What is pempass in case of an encrypted private key??

2001-08-14 Thread Aslam

Hi,

Does encrypted private key in PEM format is same as the PKCS8 encrypted
private key??

Thanks
Aslam
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: Cipher suites

2001-08-14 Thread Lutz Jaenicke

On Tue, Aug 14, 2001 at 02:09:09PM -0400, Aslam wrote:
 How can I set or add specific TLS cipher suite in SSL_CTX. Cause what I
 found is in get_client_hello() there is some default sting for cipher suite
 and acoordingly all the default cipher suites r added. Isn't there any API
 which takes a cipher string and corrospondingly loads the cipher suit.

man SSL_CTX_set_cipher_list!? man ciphers
Lutz
-- 
Lutz Jaenicke [EMAIL PROTECTED]
BTU Cottbus   http://www.aet.TU-Cottbus.DE/personen/jaenicke/
Lehrstuhl Allgemeine Elektrotechnik  Tel. +49 355 69-4129
Universitaetsplatz 3-4, D-03044 Cottbus  Fax. +49 355 69-4153
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



pem password ??

2001-08-14 Thread Aslam

Hi..


What exactly is the use of pempass (PEM pasword string) when any private key
is written on disk??


Thanks
Aslam
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



RE: Cipher suites

2001-08-14 Thread Aslam

Hi..

man SSL_CTX_set_cipher_list 

but what should be the string format for the last parameter of above
function call..

Thanks
Aslam


-Original Message-
From: Lutz Jaenicke [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, August 14, 2001 3:27 PM
To: '[EMAIL PROTECTED]'
Subject: Re: Cipher suites


On Tue, Aug 14, 2001 at 02:09:09PM -0400, Aslam wrote:
 How can I set or add specific TLS cipher suite in SSL_CTX. Cause what I
 found is in get_client_hello() there is some default sting for cipher
suite
 and acoordingly all the default cipher suites r added. Isn't there any API
 which takes a cipher string and corrospondingly loads the cipher suit.

man SSL_CTX_set_cipher_list!? man ciphers
Lutz
-- 
Lutz Jaenicke [EMAIL PROTECTED]
BTU Cottbus   http://www.aet.TU-Cottbus.DE/personen/jaenicke/
Lehrstuhl Allgemeine Elektrotechnik  Tel. +49 355 69-4129
Universitaetsplatz 3-4, D-03044 Cottbus  Fax. +49 355 69-4153
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: Cipher suites

2001-08-14 Thread Eric Rescorla

Aslam [EMAIL PROTECTED] writes:

 Hi..
 
 man SSL_CTX_set_cipher_list 
Yeah, read the man page. Check out the documents on www.openssl.org

 but what should be the string format for the last parameter of above
 function call..
This is described in the ciphers man page.

-Ekr
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: pem password ??

2001-08-14 Thread Eric Rescorla

Aslam [EMAIL PROTECTED] writes:
 What exactly is the use of pempass (PEM pasword string) when any private key
 is written on disk??
That's the point. Since it's written on disk any idiot who can read
the disk can read the private key file. You encrypt it with
the password so that it's useless to such an attacker.

There's quite a bit more information about this in Chapter 5
of SSL and TLS.

-Ekr

[Eric Rescorla   [EMAIL PROTECTED]]
Author of SSL and TLS: Designing and Building Secure Systems
  http://www.rtfm.com/
  
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



RE: pem password ??

2001-08-14 Thread Aslam

Is PEM password encrypted private keys different from the PKCS8 password
encrypted private keys???

-Original Message-
From: Eric Rescorla [mailto:[EMAIL PROTECTED]]
Sent: Tuesday, August 14, 2001 3:55 PM
To: [EMAIL PROTECTED]
Subject: Re: pem password ??


Aslam [EMAIL PROTECTED] writes:
 What exactly is the use of pempass (PEM pasword string) when any private
key
 is written on disk??
That's the point. Since it's written on disk any idiot who can read
the disk can read the private key file. You encrypt it with
the password so that it's useless to such an attacker.

There's quite a bit more information about this in Chapter 5
of SSL and TLS.

-Ekr

[Eric Rescorla   [EMAIL PROTECTED]]
Author of SSL and TLS: Designing and Building Secure Systems
  http://www.rtfm.com/
  
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



installing openssh

2001-08-14 Thread Tony A. Tran

i'm trying to install openssh and it says i need openssl and zlib.  i'm
unsure on how i'm suppose to install these packages.  can someone show
me some documentation on how i can do this.  thanks

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



RE: Using DSA to sign a PKCS7 message

2001-08-14 Thread Mauricio Salinas

Steve:
Excuse me to be so meticolous, but you mean demos/sign.c, right ? I
could'nt find a sign.c in crypto.

