I am unable to connect with Mystic and SBBS binkps nodes. I see a couple errors like this..
verify error:num=66:EE certificate key too weak
verify error:num=20:unable to get local issuer certificate
verify error:num=21:unable to verify the first certificate
Is there a way I can lower the requirements of the certificate key or?
Try adding -cipher "ADH:@SECLEVEL=1" or -cipher "ADH:@SECLEVEL=0" onto your openssl command.
Not sure this is the best place to discuss BINKD SSL tunneling,
but the issue is likely that it requires a 2048 or higher bit key
instead of 1024.
Try adding -cipher "ADH:@SECLEVEL=1" or -cipher "ADH:@SECLEVEL=0"
onto your openssl command.
It might be -cipher "ALL:@SECLEVEL=0" or maybe 1. Basically you need
to step down the security level setting to 1 I think because it now defaults to 2 which is a higher key bit.
I don't really know how the command line openssl stuff works
I am unable to connect with Mystic and SBBS binkps nodes. I see
a couple errors like this..
verify error:num=66:EE certificate key too weak
verify error:num=20:unable to get local issuer certificate
verify error:num=21:unable to verify the first certificate
Is there a way I can lower the requirements of the certificate
key or?
Not sure this is the best place to discuss BINKD SSL tunneling, but
the issue is likely that it requires a 2048 or higher bit key instead
of 1024.
Try adding -cipher "ADH:@SECLEVEL=1" or -cipher "ADH:@SECLEVEL=0"
onto your openssl command.
This has nothing to do with binkd ssl "tunneling". Is Mystic (and
binkit) using a weak certificate by default? Nobody uses 1024 bit keys anymore.
On Mon, 2 Mar 2020 02:09:11 +0700
"g00r00 -> Al" <0@108.1.21> wrote:
I am unable to connect with Mystic and SBBS binkps nodes. I see
a couple errors like this..
verify error:num=66:EE certificate key too weak
verify error:num=20:unable to get local issuer certificate
verify error:num=21:unable to verify the first certificate
Is there a way I can lower the requirements of the certificate
key or?
Not sure this is the best place to discuss BINKD SSL tunneling,
but the issue is likely that it requires a 2048 or higher bit
key instead of 1024.
Try adding -cipher "ADH:@SECLEVEL=1" or -cipher
"ADH:@SECLEVEL=0" onto your openssl command.
This has nothing to do with binkd ssl "tunneling". Is Mystic (and
binkit) using a weak certificate by default? Nobody uses 1024 bit
keys anymore.
This has nothing to do with binkd ssl "tunneling". Is Mystic
(and binkit) using a weak certificate by default? Nobody uses
1024 bit keys anymore.
Gee, I instantly knew the issue, explained it to Al and gave him a
command line to get it working. Its almost like I'm not wrong and I understand what is going on.
| Sysop: | Weed Hopper |
|---|---|
| Location: | Clearwater, FL |
| Users: | 16 |
| Nodes: | 6 (0 / 6) |
| Uptime: | 21:44:40 |
| Calls: | 133 |
| Files: | 50,534 |
| D/L today: |
115 files (17,337K bytes) |
| Messages: | 323,383 |