- Messages
- 303
- Reaction score
- 0
- Points
- 26
keep it up guys... sayang di ako magaling sa linux at ssl... CDC na connection ko... wala na ring makitang pempem at keykey... hay.... :sad:
Most of our features and services are available only to members, so we encourage you to login or register a new account. Registration is free, fast and simple. You only need to provide a valid email. Being a member you'll gain access to all member forums and features, post a message to ask question or provide answer, and share or find resources related to mobile phones, tablets, computers, game consoles, and multimedia.
All that and more, so what are you waiting for, click the register button and join us now! Ito ang website na ginawa ng pinoy para sa pinoy!
habang tinitignan ko yung maigi yung nagenerate ko Cert... langhiya dito namali sa TYPE: printable string, etc... nang inaakala ko na MALAPIT NA KO SA KATOTOHANAN ...ang makulit dito.. tinawagan ako ng barkada at aming pinuntahan mga clients niya para ipakita lang sa akin na mula nung nadeploy nya yung mga MODEM ay CHANGE MAC lang ang ginagawa nya, walang Cert walang Key whatsoever.. nagulat talaga ako.. apat na clients ang pununtahan namin pare pareho CHANGE MAC lang talaga.. ang area is IRISAN BAGUIO CITY.. yung isa sa CITY CAMP Baguio City din pero ganito ang nangyare sa CITY CAMP.. kapag sa 234xxxx frequency connected change MAC lang sya, pero kapag sa 235xxxx need ng PEM at KEY... BIGLANG NAGULO ANG ISIP KO... thinking of an explanation bakit ganon.. bakit??????? kaya for now, stop muna ako dito.. I will continue to solve the missing link kung puede maka connect without PEM at KEY... i will give it 1 week... pero kapag di ko ma-solve, babalik ako dito sa pagtuklas kung pano ma-clone ang CERT generation... simple lang kasi, kahit paano ba magenerate ang key walang kaso yun as long as RSA - SHA 256.. because a public key will be issued too.. (PKI)... ang mahalaga is how to open the KEY (using the exact phrase) then this key will be used to open the Certificate which should contain the exact information needed by the SERVER for authentication.. and finally dapat MATCH ang MODULUS ng KEY at CERT.. so it's in the CERT'S information and the CERT do contain details which are not properly rendered by the Online Decoder tools na nagamit nyo..
habang tinitignan ko yung maigi yung nagenerate ko Cert... langhiya dito namali sa TYPE: printable string, etc... nang inaakala ko na MALAPIT NA KO SA KATOTOHANAN ...ang makulit dito.. tinawagan ako ng barkada at aming pinuntahan mga clients niya para ipakita lang sa akin na mula nung nadeploy nya yung mga MODEM ay CHANGE MAC lang ang ginagawa nya, walang Cert walang Key whatsoever.. nagulat talaga ako.. apat na clients ang pununtahan namin pare pareho CHANGE MAC lang talaga.. ang area is IRISAN BAGUIO CITY.. yung isa sa CITY CAMP Baguio City din pero ganito ang nangyare sa CITY CAMP.. kapag sa 234xxxx frequency connected change MAC lang sya, pero kapag sa 235xxxx need ng PEM at KEY... BIGLANG NAGULO ANG ISIP KO... thinking of an explanation bakit ganon.. bakit??????? kaya for now, stop muna ako dito.. I will continue to solve the missing link kung puede maka connect without PEM at KEY... i will give it 1 week... pero kapag di ko ma-solve, babalik ako dito sa pagtuklas kung pano ma-clone ang CERT generation...
tandaan TLS ang gamit ng mga devices natin (SSL is the OLD protocol)
para saan yan TLS? this is to ensure that the server is talking to a trusted device.. usually involves the recipient verifying the digital signature of the sender using the sender's PUBLIC KEY... The TLS uses a third party, a Certificate Authority (CA) eto yung Issuer ID na problem ko, to identify one end or both end of the transmission/transaction
The recipient (in our case, this is the SERVER) checks that the certificate was issued by a trusted party (usually a trusted root CA), that the certificate is still valid and that the certificate is related to the Server contacted.
Dito nagkakatalo sa TLS details na sinusubukan natin gayahin:
The sender uses the public key, to encrypt a random symmetric encryption key and sends it to the server ... bakit dito? yung PUBLIC KEY ang manggagaling sa AUTHORITY.. yung Private Key dalawa yan, private key ng device natin at yung Private key ng server... wala silang kinalaman sa isa't isa.. kapag ginamit yung private key with the Public key doon mo pa lang magagamit..
