Re: Need some help debugging SSL error thrown from STunnel using OpenSSL-FIPS

2006-06-08 Thread Dr. Stephen Henson
On Wed, Jun 07, 2006, David Gillingham wrote:

 Hello all,
 
 I've been tasked to internally investigate a system that utilizes
 STunnel and OpenSSL to create a secure wrapper for a propietary
 protocol.  Additionally, this solution must eventually be FIPS 140-2
 compliant.
 
 608008D: error:0608008D:digital envelope
 routines:EVP_DigestInit:disabled for fips
 

That's the problem. I'd guess that this is due to a certificate using an
algorithm that isn't allowed in FIPS mode: probably MD5.

Steve.
--
Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
OpenSSL project core developer and freelance consultant.
Funding needed! Details on homepage.
Homepage: http://www.drh-consultancy.demon.co.uk
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


1095 bit key ??

2006-06-08 Thread Saurabh Arora

hi all

i generated a self signed certificate and i found this :

Subject Public Key Info:
   Public Key Algorithm: rsaEncryption
   RSA Public Key: (1095 bit)
   Modulus (1095 bit):
   4b:e9:e4:a6:3a:30:bc:0b:99:56:c6:b5:19:da:73:
   79:f4:7f:35:15:d6:3f:4c:8d:e2:08:ab:43:c0:84:
   0c:a2:69:98:5a:28:3a:fe:81:ac:ec:14:cb:97:8b:
   48:b7:e6:b2:a9:fb:84:cf:88:77:2a:3b:6d:bf:e7:
   ed:7a:c7:92:34:75:9d:c8:6c:90:6e:8a:40:4d:66:
   13:95:bb:6d:4c:d6:29:9c:46:6c:b1:f6:2d:39:09:
   95:d8:cf:02:87:60:9c:af:79:d8:8e:9c:69:6f:26:
   af:8b:e1:26:d4:07:3f:7b:59:b1:52:0f:ce:3d:b4:
   ae:bd:0e:57:5b:39:72:17:ee:6b:64:25:8d:31:b0:
   b0:a1
   Exponent: 65537 (0x10001)


what is 1095 bit key means??
although i opted for 2048 bit  
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: 1095 bit key ??

2006-06-08 Thread Victor Duchovni
On Thu, Jun 08, 2006 at 06:32:54PM +0200, Marek Marcola wrote:

 Hello,
 
  i generated a self signed certificate and i found this :
  
  Subject Public Key Info:
  Public Key Algorithm: rsaEncryption
  RSA Public Key: (1095 bit)
  Modulus (1095 bit):
  4b:e9:e4:a6:3a:30:bc:0b:99:56:c6:b5:19:da:73:
  79:f4:7f:35:15:d6:3f:4c:8d:e2:08:ab:43:c0:84:
  0c:a2:69:98:5a:28:3a:fe:81:ac:ec:14:cb:97:8b:
  48:b7:e6:b2:a9:fb:84:cf:88:77:2a:3b:6d:bf:e7:
  ed:7a:c7:92:34:75:9d:c8:6c:90:6e:8a:40:4d:66:
  13:95:bb:6d:4c:d6:29:9c:46:6c:b1:f6:2d:39:09:
  95:d8:cf:02:87:60:9c:af:79:d8:8e:9c:69:6f:26:
  af:8b:e1:26:d4:07:3f:7b:59:b1:52:0f:ce:3d:b4:
  ae:bd:0e:57:5b:39:72:17:ee:6b:64:25:8d:31:b0:
  b0:a1
  Exponent: 65537 (0x10001)
  
  
  what is 1095 bit key means??
 Interesting, can you send private key for this certificate,
 provided that you will be not use this key of course :-)

Also any non-anecdotal evidence that a 2048 bit key was actually
requested? Not sure how the private key will help, the *modulus* is
1095 bits, and it is the same for the private and public keys.

-- 
Viktor.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: 1095 bit key ??

2006-06-08 Thread Saurabh Arora

hi

now on regeneration and changing the key is working fine.

so may be i misspelt and incidently added 1095 (if thats the case ..
then i m sorry for being silly)

in else case heres my private key :

