search for: rsaencryption

Displaying 19 results from an estimated 19 matches for "rsaencryption".

2010 Oct 05
1
Broken support for Smart Card Logon in Windows 2003 and XP
Hello. As I can see this post: https://jira.it.su.se/jira/browse/HEIMDAL-241, at least? Samba 4.0.0alpha5 supported Smart Card logon for Windows XP workstations. Current version (Version 4.0.0alpha14-GIT-77d959f+) does not support smart card logon on Windows XP workstation (but Windows 7 works well). I tried to compare Kerberos traffic examples from genuine domain controller and Samba's
2004 Aug 24
1
error when unsubscribe (PR#7198)
...ables: Variable Value force_response_1_0 1 SSL_SERVER_I_DN_OU Department of Mathematics SSL_CIPHER_EXPORT false SSL_SERVER_S_DN_Email webmaster@math.ethz.ch SERVER_SOFTWARE Apache/2.0.48 (Unix) SSL_VERSION_INTERFACE mod_ssl/2.0.48 SCRIPT_NAME /mailman/options SSL_SERVER_A_KEY rsaEncryption SSL_SERVER_S_DN_ST Switzerland SERVER_SIGNATURE Apache/2.0.48 (Unix) Server at stat.ethz.ch Port 443 REQUEST_METHOD POST PATH_INFO /r-help SERVER_PROTOCOL HTTP/1.1 SSL_SERVER_S_DN /C=CH/ST=Switzerland/L=Zurich/O=ETH Zurich/OU=Seminar for Statistics/CN=stat.ethz.ch/emailAddress=webm...
2017 Nov 24
1
SSL configuration
...any thanks! Enrico Extracted content of Let?s Encrypt CA is: [root at glusterfs1 ssl]# openssl x509 -in glusterfs.ca -text -noout Certificate: Data: Version: 3 (0x2) Serial Number: 0a:01:41:42:00:00:01:53:85:73:6a:0b:85:ec:a7:08 Signature Algorithm: sha256WithRSAEncryption Issuer: O=Digital Signature Trust Co., CN=DST Root CA X3 Validity Not Before: Mar 17 16:40:46 2016 GMT Not After : Mar 17 16:40:46 2021 GMT Subject: C=US, O=Let's Encrypt, CN=Let's Encrypt Authority X3 Subject Public Key Info:...
2010 Mar 05
1
WEBrick 500 error only with https
...rl-C to shutdown [2010-03-04 17:27:22] INFO WEBrick 1.3.1 [2010-03-04 17:27:22] INFO ruby 1.8.6 (2007-09-24) [i486-linux] [2010-03-04 17:27:22] INFO Certificate: Data: Version: 1 (0x0) Serial Number: 80:f2:ab:75:5a:02:94:d7 Signature Algorithm: sha1WithRSAEncryption Issuer: C=US,.... stuff Validity Not Before: Mar 3 18:28:16 2010 GMT Not After : Feb 29 18:28:16 2020 GMT Subject: C=US, .......stuff Subject Public Key Info: Public Key Algorithm: rsaEncryption RSA Public Key:...
2016 May 05
0
[Bug 2567] New: Wrong terminology used for ssh-keygen "-m" option
...t-a-public-key-in-pem-pkcs8-format http://crypto.stackexchange.com/questions/35093/why-ssh-gen-makes-difference-between-pem-and-pkcs8 "PKCS8" is better be called "SubjectPublicKeyInfo" or "AnyPublicKey" and "PEM" should be "RSAPublicKey" or "RSAEncryption". -- You are receiving this mail because: You are watching the assignee of the bug.
2004 Feb 06
0
Bug (PR#6550)
...ables: Variable Value force_response_1_0 1 SSL_SERVER_I_DN_OU Department of Mathematics SSL_CIPHER_EXPORT false SSL_SERVER_S_DN_Email webmaster@math.ethz.ch SERVER_SOFTWARE Apache/2.0.48 (Unix) SSL_VERSION_INTERFACE mod_ssl/2.0.48 SCRIPT_NAME /mailman/options SSL_SERVER_A_KEY rsaEncryption SSL_SERVER_S_DN_ST Switzerland SERVER_SIGNATURE Apache/2.0.48 (Unix) Server at www.stat.math.ethz.ch Port 443 REQUEST_METHOD POST PATH_INFO /r-help SERVER_PROTOCOL HTTP/1.1 SSL_SERVER_S_DN /C=CH/ST=Switzerland/L=Zurich/O=ETH Zurich/OU=Seminar for Statistics/CN=www.stat.math.ethz.ch...
