Displaying 19 results from an estimated 19 matches for "rsaencryption".
2010 Oct 05
1
Broken support for Smart Card Logon in Windows 2003 and XP
Hello.
As I can see this post: https://jira.it.su.se/jira/browse/HEIMDAL-241,
at least? Samba 4.0.0alpha5 supported Smart Card logon for Windows XP
workstations.
Current version (Version 4.0.0alpha14-GIT-77d959f+) does not support
smart card logon on Windows XP workstation (but Windows 7 works well).
I tried to compare Kerberos traffic examples from genuine domain
controller and Samba's
2004 Aug 24
1
error when unsubscribe (PR#7198)
...ables:
Variable Value
force_response_1_0 1
SSL_SERVER_I_DN_OU Department of Mathematics
SSL_CIPHER_EXPORT false
SSL_SERVER_S_DN_Email webmaster@math.ethz.ch
SERVER_SOFTWARE Apache/2.0.48 (Unix)
SSL_VERSION_INTERFACE mod_ssl/2.0.48
SCRIPT_NAME /mailman/options
SSL_SERVER_A_KEY rsaEncryption
SSL_SERVER_S_DN_ST Switzerland
SERVER_SIGNATURE Apache/2.0.48 (Unix) Server at stat.ethz.ch Port 443
REQUEST_METHOD POST
PATH_INFO /r-help
SERVER_PROTOCOL HTTP/1.1
SSL_SERVER_S_DN /C=CH/ST=Switzerland/L=Zurich/O=ETH Zurich/OU=Seminar for
Statistics/CN=stat.ethz.ch/emailAddress=webm...
2017 Nov 24
1
SSL configuration
...any thanks!
Enrico
Extracted content of Let?s Encrypt CA is:
[root at glusterfs1 ssl]# openssl x509 -in glusterfs.ca -text -noout
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
0a:01:41:42:00:00:01:53:85:73:6a:0b:85:ec:a7:08
Signature Algorithm: sha256WithRSAEncryption
Issuer: O=Digital Signature Trust Co., CN=DST Root CA X3
Validity
Not Before: Mar 17 16:40:46 2016 GMT
Not After : Mar 17 16:40:46 2021 GMT
Subject: C=US, O=Let's Encrypt, CN=Let's Encrypt Authority X3
Subject Public Key Info:...
2010 Mar 05
1
WEBrick 500 error only with https
...rl-C to shutdown
[2010-03-04 17:27:22] INFO WEBrick 1.3.1
[2010-03-04 17:27:22] INFO ruby 1.8.6 (2007-09-24) [i486-linux]
[2010-03-04 17:27:22] INFO
Certificate:
Data:
Version: 1 (0x0)
Serial Number:
80:f2:ab:75:5a:02:94:d7
Signature Algorithm: sha1WithRSAEncryption
Issuer: C=US,.... stuff
Validity
Not Before: Mar 3 18:28:16 2010 GMT
Not After : Feb 29 18:28:16 2020 GMT
Subject: C=US, .......stuff
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public Key:...
2016 May 05
0
[Bug 2567] New: Wrong terminology used for ssh-keygen "-m" option
...t-a-public-key-in-pem-pkcs8-format
http://crypto.stackexchange.com/questions/35093/why-ssh-gen-makes-difference-between-pem-and-pkcs8
"PKCS8" is better be called "SubjectPublicKeyInfo" or "AnyPublicKey"
and "PEM" should be "RSAPublicKey" or "RSAEncryption".
--
You are receiving this mail because:
You are watching the assignee of the bug.
2004 Feb 06
0
Bug (PR#6550)
...ables:
Variable Value
force_response_1_0 1
SSL_SERVER_I_DN_OU Department of Mathematics
SSL_CIPHER_EXPORT false
SSL_SERVER_S_DN_Email webmaster@math.ethz.ch
SERVER_SOFTWARE Apache/2.0.48 (Unix)
SSL_VERSION_INTERFACE mod_ssl/2.0.48
SCRIPT_NAME /mailman/options
SSL_SERVER_A_KEY rsaEncryption
SSL_SERVER_S_DN_ST Switzerland
SERVER_SIGNATURE Apache/2.0.48 (Unix) Server at www.stat.math.ethz.ch Port 443
REQUEST_METHOD POST
PATH_INFO /r-help
SERVER_PROTOCOL HTTP/1.1
SSL_SERVER_S_DN /C=CH/ST=Switzerland/L=Zurich/O=ETH Zurich/OU=Seminar for
Statistics/CN=www.stat.math.ethz.ch...