-BEGIN RSA PRIVATE KEY-
Proc-Type: 4,ENCRYPTED
DEK-Info: DES-EDE3-CBC,A7C341355547B565

lOJoiNoFcvBmlxQbXiR+KQxw66ct9mxQ1KVIzB2HD/oGOxGgso5Cd5W7+2gA5hJ/
Y/SBke/xdEjzn9dsMi8cQM11Gj/CoczBYL30ec4x+YNBm8TiKe3mzX1utdzuOEIS
dTk3zzMwQ47/JLW7qGC0HjghuZRJ3EiGRWGhYmqViCLjKSdhR6feGmjsHk7AwIGD
XrzWKNyBmBxVqa3S92f59KCI7jx3kKggmko/V1leXsqBIgLQYQAiFo33f26M2hJI
9adSuoiuUJK5S575GhPqBQEJpb7JgQ5RrbyvPhPrR3bcK+R9FGlA3RW1LrFYE1P8
ogZLFUI+0GPuKymhKC7Lci7vif0VmtHUTHJ5Tzd6yBw39vWhxuL+ocJuQvToCnKc
2BjDSYQmc5qBAJVo8eo0FK6MLvNK8Bq1o0ai/eWkT9n/nlo8guCKj/FehSs1GJYA
wtqVvHmgsbcTVJQB0YYw2Xu9ikHLtttULOz63/yoGVDxCON+3lzcBr9MWV23e16R
Ma+o4Zq8JADgl7c0xrc9bzcfHnxpRr6pD0nAyEndF2MKuHeMJBofZWZL639gs4X/
Zz0KMPJpnJNePkaVzLIIe3q+SLLFJgqyEL4PELIPsEVFDtzBbm9mibj5u0JYRNU1
USu4bftCphd6VJ27PekQ23JFJpp0E8yo2ifnsnX+sMXDXy/JribOBu6g+bd8MBJ/
ZpUIAwSCoUAqg2s/gmLXxXVJN3j5aokF8Ywb76y4dmhaPGS8GTq4TcmW2VULBK8g
W9G+ZrZl9cJh/ifXLu6dPZAsQTUqe4Gt3sRXw199BoDnpizNk3JqYVMbDVewm5yw
jaF6Fa3KjmaCZWhYm43ThIjHK33hCGzP
-END RSA PRIVATE KEY-



On 6/8/06, Victor Duchovni [EMAIL PROTECTED] wrote:

On Thu, Jun 08, 2006 at 06:32:54PM +0200, Marek Marcola wrote:

 Hello,

  i generated a self signed certificate and i found this :
 
  Subject Public Key Info:
  Public Key Algorithm: rsaEncryption
  RSA Public Key: (1095 bit)
  Modulus (1095 bit):
  4b:e9:e4:a6:3a:30:bc:0b:99:56:c6:b5:19:da:73:
  79:f4:7f:35:15:d6:3f:4c:8d:e2:08:ab:43:c0:84:
  0c:a2:69:98:5a:28:3a:fe:81:ac:ec:14:cb:97:8b:
  48:b7:e6:b2:a9:fb:84:cf:88:77:2a:3b:6d:bf:e7:
  ed:7a:c7:92:34:75:9d:c8:6c:90:6e:8a:40:4d:66:
  13:95:bb:6d:4c:d6:29:9c:46:6c:b1:f6:2d:39:09:
  95:d8:cf:02:87:60:9c:af:79:d8:8e:9c:69:6f:26:
  af:8b:e1:26:d4:07:3f:7b:59:b1:52:0f:ce:3d:b4:
  ae:bd:0e:57:5b:39:72:17:ee:6b:64:25:8d:31:b0:
  b0:a1
  Exponent: 65537 (0x10001)
 
 
  what is 1095 bit key means??
 Interesting, can you send private key for this certificate,
 provided that you will be not use this key of course :-)

Also any non-anecdotal evidence that a 2048 bit key was actually
requested? Not sure how the private key will help, the *modulus* is
1095 bits, and it is the same for the private and public keys.

--
Viktor.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: 1095 bit key ??

2006-06-08 Thread Marek Marcola
Hello,
 
   what is 1095 bit key means??
  Interesting, can you send private key for this certificate,
  provided that you will be not use this key of course :-)
 
 Also any non-anecdotal evidence that a 2048 bit key was actually
 requested? Not sure how the private key will help, the *modulus* is
 1095 bits, and it is the same for the private and public keys.
Private key has also p and q prime numbers.
With this information we may check if they are really prime
(maybe due to some software bug they are not), we can calculate
modulus by hand to check for example that prime numbers are ok
calculated modulus is ok but there is a bug in procedure 
which (for example) reads private key from file or from buffer.
Some checking may be done.

Best regards,
-- 
Marek Marcola [EMAIL PROTECTED]

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: 1095 bit key ??

2006-06-08 Thread Marek Marcola
Hello,
 in else case heres my private key :
 
 -BEGIN RSA PRIVATE KEY-
 Proc-Type: 4,ENCRYPTED
 DEK-Info: DES-EDE3-CBC,A7C341355547B565
 
 lOJoiNoFcvBmlxQbXiR+KQxw66ct9mxQ1KVIzB2HD/oGOxGgso5Cd5W7+2gA5hJ/
 Y/SBke/xdEjzn9dsMi8cQM11Gj/CoczBYL30ec4x+YNBm8TiKe3mzX1utdzuOEIS
 dTk3zzMwQ47/JLW7qGC0HjghuZRJ3EiGRWGhYmqViCLjKSdhR6feGmjsHk7AwIGD
 XrzWKNyBmBxVqa3S92f59KCI7jx3kKggmko/V1leXsqBIgLQYQAiFo33f26M2hJI
 9adSuoiuUJK5S575GhPqBQEJpb7JgQ5RrbyvPhPrR3bcK+R9FGlA3RW1LrFYE1P8
 ogZLFUI+0GPuKymhKC7Lci7vif0VmtHUTHJ5Tzd6yBw39vWhxuL+ocJuQvToCnKc
 2BjDSYQmc5qBAJVo8eo0FK6MLvNK8Bq1o0ai/eWkT9n/nlo8guCKj/FehSs1GJYA
 wtqVvHmgsbcTVJQB0YYw2Xu9ikHLtttULOz63/yoGVDxCON+3lzcBr9MWV23e16R
 Ma+o4Zq8JADgl7c0xrc9bzcfHnxpRr6pD0nAyEndF2MKuHeMJBofZWZL639gs4X/
 Zz0KMPJpnJNePkaVzLIIe3q+SLLFJgqyEL4PELIPsEVFDtzBbm9mibj5u0JYRNU1
 USu4bftCphd6VJ27PekQ23JFJpp0E8yo2ifnsnX+sMXDXy/JribOBu6g+bd8MBJ/
 ZpUIAwSCoUAqg2s/gmLXxXVJN3j5aokF8Ywb76y4dmhaPGS8GTq4TcmW2VULBK8g
 W9G+ZrZl9cJh/ifXLu6dPZAsQTUqe4Gt3sRXw199BoDnpizNk3JqYVMbDVewm5yw
 jaF6Fa3KjmaCZWhYm43ThIjHK33hCGzP
 -END RSA PRIVATE KEY-
In decrypted form please :-)