Information can be encrypted by one key but can only be decrypted by the other key pair (Private-Public Key Pair).. Dito maraming nalilito... ANONG KEY BA TINUTUKOY MO? Private Key Ba? or Public Key?
kung PRIVATE KEY kahit anong Private key pa yan.. as long as yung keys are similar in nature and can be used alternatively: what one key encrypts, the other key pair can decrypt..
ganito sa sender Private Key Mo plus Public Key equals encryption............. sa kabila sa receiver, Private Key Nya plus Public Key equals decryption...
Since alam ng lahat si Public Key, ganito ang requirement ni server para verified yung device mo: the Server will ask your Device to send a non confidential signed message that will contain the Device Public Key as well as a certificate.
at ito na nga yung last problem ko na Public Key Info which is the Authority Key Identifier at yung keyid galing yan sa Issuer which is Green Packet
MAGULO BA? sa mga nakakaintindi tulong na lang.. again dalawang KEY ito... kasi PRIVATE-PUBLIC KEY PAIR ENCRYPTION ito..
kaya kuha nyo why yung wmx_client_ca.pem ay tatlo? bakit? again PRIVATE-PUBLIC KEY PAIR ENCRYPTION
yung wmx_priv_key.key will be used with the PKI to encrypt the info
PERO HINDI GAGAMITIN SI wmx_priv_key.key to DECRYPT the INFO.. yung server_priv_key.key ang gagamitin ni server to DECRYPT the INFO...
habang tinitignan ko yung maigi yung nagenerate ko Cert... langhiya dito namali sa TYPE: printable string, etc... nang inaakala ko na MALAPIT NA KO SA KATOTOHANAN ...ang makulit dito.. tinawagan ako ng barkada at aming pinuntahan mga clients niya para ipakita lang sa akin na mula nung nadeploy nya yung mga MODEM ay CHANGE MAC lang ang ginagawa nya, walang Cert walang Key whatsoever.. nagulat talaga ako.. apat na clients ang pununtahan namin pare pareho CHANGE MAC lang talaga.. ang area is IRISAN BAGUIO CITY.. yung isa sa CITY CAMP Baguio City din pero ganito ang nangyare sa CITY CAMP.. kapag sa 234xxxx frequency connected change MAC lang sya, pero kapag sa 235xxxx need ng PEM at KEY... BIGLANG NAGULO ANG ISIP KO... thinking of an explanation bakit ganon.. bakit??????? kaya for now, stop muna ako dito.. I will continue to solve the missing link kung puede maka connect without PEM at KEY... i will give it 1 week... pero kapag di ko ma-solve, babalik ako dito sa pagtuklas kung pano ma-clone ang CERT generation...
tandaan TLS ang gamit ng mga devices natin (SSL is the OLD protocol)
para saan yan TLS? this is to ensure that the server is talking to a trusted device.. usually involves the recipient verifying the digital signature of the sender using the sender's PUBLIC KEY... The TLS uses a third party, a Certificate Authority (CA) eto yung Issuer ID na problem ko, to identify one end or both end of the transmission/transaction
The recipient (in our case, this is the SERVER) checks that the certificate was issued by a trusted party (usually a trusted root CA), that the certificate is still valid and that the certificate is related to the Server contacted.
Dito nagkakatalo sa TLS details na sinusubukan natin gayahin:
The sender uses the public key, to encrypt a random symmetric encryption key and sends it to the server ... bakit dito? yung PUBLIC KEY ang manggagaling sa AUTHORITY.. yung Private Key dalawa yan, private key ng device natin at yung Private key ng server... wala silang kinalaman sa isa't isa.. kapag ginamit yung private key with the Public key doon mo pa lang magagamit..
Information can be encrypted by one key but can only be decrypted by the other key pair (Private-Public Key Pair).. Dito maraming nalilito... ANONG KEY BA TINUTUKOY MO? Private Key Ba? or Public Key?
kung PRIVATE KEY kahit anong Private key pa yan.. as long as yung keys are similar in nature and can be used alternatively: what one key encrypts, the other key pair can decrypt..
ganito sa sender Private Key Mo plus Public Key equals encryption............. sa kabila sa receiver, Private Key Nya plus Public Key equals decryption...