2004 Jan 06
0
bug report (PR#6394)
...able Value
force_response_1_0 1
SSL_SERVER_I_DN_OU Department of Mathematics
SSL_CIPHER_EXPORT false
SSL_SERVER_S_DN_Email webmaster@math.ethz.ch
SERVER_SOFTWARE Apache/2.0.40 (Red Hat Linux)
SSL_VERSION_INTERFACE mod_ssl/2.0.40
SCRIPT_NAME /mailman/subscribe
SSL_SERVER_A_KEY rsaEncryption
SSL_SERVER_S_DN_ST Switzerland
SERVER_SIGNATURE Apache/2.0.40 Server at www.stat.math.ethz.ch Port 443
REQUEST_METHOD POST
PATH_INFO /r-help
SERVER_PROTOCOL HTTP/1.1
SSL_SERVER_S_DN /C=CH/ST=Switzerland/L=Zurich/O=ETH Zurich/OU=Seminar for
Statistics/CN=www.stat.math.ethz.ch/emailA...
2003 Dec 05
1
TLS: hostname doesn't match CN??
...lo.com
ibox# nslookup
ibox.desarrollo.com --> 10.0.0.80 (Is the correct IP).
Certificate information:
ibox# openssl x509 -text -noout -in /usr/local/openldap2.1/ssl/servercrt.pem
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 2 (0x2)
Signature Algorithm: md5WithRSAEncryption
Issuer: C=ES, ST=Barcelona, L=Barcelona, O=OpenWired SL,
OU=ibox, CN=iboxCA
Validity
Not Before: Dec 4 17:40:37 2003 GMT
Not After : Dec 3 17:40:37 2004 GMT
Subject: C=ES, ST=Barcelona, L=Barcelona, O=OpenWired SL,
OU=ibox, CN=ibox.desarrollo.com...
2024 Jan 26
1
Gluster communication via TLS client problem
...n
-------
Testing with openssl on the client show:
root at cluster-client:~# openssl s_client -CAfile
/usr/lib/ssl/glusterfs.ca -connect c01.gluster:24007
CONNECTED(00000003)
depth=0 CN = c01.gluster
verify return:1
---
Certificate chain
0 s:CN = c01.gluster
i:CN = c01.gluster
a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256
v:NotBefore: Jan 26 08:27:12 2024 GMT; NotAfter: Feb 25 08:27:12
2024 GMT
---
Server certificate
-----BEGIN CERTIFICATE-----
MIIDDTCCAfWgAwIBAgIULCwcIV9jWFzeZoeO1Xs5TJ9J5rkwDQYJKoZIhvcNAQEL
BQAwFjEUMBIGA1UEAwwLYzAxLmdsdXN0ZXIwHhcNMjQwMTI2MDgyNzEyWhcNMjQw
MjI1MDg...
2016 Jul 03
1
Where is krb5.keytab or equivalent?
...rivate/MAIL.key
> /etc/ssl/certs/OHPRS/easyrsa/issued/dovecot.crt
>
> $ openssl x509 -text -in /etc/ssl/certs/OHPRS/easyrsa/issued/dovecot.crt
>
> Certificate:
> Data:
> Version: 3 (0x2)
> Serial Number: 1 (0x1)
> Signature Algorithm: sha256WithRSAEncryption
> Issuer: CN=mail.hprs.local
> Validity
> Not Before: Jul 2 05:54:26 2016 GMT
> Not After : Jun 30 05:54:26 2026 GMT
> Subject: CN=mail.hprs.local
> Subject Public Key Info:
> Public Key Algorithm: rsaE...
2024 Jan 26
1
Gluster communication via TLS client problem
...---
Testing with openssl on the client show:
root at cluster-client:~# openssl s_client -CAfile
/usr/lib/ssl/glusterfs.ca -connect c01.gluster:24007
CONNECTED(00000003)
depth=0 CN = c01.gluster
verify return:1
---
Certificate chain
0 s:CN = c01.gluster
i:CN = c01.gluster
a:PKEY: rsaEncryption, 2048 (bit); sigalg: RSA-SHA256
v:NotBefore: Jan 26 08:27:12 2024 GMT; NotAfter: Feb 25 08:27:12
2024 GMT
---
Server certificate
-----BEGIN CERTIFICATE-----
MIIDDTCCAfWgAwIBAgIULCwcIV9jWFzeZoeO1Xs5TJ9J5rkwDQYJKoZIhvcNAQEL
BQAwFjEUMBIGA1UEAwwLYzAxLmdsdXN0ZXIwHhcNMjQwMTI2MDgyNzEyWhcNMjQw
MjI...
2016 Jul 03
0
Where is krb5.keytab or equivalent?
...a/private/ca.key
/etc/ssl/certs/OHPRS/easyrsa/private/MAIL.key
/etc/ssl/certs/OHPRS/easyrsa/issued/dovecot.crt
$ openssl x509 -text -in /etc/ssl/certs/OHPRS/easyrsa/issued/dovecot.crt
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 1 (0x1)
Signature Algorithm: sha256WithRSAEncryption
Issuer: CN=mail.hprs.local
Validity
Not Before: Jul 2 05:54:26 2016 GMT
Not After : Jun 30 05:54:26 2026 GMT
Subject: CN=mail.hprs.local
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (204...