Best regards,
-- 
Marek Marcola [EMAIL PROTECTED]

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: 1095 bit key ??

2006-06-08 Thread Victor Duchovni
On Thu, Jun 08, 2006 at 06:56:33PM +0200, Saurabh Arora wrote:

 in else case heres my private key :
 
 -BEGIN RSA PRIVATE KEY-
 Proc-Type: 4,ENCRYPTED
 DEK-Info: DES-EDE3-CBC,A7C341355547B565
 
 lOJoiNoFcvBmlxQbXiR+KQxw66ct9mxQ1KVIzB2HD/oGOxGgso5Cd5W7+2gA5hJ/
 Y/SBke/xdEjzn9dsMi8cQM11Gj/CoczBYL30ec4x+YNBm8TiKe3mzX1utdzuOEIS
 dTk3zzMwQ47/JLW7qGC0HjghuZRJ3EiGRWGhYmqViCLjKSdhR6feGmjsHk7AwIGD
 XrzWKNyBmBxVqa3S92f59KCI7jx3kKggmko/V1leXsqBIgLQYQAiFo33f26M2hJI
 9adSuoiuUJK5S575GhPqBQEJpb7JgQ5RrbyvPhPrR3bcK+R9FGlA3RW1LrFYE1P8
 ogZLFUI+0GPuKymhKC7Lci7vif0VmtHUTHJ5Tzd6yBw39vWhxuL+ocJuQvToCnKc
 2BjDSYQmc5qBAJVo8eo0FK6MLvNK8Bq1o0ai/eWkT9n/nlo8guCKj/FehSs1GJYA
 wtqVvHmgsbcTVJQB0YYw2Xu9ikHLtttULOz63/yoGVDxCON+3lzcBr9MWV23e16R
 Ma+o4Zq8JADgl7c0xrc9bzcfHnxpRr6pD0nAyEndF2MKuHeMJBofZWZL639gs4X/
 Zz0KMPJpnJNePkaVzLIIe3q+SLLFJgqyEL4PELIPsEVFDtzBbm9mibj5u0JYRNU1
 USu4bftCphd6VJ27PekQ23JFJpp0E8yo2ifnsnX+sMXDXy/JribOBu6g+bd8MBJ/
 ZpUIAwSCoUAqg2s/gmLXxXVJN3j5aokF8Ywb76y4dmhaPGS8GTq4TcmW2VULBK8g
 W9G+ZrZl9cJh/ifXLu6dPZAsQTUqe4Gt3sRXw199BoDnpizNk3JqYVMbDVewm5yw
 jaF6Fa3KjmaCZWhYm43ThIjHK33hCGzP
 -END RSA PRIVATE KEY-

To be useful, this would have to be un-encrypted.

-- 
Viktor.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: 1095 bit key ??

2006-06-08 Thread Victor Duchovni
On Thu, Jun 08, 2006 at 07:05:36PM +0200, Marek Marcola wrote:

  Also any non-anecdotal evidence that a 2048 bit key was actually
  requested? Not sure how the private key will help, the *modulus* is
  1095 bits, and it is the same for the private and public keys.

 Private key has also p and q prime numbers.
 With this information we may check if they are really prime
 (maybe due to some software bug they are not), we can calculate
 modulus by hand to check for example that prime numbers are ok
 calculated modulus is ok but there is a bug in procedure 
 which (for example) reads private key from file or from buffer.

The modulus should be the product of the two numbers, prime or not,
so if the two numbers are large enough, so is the modulus. Either:

- The two primes are too small. (Not really a primality
  problem per-se).

OR

- The product is calculated incorrectly.

OR

- The user did not ask for a 2048 bit key.

-- 
Viktor.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: 1095 bit key ??

