Thanks Nelson. Just after I sent out the question, I came up with
a workaround - exported the key/cert to a P12, imported into a JKS
keystore, generated the CSR using the existing key-pair, approved
the cert and imported the cert into the NSS database. Worked like
a charm (of course, this wouldn'
Arshad Noor wrote:
> I'm trying to use certutil to renew a certificate with an existing
> key-pair. However, it appears that the -R option always generates
> a new key-pair; how does one generate a CSR using existing keys with
> certutil? Or should I be using some other tool? TIA.
Hi Arshad,
T
I'm trying to use certutil to renew a certificate with an existing
key-pair. However, it appears that the -R option always generates
a new key-pair; how does one generate a CSR using existing keys with
certutil? Or should I be using some other tool? TIA.
Arshad Noor
Nelson B wrote:
> Umesh Bywar wrote:
>
>> I am trying to write a man-in-the-middle proxy as an extension to
>> mozilla. This proxy is basically supposed to intercept HTTP/HTTPS
>> requests, parse them and forward them to the appropriate server.
>
> This is a profoundly bad idea. It has serious
Umesh Bywar wrote:
> I am trying to write a man-in-the-middle proxy as an extension to
> mozilla. This proxy is basically supposed to intercept HTTP/HTTPS
> requests, parse them and forward them to the appropriate server.
This is a profoundly bad idea. It has serious security vulnerability
impl
Hi:
I am trying to write a man-in-the-middle proxy as an extension to mozilla.
This proxy is basically supposed to intercept HTTP/HTTPS requests, parse them
and forward them to the appropriate server. To decipher HTTPS requests I need
to do handshake as a server with the client. For this I
6 matches
Mail list logo