Anayway, is a good notice, as I wanted to use the demos/sign.c for
building a tool to sign and verify  files.

Thks,

Mauricio Salinas

 -Mensaje original-
 De:   Dr S N Henson [SMTP:[EMAIL PROTECTED]]
 Enviado el:   lunes, 13 de agosto de 2001 12:46
 Para: [EMAIL PROTECTED]
 Asunto:   Re: Using DSA to sign a PKCS7 message
 
 
 
 Frank Geck wrote:
  
  I have been looking at the crypto/sign.c.  I see how yo can specify
 the
  hash to use but not the signature algorithm.  How do you do that or
 what
  one does it use, does any one know?
  
 
 Don't rely on crypto/sign.c its obsolete. If you use the S/MIME API
 (example in apps/smime.c) its all automatic when a DSA key is
 specified.
 
 Steve.
 -- 
 Dr Stephen N. Henson.   http://www.drh-consultancy.demon.co.uk/
 Personal Email: [EMAIL PROTECTED] 
 Senior crypto engineer, Celo Communications: http://www.celocom.com/
 Core developer of the   OpenSSL project: http://www.openssl.org/
 Business Email: [EMAIL PROTECTED] PGP key: via homepage.
 
 
 __
 OpenSSL Project http://www.openssl.org
 User Support Mailing List[EMAIL PROTECTED]
 Automated List Manager   [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: pem password ??

2001-08-14 Thread Eric Rescorla

Aslam [EMAIL PROTECTED] writes:

 Is PEM password encrypted private keys different from the PKCS8 password
 encrypted private keys???
Yes, it's a slightly different key derivation function and 
different formatting.

-Ekr

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: Using DSA to sign a PKCS7 message

2001-08-14 Thread Frank Geck

Sorry,  I ment crypto/pkcs7/sign.c

Mauricio Salinas wrote:

 Steve:
 Excuse me to be so meticolous, but you mean demos/sign.c, right ? I
 could'nt find a sign.c in crypto.

 Anayway, is a good notice, as I wanted to use the demos/sign.c for
 building a tool to sign and verify  files.

 Thks,

 Mauricio Salinas

  -Mensaje original-
  De:   Dr S N Henson [SMTP:[EMAIL PROTECTED]]
  Enviado el:   lunes, 13 de agosto de 2001 12:46
  Para: [EMAIL PROTECTED]
  Asunto:   Re: Using DSA to sign a PKCS7 message
 
 
 
  Frank Geck wrote:
  
   I have been looking at the crypto/sign.c.  I see how yo can specify
  the
   hash to use but not the signature algorithm.  How do you do that or
  what
   one does it use, does any one know?
  
 
  Don't rely on crypto/sign.c its obsolete. If you use the S/MIME API
  (example in apps/smime.c) its all automatic when a DSA key is
  specified.
 
  Steve.
  --
  Dr Stephen N. Henson.   http://www.drh-consultancy.demon.co.uk/
  Personal Email: [EMAIL PROTECTED]
  Senior crypto engineer, Celo Communications: http://www.celocom.com/
  Core developer of the   OpenSSL project: http://www.openssl.org/
  Business Email: [EMAIL PROTECTED] PGP key: via homepage.
 
 
  __
  OpenSSL Project http://www.openssl.org
  User Support Mailing List[EMAIL PROTECTED]
  Automated List Manager   [EMAIL PROTECTED]
 __
 OpenSSL Project http://www.openssl.org
 User Support Mailing List[EMAIL PROTECTED]
 Automated List Manager   [EMAIL PROTECTED]

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



ssl read time out

2001-08-14 Thread Wei-Hsin Lee

Hi,

  I am currently using openssl 0.9.6 with my web server. My web 
server is kind of proprietary one. There is a problem I have 
with this server. When a https request comes in, the server
spawns a thread to handle the request. At the end, client
sends a FIN or RST packet to close the connection. If that 
packet get lost, then the thread keep hanging with open
socket. So how can I setup the ssl connection to timeout
on read after n seconds? Any advice appreciated. Thanks in advance,

-Wei-Hsin
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Creating / verifying certificates

2001-08-14 Thread Uros Gaber - PowerCom



Hi!

I would like to know 
how to create a 128bit server certificate or how to verify it is 
128bit...

Thank 
you!