2006-06-08 Thread Saurabh Arora

here it is ::
--

Private-Key: (1095 bit)
modulus:
   4b:e9:e4:a6:3a:30:bc:0b:99:56:c6:b5:19:da:73:
   79:f4:7f:35:15:d6:3f:4c:8d:e2:08:ab:43:c0:84:
   0c:a2:69:98:5a:28:3a:fe:81:ac:ec:14:cb:97:8b:
   48:b7:e6:b2:a9:fb:84:cf:88:77:2a:3b:6d:bf:e7:
   ed:7a:c7:92:34:75:9d:c8:6c:90:6e:8a:40:4d:66:
   13:95:bb:6d:4c:d6:29:9c:46:6c:b1:f6:2d:39:09:
   95:d8:cf:02:87:60:9c:af:79:d8:8e:9c:69:6f:26:
   af:8b:e1:26:d4:07:3f:7b:59:b1:52:0f:ce:3d:b4:
   ae:bd:0e:57:5b:39:72:17:ee:6b:64:25:8d:31:b0:
   b0:a1
publicExponent: 65537 (0x10001)
privateExponent:
   27:e6:f9:58:a6:9d:97:3a:41:8f:6b:43:26:23:bd:
   2f:0d:65:0f:f2:3a:7b:6b:31:e8:ed:c5:98:07:49:
   61:9a:bd:06:67:dd:5d:a5:09:64:6b:73:42:d0:95:
   55:d3:d4:5f:75:19:cf:e5:86:45:9c:dd:40:02:ef:
   55:d4:83:b2:46:00:cc:be:d3:26:c9:b9:8b:6d:76:
   5a:3f:35:65:63:da:53:42:d0:f7:10:8f:6f:14:4a:
   69:1a:4c:eb:52:7d:41:6d:64:87:42:01:c0:39:9f:
   f2:df:a2:fa:bb:24:44:b8:51:ac:06:52:a2:e6:35:
   a1:24:62:cd:24:13:c8:7b:db:73:a2:39:60:c1:77:
   d0:01
prime1:
   0c:23:ed:fc:fb:89:3e:f4:2c:0e:d7:4e:6e:b7:eb:
   19:0c:e4:0b:35:03:d8:c1:2f:c2:6a:37:8f:16:72:
   55:96:e3:a5:94:1d:69:b7:22:0d:67:3e:8f:30:fb:
   fd:45:a9:4c:ad:cf:78:2b:23:1c:a8:4c:f6:ff:7e:
   c4:cc:86:ee:72:41:1b:10:b1
prime2:
   06:40:c4:cc:d8:09:39:05:17:fd:68:07:34:80:19:
   c7:fe:a6:09:69:60:66:b6:a9:5c:74:e2:01:a6:bd:
   46:95:cd:9d:fe:d9:e1:bc:d8:7b:ae:b6:a6:8c:8f:
   9a:74:c1:62:a0:8b:11:0f:3d:2b:75:b1:63:87:4a:
   4c:d1:e4:22:46:60:c4:1a:f1
exponent1:
   02:72:a4:23:a4:1b:f2:23:8d:56:98:b6:e9:c0:0f:
   99:07:6e:5b:8c:1e:f0:6f:53:4f:e1:d6:bd:f5:0a:
   ac:93:35:e7:46:cb:ff:6a:bb:64:f4:72:3a:b0:e7:
   be:13:73:a5:50:4e:4a:ae:77:ef:e9:47:4b:6e:0c:
   83:65:b1:b7:16:36:66:5c:a1
exponent2:
   00:c7:55:fa:70:38:8d:ca:2d:97:97:b9:b5:f6:f1:
   be:ee:dd:fc:34:0c:16:1e:4e:ee:bd:7b:5b:5b:49:
   1c:9e:10:f1:c8:c7:97:0d:ae:23:90:b9:1b:fa:4a:
   f3:9f:f0:68:f8:b6:f8:93:de:39:28:39:c3:bc:18:
   2b:82:c3:96:e5:0e:ad:bc:f1
coefficient:
   04:21:5e:47:55:12:e8:b0:21:4c:98:f6:f2:ad:03:
   9f:88:73:4e:ec:28:35:dd:cc:b1:4c:9f:e5:da:a8:
   a0:b5:89:fc:d9:da:50:83:9d:cf:f4:e5:ad:d2:b0:
   60:22:b8:78:31:53:07:68:92:a3:2f:e9:78:53:01:
   26:34:b8:3e:e1:8a:26:d2:da
-BEGIN RSA PRIVATE KEY-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-END RSA PRIVATE KEY-


On 6/8/06, Victor Duchovni [EMAIL PROTECTED] wrote:

On Thu, Jun 08, 2006 at 06:56:33PM +0200, Saurabh Arora wrote:

 in else case heres my private key :

