Solved? More on StartTLS hang

2003-09-28 Thread Dann Daggett
Hello again :) I still need to keep this short as long emails still a problem. Tried setting MTU to 1450, still hangs on emails over 800 bytes. Last lines in maillog is (DebugLevel 99): Sep 27 22:11:38 ns1 sm-mta[2513]: h8S5BKkL002513: -- DATA Sep 27 22:11:38 ns1 sm-mta[2513]:

Cert verify question

2003-09-28 Thread Dann Daggett
Greetings All, I was studying the certs I'd created and (unless I've missed something) I've realized that there is actually nothing in a certificate that tells anyone exactly where to go to get the issuer's certificate (i.e. walk the chain). Here's lines from one of my certs that could even

RE: Cert verify question

2003-09-28 Thread Gaurav Khanna
About .0's The symbolic link names come from X509_subject_name_hash() { X509_NAME_hash(x-cert_info-subject) } The integer in the end is useful if you have multiple certificates with same subject name. /Gaurav -Original Message- From:

pocket pc 2002 client

2003-09-28 Thread Kambourakis Georgios
hi, how can i get a basic openssl client source code for pocket pc 2002 (openssl 0.9.7b) ? Thanks in advance

SSL Warning on Non-Standard Port

2003-09-28 Thread R Ayres
My Issue: I have 2 certificates: a self signed server certificate and a purchased domain specific certificate. When I connect to the domain with https://mydomain.com it works fine, but if I try to connect to another port (https://mydomain.com:2020), the self signed certificate is the one that

3-DES size

2003-09-28 Thread Pierre De Boeck
I would like to know the overhead in size when encrypting a message of n bytes with 3DES. A simple rule of thumb says that it will be n bytes plus the padding needed for n to be a multiple of 64 bits (8 bytes). Is it correct? and how the different modes (CBC,..)+ initialization vector influences

RE: SSL Warning on Non-Standard Port

2003-09-28 Thread Dann Daggett
My Issue: I have 2 certificates: a self signed server certificate and a purchased domain specific certificate. When I connect to the domain with https://mydomain.com it works fine, but if I try to connect to another port (https://mydomain.com:2020), the self signed certificate is the one

RE: Cert verify question

2003-09-28 Thread Dann Daggett
About .0's The symbolic link names come from X509_subject_name_hash() { X509_NAME_hash(x-cert_info-subject) } The integer in the end is useful if you have multiple certificates with same subject name. /Gaurav Thank you very much. Dann

Re: 3-DES size

2003-09-28 Thread Dr. Stephen Henson
On Sun, Sep 28, 2003, Pierre De Boeck wrote: I would like to know the overhead in size when encrypting a message of n bytes with 3DES. A simple rule of thumb says that it will be n bytes plus the padding needed for n to be a multiple of 64 bits (8 bytes). Is it correct? and how the

RE: 3-DES size

2003-09-28 Thread Pierre De Boeck
Ok, thanks. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of Dr. Stephen Henson Sent: Sunday, September 28, 2003 8:37 PM To: [EMAIL PROTECTED] Subject: Re: 3-DES size On Sun, Sep 28, 2003, Pierre De Boeck wrote: I would like to know the

Re: sslv3 alert handshake failure :-(

2003-09-28 Thread Jörg Horchler
Hi again, I recompiled openssl, mod_ssl and my Apache again. This time I used 'shared' as flag for OpenSSL 'config'. This was necessary to compile shared libraries (dylib on Mac OS X). I tried to access my server again using SSL. The result is the same. Here is whar ssldump writes: using

Re: Cert verify question

2003-09-28 Thread Rich Salz
something) I've realized that there is actually nothing in a certificate that tells anyone exactly where to go to get the issuer's certificate (i.e. walk the chain). Right. That's pretty much why all PKI protocols are client-push. /r$ -- Rich Salz Chief Security

Re: Solved? More on StartTLS hang

2003-09-28 Thread Claus Assmann
On Sat, Sep 27, 2003, Dann Daggett wrote: I still need to keep this short as long emails still a problem. Tried setting MTU to 1450, still hangs on emails over 800 bytes. Last lines in maillog is (DebugLevel 99): Sep 27 22:11:38 ns1 sm-mta[2513]: h8S5BKkL002513: -- DATA Sep 27

RE: pocket pc 2002 client

2003-09-28 Thread Steven Reddie
Title: Message The code for using OpenSSL on the Pocket PC should be the same as the code for using it on other platforms. Try the openssl apps directory for examples of how to use various OpenSSL features. Regards, Steven -Original Message-From: [EMAIL PROTECTED]

CryptoSwift - slightly OT

2003-09-28 Thread Vlad
Hello, I have a CryptoSwift PCI card that I am attempting to use under windows 2000 advanced server with OpenSSL. I am unable to get the drivers for the card. I contacted rainbow and was redirected to sales. The sales hasn't returned phone calls in over 2 weeks. Any help or suggestions would be