2004 Jan 06
0
bug report (PR#6394)
...able Value force_response_1_0 1 SSL_SERVER_I_DN_OU Department of Mathematics SSL_CIPHER_EXPORT false SSL_SERVER_S_DN_Email webmaster@math.ethz.ch SERVER_SOFTWARE Apache/2.0.40 (Red Hat Linux) SSL_VERSION_INTERFACE mod_ssl/2.0.40 SCRIPT_NAME /mailman/subscribe SSL_SERVER_A_KEY rsaEncryption SSL_SERVER_S_DN_ST Switzerland SERVER_SIGNATURE Apache/2.0.40 Server at www.stat.math.ethz.ch Port 443 REQUEST_METHOD POST PATH_INFO /r-help SERVER_PROTOCOL HTTP/1.1 SSL_SERVER_S_DN /C=CH/ST=Switzerland/L=Zurich/O=ETH Zurich/OU=Seminar for Statistics/CN=www.stat.math.ethz.ch/emailA...
2003 Dec 05
1
TLS: hostname doesn't match CN??
...lo.com ibox# nslookup ibox.desarrollo.com --> 10.0.0.80 (Is the correct IP). Certificate information: ibox# openssl x509 -text -noout -in /usr/local/openldap2.1/ssl/servercrt.pem Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: md5WithRSAEncryption Issuer: C=ES, ST=Barcelona, L=Barcelona, O=OpenWired SL, OU=ibox, CN=iboxCA Validity Not Before: Dec 4 17:40:37 2003 GMT Not After : Dec 3 17:40:37 2004 GMT Subject: C=ES, ST=Barcelona, L=Barcelona, O=OpenWired SL, OU=ibox, CN=ibox.desarrollo.com...
2024 Jan 26
1
Gluster communication via TLS client problem
...n ------- Testing with openssl on the client show: root at cluster-client:~# openssl s_client -CAfile /usr/lib/ssl/glusterfs.ca -connect c01.gluster:24007 CONNECTED(00000003) depth=0 CN = c01.gluster verify return:1 --- Certificate chain 0 s:CN = c01.gluster i:CN = c01.gluster a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 v:NotBefore: Jan 26 08:27:12 2024 GMT; NotAfter: Feb 25 08:27:12 2024 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIDDTCCAfWgAwIBAgIULCwcIV9jWFzeZoeO1Xs5TJ9J5rkwDQYJKoZIhvcNAQEL BQAwFjEUMBIGA1UEAwwLYzAxLmdsdXN0ZXIwHhcNMjQwMTI2MDgyNzEyWhcNMjQw MjI1MDg...
2016 Jul 03
1
Where is krb5.keytab or equivalent?
...rivate/MAIL.key > /etc/ssl/certs/OHPRS/easyrsa/issued/dovecot.crt > > $ openssl x509 -text -in /etc/ssl/certs/OHPRS/easyrsa/issued/dovecot.crt > > Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: sha256WithRSAEncryption > Issuer: CN=mail.hprs.local > Validity > Not Before: Jul 2 05:54:26 2016 GMT > Not After : Jun 30 05:54:26 2026 GMT > Subject: CN=mail.hprs.local > Subject Public Key Info: > Public Key Algorithm: rsaE...
2024 Jan 26
1
Gluster communication via TLS client problem
...--- Testing with openssl on the client show: root at cluster-client:~# openssl s_client -CAfile /usr/lib/ssl/glusterfs.ca -connect c01.gluster:24007 CONNECTED(00000003) depth=0 CN = c01.gluster verify return:1 --- Certificate chain 0 s:CN = c01.gluster i:CN = c01.gluster a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256 v:NotBefore: Jan 26 08:27:12 2024 GMT; NotAfter: Feb 25 08:27:12 2024 GMT --- Server certificate -----BEGIN CERTIFICATE----- MIIDDTCCAfWgAwIBAgIULCwcIV9jWFzeZoeO1Xs5TJ9J5rkwDQYJKoZIhvcNAQEL BQAwFjEUMBIGA1UEAwwLYzAxLmdsdXN0ZXIwHhcNMjQwMTI2MDgyNzEyWhcNMjQw MjI...
2016 Jul 03
0
Where is krb5.keytab or equivalent?
...a/private/ca.key /etc/ssl/certs/OHPRS/easyrsa/private/MAIL.key /etc/ssl/certs/OHPRS/easyrsa/issued/dovecot.crt $ openssl x509 -text -in /etc/ssl/certs/OHPRS/easyrsa/issued/dovecot.crt Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: sha256WithRSAEncryption Issuer: CN=mail.hprs.local Validity Not Before: Jul 2 05:54:26 2016 GMT Not After : Jun 30 05:54:26 2026 GMT Subject: CN=mail.hprs.local Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (204...