 -BEGIN RSA PRIVATE KEY-
 Proc-Type: 4,ENCRYPTED
 DEK-Info: DES-EDE3-CBC,A7C341355547B565

 lOJoiNoFcvBmlxQbXiR+KQxw66ct9mxQ1KVIzB2HD/oGOxGgso5Cd5W7+2gA5hJ/
 Y/SBke/xdEjzn9dsMi8cQM11Gj/CoczBYL30ec4x+YNBm8TiKe3mzX1utdzuOEIS
 dTk3zzMwQ47/JLW7qGC0HjghuZRJ3EiGRWGhYmqViCLjKSdhR6feGmjsHk7AwIGD
 XrzWKNyBmBxVqa3S92f59KCI7jx3kKggmko/V1leXsqBIgLQYQAiFo33f26M2hJI
 9adSuoiuUJK5S575GhPqBQEJpb7JgQ5RrbyvPhPrR3bcK+R9FGlA3RW1LrFYE1P8
 ogZLFUI+0GPuKymhKC7Lci7vif0VmtHUTHJ5Tzd6yBw39vWhxuL+ocJuQvToCnKc
 2BjDSYQmc5qBAJVo8eo0FK6MLvNK8Bq1o0ai/eWkT9n/nlo8guCKj/FehSs1GJYA
 wtqVvHmgsbcTVJQB0YYw2Xu9ikHLtttULOz63/yoGVDxCON+3lzcBr9MWV23e16R
 Ma+o4Zq8JADgl7c0xrc9bzcfHnxpRr6pD0nAyEndF2MKuHeMJBofZWZL639gs4X/
 Zz0KMPJpnJNePkaVzLIIe3q+SLLFJgqyEL4PELIPsEVFDtzBbm9mibj5u0JYRNU1
 USu4bftCphd6VJ27PekQ23JFJpp0E8yo2ifnsnX+sMXDXy/JribOBu6g+bd8MBJ/
 ZpUIAwSCoUAqg2s/gmLXxXVJN3j5aokF8Ywb76y4dmhaPGS8GTq4TcmW2VULBK8g
 W9G+ZrZl9cJh/ifXLu6dPZAsQTUqe4Gt3sRXw199BoDnpizNk3JqYVMbDVewm5yw
 jaF6Fa3KjmaCZWhYm43ThIjHK33hCGzP
 -END RSA PRIVATE KEY-

To be useful, this would have to be un-encrypted.

--
Viktor.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: 1095 bit key ??

2006-06-08 Thread Marek Marcola
Hello,

After some calculations:

 Private-Key: (1095 bit)
 modulus:
 4b:e9:e4:a6:3a:30:bc:0b:99:56:c6:b5:19:da:73:
 79:f4:7f:35:15:d6:3f:4c:8d:e2:08:ab:43:c0:84:
 0c:a2:69:98:5a:28:3a:fe:81:ac:ec:14:cb:97:8b:
 48:b7:e6:b2:a9:fb:84:cf:88:77:2a:3b:6d:bf:e7:
 ed:7a:c7:92:34:75:9d:c8:6c:90:6e:8a:40:4d:66:
 13:95:bb:6d:4c:d6:29:9c:46:6c:b1:f6:2d:39:09:
 95:d8:cf:02:87:60:9c:af:79:d8:8e:9c:69:6f:26:
 af:8b:e1:26:d4:07:3f:7b:59:b1:52:0f:ce:3d:b4:
 ae:bd:0e:57:5b:39:72:17:ee:6b:64:25:8d:31:b0:
 b0:a1
Correct ( = prime1*prime2).

 prime1:
 0c:23:ed:fc:fb:89:3e:f4:2c:0e:d7:4e:6e:b7:eb:
 19:0c:e4:0b:35:03:d8:c1:2f:c2:6a:37:8f:16:72:
 55:96:e3:a5:94:1d:69:b7:22:0d:67:3e:8f:30:fb:
 fd:45:a9:4c:ad:cf:78:2b:23:1c:a8:4c:f6:ff:7e:
 c4:cc:86:ee:72:41:1b:10:b1
Prime.

 prime2:
 06:40:c4:cc:d8:09:39:05:17:fd:68:07:34:80:19:
 c7:fe:a6:09:69:60:66:b6:a9:5c:74:e2:01:a6:bd:
 46:95:cd:9d:fe:d9:e1:bc:d8:7b:ae:b6:a6:8c:8f:
 9a:74:c1:62:a0:8b:11:0f:3d:2b:75:b1:63:87:4a:
 4c:d1:e4:22:46:60:c4:1a:f1
Prime.

RSA key looks good (and this is most important),
so this may be some command line bad parameter.  

Best regards,
-- 
Marek Marcola [EMAIL PROTECTED]

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: Need some help debugging SSL error thrown from STunnel using OpenSSL-FIPS

2006-06-08 Thread David Gillingham

I was able to convert the key as you instructed, and I overwrote the
old RSA private key from my server.pem file with the new PKCS8 one.  I
am now a getting a different error message.  From these new messages,
I'm guessing OpenSSL is expecting a file in PKCS12 format, but that my
file does not match this format.  Is my understanding correct?  Error
log follows.

BEGIN STUNNEL LOG
2006.06.08 17:49:38 LOG7[1120:616]: Certificate: server.pem
2006.06.08 17:49:38 LOG7[1120:616]: Key file: server.pem
2006.06.08 17:49:42 LOG3[1120:616]: error stack: 140B3009 :
error:140B3009:SSL routines:SSL_CTX_use_RSAPrivateKey_file:PEM lib
2006.06.08 17:49:42 LOG3[1120:616]: error stack: 906700D :
error:0906700D:PEM routines:PEM_ASN1_read_bio:ASN1 lib
2006.06.08 17:49:42 LOG3[1120:616]: error stack: 2306A075 :
error:2306A075:PKCS12 routines:PKCS12_DECRYPT_D2I:pkcs12 pbe crypt
error
2006.06.08 17:49:42 LOG3[1120:616]: error stack: 23077073 :
error:23077073:PKCS12 routines:PKCS12_pbe_crypt:pkcs12 algor
cipherinit error
2006.06.08 17:49:42 LOG3[1120:616]: SSL_CTX_use_RSAPrivateKey_file:
6074079: error:06074079:digital envelope
routines:EVP_PBE_CipherInit:unknown pbe algorithm

2006.06.08 17:49:42 LOG3[1120:616]: Server is down
END STUNNEL LOG
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: Need some help debugging SSL error thrown from STunnel using OpenSSL-FIPS

2006-06-08 Thread Dr. Stephen Henson
On Thu, Jun 08, 2006, David Gillingham wrote:

 I was able to convert the key as you instructed, and I overwrote the
 old RSA private key from my server.pem file with the new PKCS8 one.  I
 am now a getting a different error message.  From these new messages,
 I'm guessing OpenSSL is expecting a file in PKCS12 format, but that my
 file does not match this format.  Is my understanding correct?  Error
 log follows.
 
