security infrastructure go about this? Simply put, whatever put the certificate in its trusted position is what is to remove it. If a CA says to trust a certificate, that CA can say not to. But if the certificate is self-signed, the trust