2016 Jul 02
0
Where is krb5.keytab or equivalent?
...rivate/MAIL.key > /etc/ssl/certs/OHPRS/easyrsa/issued/dovecot.crt > > $ openssl x509 -text -in /etc/ssl/certs/OHPRS/easyrsa/issued/dovecot.crt > > Certificate: > Data: > Version: 3 (0x2) > Serial Number: 1 (0x1) > Signature Algorithm: sha256WithRSAEncryption > Issuer: CN=mail.hprs.local > Validity > Not Before: Jul 2 05:54:26 2016 GMT > Not After : Jun 30 05:54:26 2026 GMT > Subject: CN=mail.hprs.local > Subject Public Key Info: > Public Key Algorithm: rsaE...
2011 Feb 15
11
Puppetmasterd not receiving certificate request
Hi: I''m trying to configure Puppet on Ubuntu, and strangely I am never able to generate a certificate because my server never shows any pending certificate requests. Put differently, on the server I am running puppetmasterd and on the client I am able to connect to the server, but the client continues printing notice: Did not receive certificate warning: peer certificate
2011 May 08
3
Unable to REGISTER to the Asterisk v1.8.3.3 server via SIP/TLS
...main.com:5061 Authentication Username: 361 - - - [ Setup > Certificates > Server Certificates ] Country: ; State: ; Locality ; Organization: ; Common Name: pbx.domain.com; eMail: Version: 2 Serial Number: 00b6b63eb67ed2111345253c228264d093 Signature Algorithm: 1.2.840.113549.1.1.5 (sha1WithRSAEncryption) Signature: 28ce574c9715e1e59dfc90829287ab31fdbf0e0212dc488b106e71ffaaa339610492dc091d440772... Issuer: Country: GB; State: Greater Manchester; Locality Salford; Organization: Comodo CA Limited; Common Name: PositiveSSL CA; eMail: Validity: 27/04/11 - 26/04/12 SHA1-Fingerprint: 38d13c709ab1cc9b434c...
2013 Dec 12
1
Need help in addressing this error - ERROR OpenSSL::SSL::SSLError: SSL_accept returned=1 errno=0 state=SSLv3 read client certificate A: tlsv1 alert unknown ca
...2 08:55:39] INFO WEBrick 1.3.1 [2013-12-12 08:55:39] INFO ruby 1.9.3 (2013-06-27) [x86_64-linux] [2013-12-12 08:55:39] DEBUG TCPServer.new(0.0.0.0, 8140) [2013-12-12 08:55:39] INFO Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: sha256WithRSAEncryption Issuer: CN=Puppet CA generated on savbu-razor-server.cisco.com at 2013-12-10 05:05:10 -0800 Validity Not Before: Dec 11 16:55:39 2013 GMT Not After : Dec 11 16:55:39 2018 GMT Subject: CN=10.193.174.38 Subject Public Key Info: Publ...
2016 Jul 02
5
Where is krb5.keytab or equivalent?
OK, let me go through exactly what you did: you: > Here's the test (I must run mutt not telnet like i mentioned earlier to > get the imap tickets). > > root at server:~# kinit achim > Password for achim at DOMAIN.LOCAL: > [I enter my password] As root on AD/DC mail.hprs.local: me: $ kinit mark Password for mark at HPRS.LOCAL: [I enter my password] you: >
2011 Dec 16
12
Seperate CA's/Master behind load balancer
Hello, Attempting to setup a CA primary/standby as well as seperate puppetmaster servers (all running Apache/Passenger) behind another Apache/Passenger type load balancer. Clients are not getting certs:- err: Could not request certificate: Could not intern from s: nested asn1 error Clearly an SSL issue but not something I know a great deal about. loadbalancer.conf # Puppet Load Balancing
2004 Apr 13
1
Patch Status
...waiting for MONITOR_ANS_SIGN debug3: mm_request_receive_expect entering: type 5 debug3: mm_request_receive entering debug3: monitor_read: checking request 4 debug3: mm_answer_sign debug3: ssh_x509_sign: key_type=RSA+cert, key_ssh_name=x509v3-sign-rsa debug3: ssh_x509_sign: evp_md { 4(md5), 8(md5WithRSAEncryption), 16, ... } debug3: ssh_x509_sign: return 0 debug3: mm_answer_sign: signature 0x809cdc0(151) debug3: mm_request_send entering: type 5 debug2: monitor_read: 4 used once, disabling now debug3: mm_request_receive entering debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent debug2: kex_derive_keys debug2: set_newke...