 BEGIN STUNNEL LOG
 2006.06.08 17:49:38 LOG7[1120:616]: Certificate: server.pem
 2006.06.08 17:49:38 LOG7[1120:616]: Key file: server.pem
 2006.06.08 17:49:42 LOG3[1120:616]: error stack: 140B3009 :
 error:140B3009:SSL routines:SSL_CTX_use_RSAPrivateKey_file:PEM lib
 2006.06.08 17:49:42 LOG3[1120:616]: error stack: 906700D :
 error:0906700D:PEM routines:PEM_ASN1_read_bio:ASN1 lib
 2006.06.08 17:49:42 LOG3[1120:616]: error stack: 2306A075 :
 error:2306A075:PKCS12 routines:PKCS12_DECRYPT_D2I:pkcs12 pbe crypt
 error
 2006.06.08 17:49:42 LOG3[1120:616]: error stack: 23077073 :
 error:23077073:PKCS12 routines:PKCS12_pbe_crypt:pkcs12 algor
 cipherinit error
 2006.06.08 17:49:42 LOG3[1120:616]: SSL_CTX_use_RSAPrivateKey_file:
 6074079: error:06074079:digital envelope
 routines:EVP_PBE_CipherInit:unknown pbe algorithm
 
 2006.06.08 17:49:42 LOG3[1120:616]: Server is down
 END STUNNEL LOG

That error means that the PBE table has not been initialized in the 
application. 

A call to OpenSSL_add_all_algorithms() would have automatically done that so
I'd guess that the table is being initialized in a customized way, possible to
reduce the number of algorithms added.

A call to PKCS5_PBE_add() is needed in any case in the application.

Steve.
--
Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
OpenSSL project core developer and freelance consultant.
Funding needed! Details on homepage.
Homepage: http://www.drh-consultancy.demon.co.uk
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


subjectAltName extension of type dNSName

2006-06-08 Thread david kine
Hello,My secure client application performs post-connection fully-qualified-domain-name authentication. According to RFC 2818, "If a subjectAltName extension of type dNSName is present, that MUST be used as the identity. Otherwise, the (most specific) Common Name field in the Subject field of the certificate MUST be used."  My code to retrieve the common name from the subject field is:X509 *cert = [code not shown]  char pName[ 256 ];  X509_NAME *subj;  subj = X509_get_subject_name( cert );  X509_NAME_get_text_by_NID( subj, NID_commonName, pName,   256);  My question: how do I retrieve the subjectAltName extension of type dNSName?Thanks,-David __Do You Yahoo!?Tired of spam?  Yahoo! Mail has the best spam protection around http://mail.yahoo.com 

Re: subjectAltName extension of type dNSName

2006-06-08 Thread Victor Duchovni
On Thu, Jun 08, 2006 at 11:40:04AM -0700, david kine wrote:

   My code to retrieve the common name from the subject field is:
 X509 *cert = [code not shown]
   char pName[ 256 ];
   X509_NAME *subj;
   subj = X509_get_subject_name( cert );
   X509_NAME_get_text_by_NID( subj, NID_commonName, pName,
256);

The encoding of the resulting buffer is not necessarily correct, you are
getting the raw ASN.1 string contents, not its UTF8 representation. While
the CN is not typically encoded for hostnames, this code is not robust.

More robust logic can be found in the Postfix 2.3 snapshot release,
currently: 2.3-20060604

http://www.postfix.org/download.html

The function tls_text_name() in src/tls/tls_verify.c handles CommonName
extraction. This extracts the first commonName. Some suggest it should
be the last, others say you should match *any* CommonName in the DN. This
is a mess, the DNS name extension is a lot cleaner. Code to insist that
there is only CN is present #ifdef 0.

Code to look at DNSNames is in verify_extract_peer(), in src/tls/tls_client.c

-- 
Viktor.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: Need some help debugging SSL error thrown from STunnel using OpenSSL-FIPS

2006-06-08 Thread David Gillingham

Dr. Henson--

Adding in a call to OpenSSL_add_all_algorithms() fixed the error.
Thanks for the assistance.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: subjectAltName extension of type dNSName

