![]() ![]() ![]() ![]() |
| Topics this page:
|
|
|
Use | EKU | OID |
---|---|---|
SSL/TLS Web Server Authentication | serverAuth | 1.3.6.1.5.5.7.3.1 |
SSL/TLS Web Client Authentication | clientAuth | 1.3.6.1.5.5.7.3.2 |
Code signing | codeSigning | 1.3.6.1.5.5.7.3.3 |
E-mail Protection (S/MIME) | emailProtection | 1.3.6.1.5.5.7.3.4 |
Trusted Timestamping | timeStamping | 1.3.6.1.5.5.7.3.8 |
Microsoft Individual Code Signing (authenticode) | msCodeInd | 1.3.6.1.4.1.311.2.1.21 |
Microsoft Commercial Code Signing (authenticode) | msCodeCom | 1.3.6.1.4.1.311.2.1.22 |
Microsoft Trust List Signing | msCTLSign | 1.3.6.1.4.1.311.10.3.1 |
Microsoft Server Gated Crypto | msSGC | 1.3.6.1.4.1.311.10.3.3 |
Microsoft Encrypted File System | msEFS | 1.3.6.1.4.1.311.10.3.4 |
Netscape Server Gated Crypto | nsSGC | 2.16.840.1.113730.4.1 |
| ![]() ![]() ![]() |
|
Example of passphrases in movies:
|
So I keep a list of where I've signed up, and encrypt it with a password I haven't used on anything else.
I've gone to using programs to generate password generation passwords and
passphrases.
BTW, I should keep originals in a bank safe deposit box in case my home burns down, and only keep copies in the house.
After Thawte made sure that no one else was using the identity information I supplied, they made sure that I could remember what I entered.
I could use this link from Thawte to access my account (given that I can remember my email address and password).
To access a Windows 2000 server (for example, “Certx”) hosting Web Enrollment Support:
Now that Thawte considers my email address "trusted", I could request, view, and revoke my certificates from Thawte's Certificate Manager page at https://www.thawte.com/cgi/personal/cert/contents.exe
A different X.509 certificate is needed for each email client. The options:
By US export regulations
U.S. Department of Justice FAQ on Encryption Policy April 24, 1998
the “Base DSS and Diffie-Hellman Cryptographic Provider”
and Microsoft Enhanced Cryptographic Provider
can only be used in the United States.
In the US, export controls on commercial encryption products are administered by the
Bureau of Export Administration (BXA) in the U.S. Department of Commerce.
Next, I clicked OK to this pop-up window:
After I clicked OK, an email from Thawte notified me:
“You need to be running the same browser, on the same machine, logged in as the same user, as you were when you made the request."
To confirm that the certificate was really installed in MSIE 5, select Tools -> Internet Options... -> Content tab -> Certificates... button.
Clicking on the "View" button, I notice in the Details section that
the Public key is 1024 bits and the thumbprint (hash) algorithm is
SHA1.
If (when) my computer (eventually) crashes, I will need to be able to restore the keys. I also want to prevent access to my private key by deleting the .pfx file from the computer's hard disk, and importing the keys to the recovery agent account from a USB thumb drive or diskette I can take away with me.
Different export formats can be specified during drag-and-drop copy (in the MSIE "Advanced Options" window):
Root CA on Microsoft IE7 browsers include:
Root CA on Firefox browsers include:
Note: Windows 2000 SP2 added several CA root certificates.
Import the Certificate as a Trusted Certificate from a Java .jar file.
Notice that I left the default selections of SHA and DES based on my earlier observations.
I chose not to sign all my emails. That would seem rather pretentious and a bit too nerdly for internet dating emails.
"No. Now you can tell whether a email is really from me." I explained.
"I can always tell it's from you. It's got your name at the top." she said rather impatiently.
"But what if someone forged my name?"
