lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Fri Jun 9 20:09:20 2006 From: eaton.lists at gmail.com (Brian Eaton) Subject: SSL VPNs and security On 6/9/06, Tim <tim-security@...tinelchicken.org> wrote: > For non-managed systems (which you > shouldn't allow into your network via a VPN anyway), installing a CA > cert is as simple as clicking on a link ONCE, and installing the cert. > This cert can be distributed over a VeriSign secured SSL connection. Are you referring to telling end-users to click "Accept this certificate permanently" box on the certificate warning pop-up? Or is there a software package out there that can do this without the warning pop-up? - Brian
Powered by blists - more mailing lists