Uro¹ GaberPowerCom Gaber  Globoènik 
d.n.o.http://www.powercom-si.comeMail: [EMAIL PROTECTED]GSM: 040/848-001Fax: 
040/848-026Tel: 01/724-84-26Fax: 01/724-84-27


BEGIN:VCARD
VERSION:2.1
N:Gaber;Uroš
FN:Uroš Gaber
ORG:PowerCom Gaber  Globoènik d.n.o.
TITLE:direktor
TEL;WORK;VOICE:01/724-84-26; 040/848-001
TEL;WORK;FAX:01/724-84-26; 040/848-026
ADR;WORK:;;Cesta talcev 19b;Domžale;;1230;Slovenija
LABEL;WORK;ENCODING=QUOTED-PRINTABLE:Cesta talcev 19b=0D=0ADom=9Eale 1230=0D=0ASlovenija
EMAIL;PREF;INTERNET:[EMAIL PROTECTED]
REV:20010811T141917Z
END:VCARD



SSL_get_app_data/SSL_set_app_data

2001-08-14 Thread ganesh kumar godavari

hai,
   i am looking out for information on SSL_get_app_data
and SSL_set_app_data. i could not find any documentation
on the openssl website
http://www.openssl.org/docs/ssl/ssl.html). i had gone
through the code of ssl.h to see how the functions are
handled. they look pretty simple, but i am facing the
following problem.

i am storing some data in the ssl structure using
ssl_set_app_data(ssl,data_structure);
and retreving using
stored_data = (data_structure *) ssl_get_app_data(ssl);

it is giving me no compilation error. but is causing
broken pipe error at run-time.

can any one tell me what is the use of these functions??


Thanks in advace
ganesh


_
For Rs. 2,000,000 worth of Aptech scholarships click below
http://clients.rediff.com/clients/aptechsch/index1.htm



__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



session caching

2001-08-14 Thread ganesh kumar godavari

hai,
i am writting a minimal concurrent ssl server, i am
planning to use external session caching for this.
i am using the the following hooks.

 SSL_CTX_sess_set_remove_cb(ctx, cb)
void call_back(SSL_CTX,SSL_SESSION)

i am calling the callback functions before opening the
connection. i am getting the following
* Warning: assignment from incompatible pointer type *

i looked for information in docs on openssl website, and
also on ssleay.txt(comes with source though obsolete) but
i could not find information.

can anyone tell me if the arguments for the callback
function are right or not.

i want to test if the hook is called perfectly or not.
can anyone tell me a way to delete the session
information from openssl internal cache?


Thanks in advance
ganesh

_
For Rs. 2,000,000 worth of Aptech scholarships click below
http://clients.rediff.com/clients/aptechsch/index1.htm



__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Client certificate verify...

2001-08-14 Thread Carlo Medas



Hi all,
I'm using self-singned certificates and when my 
client connects to the SSL server, he gets the CA, but the result of the verify 
function is: That CA is not in the list of trusted CAs...
How can I add or modify the list of trusted 
CAs?
Thx all

Carlo Medas


Re: Creating / verifying certificates

2001-08-14 Thread Rich Salz

 I would like to know how to create a 128bit server certificate or how
 to verify it is 128bit...

You are confusing the session key (typically RC4) with the certificate
(typically RSA 1024 bit).

You can limit what crypto suites are used.  See the ciphers manpage.
-- 
Zolera Systems, Securing web services (XML, SOAP, Signatures,
Encryption)
http://www.zolera.com
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



REMOVE

2001-08-14 Thread Decoeur, Joel





  -Original Message-From: [EMAIL PROTECTED] 
  [mailto:[EMAIL PROTECTED]]Sent: Thursday, January 11, 2001 1:11 
  AMTo: [EMAIL PROTECTED]Subject: 
  Time to Refinance?
  
  MORTGAGE QUOTESDEBT CONSOLIDATION-REFINANCING-SECOND 
  MORTGAGES-HOME IMPROVEMENTCLICK HEREINTEREST RATES GOING DOWN!You 
  can:GET OUT 
  OF DEBT!GET A BETTER % RATE ON YOUR LOAN!IMPROVE YOUR 
  HOME!HAVE EXTRA SPENDING MONEY!CLICK HEREFor a FREE Quote!It'sQUICK , EASY and COMPLETE
  Want to be removed from our list of Home Owners? Simply reply to 
  this email with "REMOVE" in the subject line only,and you will proptly be 
  deleted!__ 
  OpenSSL Project http://www.openssl.org User Support Mailing List 
  [EMAIL PROTECTED] Automated List Manager 
[EMAIL PROTECTED]


OpenSSL IO_ERROR

2001-08-14 Thread Imran Badr

Hi,
I am noticing this strange behaviour of apache running on openssl and
mod_ssl. Session establishment works just fine but when I start browsing I
get error messages on my browser. IE5 says that data area passed to a
system call is too small and Netscape Navigator says Security library has
experienced an error. You will probably be unable to connect to this site
securely. When I look at ssl log file of apache, I get following entries:

[14/Aug/2001 19:39:45 01504] [debug] OpenSSL: I/O error, 5 bytes expected to
read on BIO#041F61E8 [mem: 04294500]
[14/Aug/2001 19:39:48 01504] [debug] OpenSSL: I/O error, 5 bytes expected to
read on BIO#00812C38 [mem: 0424FED0]
[14/Aug/2001 19:39:48 01504] [debug] OpenSSL: I/O error, 23 bytes expected
to write on BIO#00812C38 [mem: 042586E0]
[14/Aug/2001 19:39:48 01504] [debug] OpenSSL: I/O error, 23 bytes expected
to write on BIO#00812C38 [mem: 042586E0]
[14/Aug/2001 19:39:48 01504] [debug] OpenSSL: I/O error, 23 bytes expected
to write on BIO#00812C38 [mem: 042586E0]
[14/Aug/2001 19:39:48 01504] [debug] OpenSSL: I/O error, 23 bytes expected
to write on BIO#00812C38 [mem: 042586E0]
[14/Aug/2001 19:39:48 01504] [debug] OpenSSL: I/O error, 5 bytes expected to
read on BIO#041F61E8 [mem: 04294500]
[14/Aug/2001 19:39:48 01504] [debug] OpenSSL: I/O error, 23 bytes expected
to write on BIO#041F61E8 [mem: 0429CD10]
[14/Aug/2001 19:39:48 01504] [debug] OpenSSL: I/O error, 23 bytes expected
to write on BIO#041F61E8 [mem: 0429CD10]
[14/Aug/2001 19:39:48 01504] [debug] OpenSSL: I/O error, 23 bytes expected
to write on BIO#041F61E8 [mem: 0429CD10]
[14/Aug/2001 19:39:48 01504] [debug] OpenSSL: I/O error, 23 bytes expected
to write on BIO#041F61E8 [mem: 0429CD10]
[14/Aug/2001 19:39:48 01504] [debug] OpenSSL: I/O error, 5 bytes expected to
read on BIO#041F3828 [mem: 042734B0]
[14/Aug/2001 19:39:48 01504] [debug] OpenSSL: I/O error, 23 bytes expected
to write on BIO#041F3828 [mem: 04289710]
[14/Aug/2001 19:39:48 01504] [debug] OpenSSL: I/O error, 23 bytes expected
to write on BIO#041F3828 [mem: 04289710]
[14/Aug/2001 19:39:48 01504] [debug] OpenSSL: I/O error, 23 bytes expected
to write on BIO#041F3828 [mem: 04289710]
[14/Aug/2001 19:39:48 01504] [debug] OpenSSL: I/O error, 23 bytes expected
to write on BIO#041F3828 [mem: 04289710]
[14/Aug/2001 19:39:48 01504] [info]  Connection to child 3 closed with
standard shutdown (server IMRAN_PC:443, client 192.168.1.100)
[14/Aug/2001 19:39:48 01504] [info]  Connection to child 7 closed with
standard shutdown (server IMRAN_PC:443, client 192.168.1.100)
[14/Aug/2001 19:39:48 01504] [info]  Connection to child 8 closed with
standard shutdown (server IMRAN_PC:443, client 192.168.1.100)

Can anyone please help?

Thanks,
Imran.

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Function Definition?

2001-08-14 Thread Prasanna Rao K

Hi,

  Where does actual function definition for SHA  exists in openssl lib? I
found only function declaration. I could not find function definition for
SHAInit(),SHAUpdate(),SHAFinal() in openssl lib. Whether we have to
implement them? Can anybody help me?

Thanks in advance.
Prasanna


__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



PKCS7 verification between CryptoAPI OpenSSL

2001-08-14 Thread Khassaia, Amir


Hi,
I've encountered the following problem:
I generate PKCS#7 detached  signed data using CryptSignMessage() in
CryptoAPI and try to verify it using OpenSSL but I get an OpenSSL Error:
{error:2107106C:PKCS7 routines:PKCS7_signatureVerify:unable to fi
nd message digest}.

I tried using PKCS7_dataVerify() and PKCS7_signatureVerify() invoked for
each signer certificate in the PKCS#7 object. PKCS7_DataVerify() finds the
certifcate status valid before invoking PKCS7_signatureVerify() and failing
as stated above...
CryptoAPI manages to verify its own PKCS#7 data however, is this due to the
byte ordering of signatures which some other people have been refering to
over the past or did I miss something fundamental ?

Thanks for any help


__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]