"I'll still know because no one is as disrespectful to his mother as you are." ;)
Anyway, Hotmail and other web-based email cannot accept certificates. A client program such as Microsoft Outlook, Outlook Express, or Eudora is required. Gmail can accept certs.
I noticed on Thawte page that the trust level is marked "Freemail" and the Certificate Distinguished Name (formal notation describing the holder of a particular certificate) contains my email address, not my name. That's because the CA can't confirm whether someone was impersonating me or not.
So in order for Thawte to really associate my name with the email address, I have to physically present my picture ID's to someone trusted by Thawte.
Thawte uses a "web of trust" -- a transitive trust based on the reputation of individuals.
Thawte required that I get at least 2 notaries to verify my ID. I could use two highly trusted notaries or several less trusted ones. Thawte uses a point system based on the number of identities a notary verifies.
"many mail clients will only recognize the FIRST email address in the certificate. The best strategy is thus to obtain different certificates for your different email accounts."
This would allow single sign-on capability to access several websites with mutual trusts.
| ![]() ![]() ![]() |
| ![]() ![]() ![]() |
| ![]() | ![]() ![]() ![]() |
|
Mathematicians use The terms "encipher" and "encrypt" are synonymous, as are the terms "decipher" and "decrypt".
| ![]() ![]() ![]() |
|
Version | Bytes | Location |
---|---|---|
- | 34,576 | |
- | 39,936 | |
(VS 2008) | 42,256 | C:\Program Files\Microsoft Visual Studio 9.0\SmartDevices\SDK\SDKTools |
(.NET 3.5) | 57,704 | C:\Program Files\Microsoft SDKs\Windows\v6.0A\bin |
The example above assumes these defaults:
# openssl x509 -req -days 365 -in /etc/ssl/private/host.csr \ -signkey /etc/ssl/private/host.key -out /etc/ssl/host.crt
x509 is the type of output (a signed X.509 public-key certificate)
-days 365 specifies the number of days the cert is valid.
-in is the certificate request csr file.
-signkey specifies self-signing using the server's own private key
as the signing (RSA) key in place of the production CA's private key.
-out is the signed X.509 public-key certificate crt file.
In the Project Explorer window (by default on the upper right), select the VBA macro project that you want to digitally sign.
In the VBA menu bar, open menu item "Tools" --> "Digital Signature"
Simply select your own certificate and sign your macro.
Close Excel. When Excel opens again, choose "Always trust this publisher".
To export your certificate from your first computer and import it onto each of the other computers. Save the file to your other computers (email it maybe). Then on the other computers, go to the control panel, same location, and select "Import certificate".
| ![]() ![]() ![]() |
|
You can import a trusted root certificate from several types of files:
| ![]() ![]() ![]() |
| ![]() ![]() ![]() |
| On Sun Solaris 8 machines, Sun offers its Crypto Accelerator 500 Daughterboard, the Crypto Crypto Accelerator 1000 PCI board, and Crypto Accelerator 4000 Board.
Check Point's VPN-1 Accelerator Card III delivers over 400 Mbps 3DES VPN throughput. The QuickSafe SSL Accelerator from Cryptographic Appliances outscales any dedicated SSL accelerator on the market with (1024 bit) SSL operations a second. Their appliance is situated behind web servers (and thus less open to attacks). This allows the maintainance of a session cache (for "true" load balancing) and only a single certificate rather than distributing certificate keys on multiple encryption devices.
The CacheFlow card caches what flows through it — a speed-enhancing feature other products do not offer. The Alteon Switch Alteon iSD-SSL Accelerator. SonicWALL SSL Accelerator PCI Card | ![]() ![]() ![]() |
| ![]() ![]() ![]() |
| ![]()
Java Cryptography Extensions : Practical Guide for Programmers by Jason Weiss | ![]() ![]() ![]() |
Related Topics:
| ![]() ![]() ![]() |
![]()
| Your first name: Your family name: Your location (city, country): Your Email address: |
Top of Page ![]() Thank you! |