2006-06-08 Thread david kine
Hello Victor,Thank you very much, the code you provide is extremely useful!One more question: how do I, using the CA.pl script, generate a certificate with a subjectAltName extension of type dNSName? The ones I have already generated do not have this field set.I suppose there is an openssl.cnf file setting for this purpose? I notice the line "#subjectAltName=email:copy" in the system's openssl.cnf file.Thanks,-DavidVictor Duchovni [EMAIL PROTECTED] wrote:  On Thu, Jun 08, 2006 at 11:40:04AM -0700, david kine wrote: My code to retrieve the common name from the subject field is: X509 *cert = [code not shown] char
 pName[ 256 ]; X509_NAME *subj; subj = X509_get_subject_name( cert ); X509_NAME_get_text_by_NID( subj, NID_commonName, pName, 256);The encoding of the resulting buffer is not necessarily correct, you aregetting the raw ASN.1 string contents, not its UTF8 representation. Whilethe CN is not typically encoded for hostnames, this code is not robust.More robust logic can be found in the Postfix 2.3 snapshot release,currently: 2.3-20060604http://www.postfix.org/download.htmlThe function tls_text_name() in src/tls/tls_verify.c handles CommonNameextraction. This extracts the first commonName. Some suggest it shouldbe the last, others say you should match *any* CommonName in the DN. Thisis a mess, the DNS name extension is a lot cleaner. Code to insist thatthere is only CN is present "#ifdef 0".Code to look at DNSNames is in verify_extract_peer(), in src/tls/tls_client.c--
 Viktor.__OpenSSL Project http://www.openssl.orgUser Support Mailing List openssl-users@openssl.orgAutomated List Manager [EMAIL PROTECTED] __Do You Yahoo!?Tired of spam?  Yahoo! Mail has the best spam protection around http://mail.yahoo.com 

CAs and SubjectAltNames

2006-06-08 Thread Phil Dibowitz
Didn't see a response to this the first time around, thought I'd give it
another shot.


I'm trying to create a CA that has the email address _only_ in
SubjectAltNames (to follow PKIX valid certificate recommendations).

This seems to be a bit tricky.

Currently, I can get a req that looks right, but when I self-sign, it
gets messed up. My config looks like:

   ...
   [ req ]
   req_extensions = v3_req
   ...
   [ v3_req ]
   subjectAltName = email:move
   [ v3_ca ]
   subjectKeyIdentifier=hash
   authorityKeyIdentifier=keyid:always
   basicConstraints = CA:true
   subjectAltName=email:move

I create the key and csr like this:

   openssl req -new -keyout private/cakey.pem -out careq.pem -config \
   ./openssl.cnf

Then I self-sign it like this:

   openssl ca -create_serial -out cacert.pem -days 365 -batch -keyfile \
   private/cakey.pem -selfsign -extensions v3_ca -config ./openssl.cnf \
   -infiles careq.pem

The req looks like this:

Requested Extensions:
X509v3 Subject Alternative Name:
email:[EMAIL PROTECTED]

The cert however looks like this:

X509v3 extensions:
X509v3 Subject Key Identifier:
19:FA:AB:62:DA:7D:7F:DA:A1:B1:F2:A7:51:7C:0B:DE:35:16:13:F2
X509v3 Authority Key Identifier:

keyid:19:FA:AB:62:DA:7D:7F:DA:A1:B1:F2:A7:51:7C:0B:DE:35:16:13:F2

X509v3 Basic Constraints:
CA:TRUE

As you can see, it's disappeared.

I've also tried setting subjectAltName=email:copy in v3_ca and then I
get this in the cert:

X509v3 Subject Alternative Name:
EMPTY

Which is unexpected.

openssl 0.9.8b, Debian unstable

Any help would be appreciated.

-- 
Phil Dibowitz
P: 310-360-2330 C: 213-923-5115
Unix Admin, Ticketmaster.com



signature.asc
Description: OpenPGP digital signature


Re: CAs and SubjectAltNames

2006-06-08 Thread Dr. Stephen Henson
On Thu, Jun 08, 2006, Phil Dibowitz wrote:

 Didn't see a response to this the first time around, thought I'd give it
 another shot.
 
 
 I'm trying to create a CA that has the email address _only_ in
 SubjectAltNames (to follow PKIX valid certificate recommendations).
 
 This seems to be a bit tricky.
 
 Currently, I can get a req that looks right, but when I self-sign, it
 gets messed up. My config looks like:
 
...
[ req ]
req_extensions = v3_req
...
[ v3_req ]
subjectAltName = email:move
[ v3_ca ]
subjectKeyIdentifier=hash
authorityKeyIdentifier=keyid:always
basicConstraints = CA:true
subjectAltName=email:move
 
 I create the key and csr like this:
 
openssl req -new -keyout private/cakey.pem -out careq.pem -config \
./openssl.cnf
 
 Then I self-sign it like this:
 
openssl ca -create_serial -out cacert.pem -days 365 -batch -keyfile \
private/cakey.pem -selfsign -extensions v3_ca -config ./openssl.cnf \
-infiles careq.pem
 
 The req looks like this:
 
 Requested Extensions:
 X509v3 Subject Alternative Name:
 email:[EMAIL PROTECTED]
 
 The cert however looks like this:
 
 X509v3 extensions:
 X509v3 Subject Key Identifier:
 19:FA:AB:62:DA:7D:7F:DA:A1:B1:F2:A7:51:7C:0B:DE:35:16:13:F2
 X509v3 Authority Key Identifier:
 
 keyid:19:FA:AB:62:DA:7D:7F:DA:A1:B1:F2:A7:51:7C:0B:DE:35:16:13:F2
 
 X509v3 Basic Constraints:
 CA:TRUE
 
 As you can see, it's disappeared.
 