Since alam ng lahat si Public Key, ganito ang requirement ni server para verified yung device mo: the Server will ask your Device to send a non confidential signed message that will contain the Device Public Key as well as a certificate.
at ito na nga yung last problem ko na Public Key Info which is the Authority Key Identifier at yung keyid galing yan sa Issuer which is Green Packet
MAGULO BA? sa mga nakakaintindi tulong na lang.. again dalawang KEY ito... kasi PRIVATE-PUBLIC KEY PAIR ENCRYPTION ito..
kaya kuha nyo why yung wmx_client_ca.pem ay tatlo? bakit? again PRIVATE-PUBLIC KEY PAIR ENCRYPTION
yung wmx_priv_key.key will be used with the PKI to encrypt the info
PERO HINDI GAGAMITIN SI wmx_priv_key.key to DECRYPT the INFO.. yung server_priv_key.key ang gagamitin ni server to DECRYPT the INFO...
habang tinitignan ko yung maigi yung nagenerate ko Cert... langhiya dito namali sa TYPE: printable string, etc... nang inaakala ko na MALAPIT NA KO SA KATOTOHANAN ...ang makulit dito.. tinawagan ako ng barkada at aming pinuntahan mga clients niya para ipakita lang sa akin na mula nung nadeploy nya yung mga MODEM ay CHANGE MAC lang ang ginagawa nya, walang Cert walang Key whatsoever.. nagulat talaga ako.. apat na clients ang pununtahan namin pare pareho CHANGE MAC lang talaga.. ang area is IRISAN BAGUIO CITY.. yung isa sa CITY CAMP Baguio City din pero ganito ang nangyare sa CITY CAMP.. kapag sa 234xxxx frequency connected change MAC lang sya, pero kapag sa 235xxxx need ng PEM at KEY... BIGLANG NAGULO ANG ISIP KO... thinking of an explanation bakit ganon.. bakit??????? kaya for now, stop muna ako dito.. I will continue to solve the missing link kung puede maka connect without PEM at KEY... i will give it 1 week... pero kapag di ko ma-solve, babalik ako dito sa pagtuklas kung pano ma-clone ang CERT generation...
tandaan TLS ang gamit ng mga devices natin (SSL is the OLD protocol)
para saan yan TLS? this is to ensure that the server is talking to a trusted device.. usually involves the recipient verifying the digital signature of the sender using the sender's PUBLIC KEY... The TLS uses a third party, a Certificate Authority (CA) eto yung Issuer ID na problem ko, to identify one end or both end of the transmission/transaction
The recipient (in our case, this is the SERVER) checks that the certificate was issued by a trusted party (usually a trusted root CA), that the certificate is still valid and that the certificate is related to the Server contacted.
Dito nagkakatalo sa TLS details na sinusubukan natin gayahin:
The sender uses the public key, to encrypt a random symmetric encryption key and sends it to the server ... bakit dito? yung PUBLIC KEY ang manggagaling sa AUTHORITY.. yung Private Key dalawa yan, private key ng device natin at yung Private key ng server... wala silang kinalaman sa isa't isa.. kapag ginamit yung private key with the Public key doon mo pa lang magagamit..
Information can be encrypted by one key but can only be decrypted by the other key pair (Private-Public Key Pair).. Dito maraming nalilito... ANONG KEY BA TINUTUKOY MO? Private Key Ba? or Public Key?
kung PRIVATE KEY kahit anong Private key pa yan.. as long as yung keys are similar in nature and can be used alternatively: what one key encrypts, the other key pair can decrypt..
ganito sa sender Private Key Mo plus Public Key equals encryption............. sa kabila sa receiver, Private Key Nya plus Public Key equals decryption...
Since alam ng lahat si Public Key, ganito ang requirement ni server para verified yung device mo: the Server will ask your Device to send a non confidential signed message that will contain the Device Public Key as well as a certificate.
at ito na nga yung last problem ko na Public Key Info which is the Authority Key Identifier at yung keyid galing yan sa Issuer which is Green Packet
MAGULO BA? sa mga nakakaintindi tulong na lang.. again dalawang KEY ito... kasi PRIVATE-PUBLIC KEY PAIR ENCRYPTION ito..
kaya kuha nyo why yung wmx_client_ca.pem ay tatlo? bakit? again PRIVATE-PUBLIC KEY PAIR ENCRYPTION
yung wmx_priv_key.key will be used with the PKI to encrypt the info
PERO HINDI GAGAMITIN SI wmx_priv_key.key to DECRYPT the INFO.. yung server_priv_key.key ang gagamitin ni server to DECRYPT the INFO...