2016 Jul 02
0
Where is krb5.keytab or equivalent?
...rivate/MAIL.key
> /etc/ssl/certs/OHPRS/easyrsa/issued/dovecot.crt
>
> $ openssl x509 -text -in /etc/ssl/certs/OHPRS/easyrsa/issued/dovecot.crt
>
> Certificate:
> Data:
> Version: 3 (0x2)
> Serial Number: 1 (0x1)
> Signature Algorithm: sha256WithRSAEncryption
> Issuer: CN=mail.hprs.local
> Validity
> Not Before: Jul 2 05:54:26 2016 GMT
> Not After : Jun 30 05:54:26 2026 GMT
> Subject: CN=mail.hprs.local
> Subject Public Key Info:
> Public Key Algorithm: rsaE...
2011 Feb 15
11
Puppetmasterd not receiving certificate request
Hi: I''m trying to configure Puppet on Ubuntu, and strangely I am never
able to generate a certificate because my server never shows any
pending certificate requests.
Put differently, on the server I am running puppetmasterd and on the
client I am able to connect to the server, but the client continues
printing
notice: Did not receive certificate
warning: peer certificate
2011 May 08
3
Unable to REGISTER to the Asterisk v1.8.3.3 server via SIP/TLS
...main.com:5061
Authentication Username: 361
- - -
[ Setup > Certificates > Server Certificates ]
Country: ; State: ; Locality ; Organization: ; Common Name:
pbx.domain.com; eMail:
Version: 2
Serial Number: 00b6b63eb67ed2111345253c228264d093
Signature Algorithm: 1.2.840.113549.1.1.5 (sha1WithRSAEncryption)
Signature: 28ce574c9715e1e59dfc90829287ab31fdbf0e0212dc488b106e71ffaaa339610492dc091d440772...
Issuer: Country: GB; State: Greater Manchester; Locality Salford;
Organization: Comodo CA Limited; Common Name: PositiveSSL CA; eMail:
Validity: 27/04/11 - 26/04/12
SHA1-Fingerprint: 38d13c709ab1cc9b434c...
2013 Dec 12
1
Need help in addressing this error - ERROR OpenSSL::SSL::SSLError: SSL_accept returned=1 errno=0 state=SSLv3 read client certificate A: tlsv1 alert unknown ca
...2 08:55:39] INFO WEBrick 1.3.1
[2013-12-12 08:55:39] INFO ruby 1.9.3 (2013-06-27) [x86_64-linux]
[2013-12-12 08:55:39] DEBUG TCPServer.new(0.0.0.0, 8140)
[2013-12-12 08:55:39] INFO
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 10 (0xa)
Signature Algorithm: sha256WithRSAEncryption
Issuer: CN=Puppet CA generated on savbu-razor-server.cisco.com at
2013-12-10 05:05:10 -0800
Validity
Not Before: Dec 11 16:55:39 2013 GMT
Not After : Dec 11 16:55:39 2018 GMT
Subject: CN=10.193.174.38
Subject Public Key Info:
Publ...
2016 Jul 02
5
Where is krb5.keytab or equivalent?
OK, let me go through exactly what you did:
you:
> Here's the test (I must run mutt not telnet like i mentioned earlier to
> get the imap tickets).
>
> root at server:~# kinit achim
> Password for achim at DOMAIN.LOCAL:
> [I enter my password]
As root on AD/DC mail.hprs.local:
me:
$ kinit mark
Password for mark at HPRS.LOCAL:
[I enter my password]
you:
>
2011 Dec 16
12
Seperate CA's/Master behind load balancer
Hello,
Attempting to setup a CA primary/standby as well as seperate
puppetmaster servers (all running Apache/Passenger) behind another
Apache/Passenger type load balancer.
Clients are not getting certs:-
err: Could not request certificate: Could not intern from s: nested
asn1 error
Clearly an SSL issue but not something I know a great deal about.
loadbalancer.conf
# Puppet Load Balancing
2004 Apr 13
1
Patch Status
...waiting for MONITOR_ANS_SIGN
debug3: mm_request_receive_expect entering: type 5
debug3: mm_request_receive entering
debug3: monitor_read: checking request 4
debug3: mm_answer_sign
debug3: ssh_x509_sign: key_type=RSA+cert,
key_ssh_name=x509v3-sign-rsa
debug3: ssh_x509_sign: evp_md { 4(md5),
8(md5WithRSAEncryption), 16, ... }
debug3: ssh_x509_sign: return 0
debug3: mm_answer_sign: signature 0x809cdc0(151)
debug3: mm_request_send entering: type 5
debug2: monitor_read: 4 used once, disabling now
debug3: mm_request_receive entering
debug1: SSH2_MSG_KEX_DH_GEX_REPLY sent
debug2: kex_derive_keys
debug2: set_newke...