In response to what "Gary R. Schmidt" <
grsc...@acm.org> wrote :
Hi Gary,
Thanks for pointing to the latest canonical src code...
where I certainly get the hint that the only reliable
binary is one I've compiled myself...
But that assumes a few things that aren't the case:
a. It assumes I _can_ run a Makefile (which I haven't done in a decade)
b. It assumes I know which compiler (and other tools) to use
c. Most importantly, it assumes I can read the code itself
(so as to see if the code is trustworthy of its own right)
None of that is true as I haven't compiled in a decade.
And, besides, I just wanted to run the openssl command
to see whether my newsserver certificate had expired, as per:
o *[Mixmin] Did a certificate expire recently?*
<
https://groups.google.com/forum/#!topic/alt.free.newsservers/mGdgWb-zcjg>
Luckily I found "Win32/Win64 OpenSSL" "light" installers at:
o <
https://slproweb.com/products/Win32OpenSSL.html>
Where that site contained both an MSI & an EXE installer:
o <
http://slproweb.com/download/Win64OpenSSL_Light-1_1_1g.msi>
o <
https://slproweb.com/download/Win64OpenSSL_Light-1_1_1g.exe>
I readily admit I never understood how to choose between those
two types when archiving software
(why would it matter if I archive the EXE or MSI in my archives?).
Arbitrarily, I tried the MSI first, but it failed with a big blue error:
Windows protected your PC
Microsoft Defender SmartScreen prevented an unrecognized app from starting.
Running this app might put your PC at risk.
More info
App: Win64OpenSSL_Light-1_1_1g.msi
Publisher: Unknown publisher
[Run anyway][Don't run]
So I switched to the EXE which seemed to install just fine
although it asked where to store the DLLs, where, once again,
I have no idea how to decide what the ramifications might be:
(o)Windows System directory
(_)Openssl bin directory
I left it at the default above not knowing whether it would matter.
This created the openssl.exe binary (and a bunch of DLLs):
Name: openssl.exe
Size: 543744 bytes (531 KiB)
SHA256: 96D07FF13B53848165AC9D88C76BF62562600B0E0848702FB0E22FC8D39A9593
Which claims to be the latest version of openssl.exe light:
C:\> openssl version
OpenSSL 1.1.1g 21 Apr 2020
And which worked in the following test below just now:
c:\> echo q | openssl s_client -connect
news.albasani.net:563 | openssl x509 -noout -enddate | findstr "notAfter"
Result:
depth=0 C = CH, ST = Some-State, L = Zurich, O = Albasani, OU = Roman Racine, CN =
reader.albasani.net, emailAddress =
roman....@gmail.com
verify error:num=18:self signed certificate
verify return:1
depth=0 C = CH, ST = Some-State, L = Zurich, O = Albasani, OU = Roman Racine, CN =
reader.albasani.net, emailAddress =
roman....@gmail.com
verify error:num=10:certificate has expired
notAfter=Jul 21 15:37:36 2019 GMT
verify return:1
depth=0 C = CH, ST = Some-State, L = Zurich, O = Albasani, OU = Roman Racine, CN =
reader.albasani.net, emailAddress =
roman....@gmail.com
notAfter=Jul 21 15:37:36 2019 GMT
verify return:1
notAfter=Jul 21 15:37:36 2019 GMT
NOTE: I'm not sure why the findstring doesn't grep out the other
crap though. I found the command by googling so maybe I skipped
a step as the results are more than what I would have expected
from a simple grep.