 I've also tried setting subjectAltName=email:copy in v3_ca and then I
 get this in the cert:
 
 X509v3 Subject Alternative Name:
 EMPTY
 
 Which is unexpected.
 
 openssl 0.9.8b, Debian unstable
 
 Any help would be appreciated.
 

You have to explicitly enable copying extensions from a certificate request to
a certificate in the config file. This is off by default because it is
potentially dangerous for the unwary. See the docs for more info.

Steve.
--
Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
OpenSSL project core developer and freelance consultant.
Funding needed! Details on homepage.
Homepage: http://www.drh-consultancy.demon.co.uk
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: subjectAltName extension of type dNSName

2006-06-08 Thread Goetz Babin-Ebell
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

david kine schrieb:
Hello David,

 One more question:  how do I, using the CA.pl script, generate a
 certificate with a subjectAltName extension of type dNSName?  The ones I
 have already generated do not have this field set.

 I suppose there is an openssl.cnf file setting for this purpose?  I
 notice the line #subjectAltName=email:copy in the system's openssl.cnf

subjectAltName=DNS:your.domain.org

Bye

Goetz

- --
DMCA: The greed of the few outweighs the freedom of the many
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.2.5 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iD8DBQFEiKPv2iGqZUF3qPYRAum+AJ9TRnaoHrpM5KBxYpnTAQzA6u4FwgCeNl6c
3HqW6isS6WJy9S98ORT/Q5E=
=CAzJ
-END PGP SIGNATURE-
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: CAs and SubjectAltNames

2006-06-08 Thread Phil Dibowitz
Dr. Stephen Henson wrote:
 
 You have to explicitly enable copying extensions from a certificate
 request to
 a certificate in the config file. This is off by default because it is
 potentially dangerous for the unwary. See the docs for more info.

Thanks, though I'm not sure which docs you're referring to - don't see
anything to that effect in 'man ca'...

Hmmm I think the 'noemailDN' option will do what I want upon more
perusing of the man page...

-- 
Phil Dibowitz
P: 310-360-2330 C: 213-923-5115
Unix Admin, Ticketmaster.com



signature.asc
Description: OpenPGP digital signature


Re: CAs and SubjectAltNames

2006-06-08 Thread Phil Dibowitz
Phil Dibowitz wrote:
 Dr. Stephen Henson wrote:

 You have to explicitly enable copying extensions from a certificate
 request to
 a certificate in the config file. This is off by default because it is
 potentially dangerous for the unwary. See the docs for more info.
 
 Thanks, though I'm not sure which docs you're referring to - don't see
 anything to that effect in 'man ca'...
 
 Hmmm I think the 'noemailDN' option will do what I want upon more
 perusing of the man page...

Upon trying this, it doesn't work. It works for the Subject but not the
Issuer.

They should match... :/

I'll keep looking for the doc you mention
-- 
Phil Dibowitz
P: 310-360-2330 C: 213-923-5115
Unix Admin, Ticketmaster.com



signature.asc
Description: OpenPGP digital signature


Re: subjectAltName extension of type dNSName

2006-06-08 Thread Victor Duchovni
On Fri, Jun 09, 2006 at 12:25:52AM +0200, Goetz Babin-Ebell wrote:

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1
 
 david kine schrieb:
 Hello David,
 
  One more question:  how do I, using the CA.pl script, generate a
  certificate with a subjectAltName extension of type dNSName?  The ones I
  have already generated do not have this field set.
 
  I suppose there is an openssl.cnf file setting for this purpose?  I
  notice the line #subjectAltName=email:copy in the system's openssl.cnf
 
 subjectAltName=DNS:your.domain.org

For multiple values:

subjectAltName  = @alt_names

[ alt_names ]
DNS.1 = host1.example.com
DNS.2 = host2.example.com
DNS.3 = host3.example.com
DNS.4 = host4.example.com
DNS.5 = host5.example.com
DNS.6 = host6.example.com
DNS.7 = host7.example.com
DNS.8 = host8.example.com
DNS.9 = host9.example.com
DNS.10 = host10.example.com
DNS.11 = host11.example.com
DNS.12 = host12.example.com
DNS.13 = host13.example.com
DNS.14 = host14.example.com
DNS.15 = host15.example.com
DNS.16 = host16.example.com
DNS.17 = host17.example.com
DNS.18 = host18.example.com
DNS.19 = host19.example.com

-- 
Viktor.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: CAs and SubjectAltNames

2006-06-08 Thread Dr. Stephen Henson
On Thu, Jun 08, 2006, Phil Dibowitz wrote:

 Dr. Stephen Henson wrote:
  
  You have to explicitly enable copying extensions from a certificate
  request to
  a certificate in the config file. This is off by default because it is
  potentially dangerous for the unwary. See the docs for more info.
 
 Thanks, though I'm not sure which docs you're referring to - don't see
 anything to that effect in 'man ca'...
 
 Hmmm I think the 'noemailDN' option will do what I want upon more
 perusing of the man page...
 

Look for the copy_extensions option in the ca manual page. You need OpenSSL
0.9.8 or later for that.

Steve.
--
Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
OpenSSL project core developer and freelance consultant.
Funding needed! Details on homepage.
Homepage: http://www.drh-consultancy.demon.co.uk
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]