RE: Aes-256 /testing of AES_cbc_encrypt

2006-09-06 Thread Bhat, Jayalakshmi Manjunath
Hi,

I went through  FIPS-197 for AES. Now if I want to test 
void AES_cbc_encrypt(const unsigned char *in, unsigned
char *out,
 const unsigned long length, const AES_KEY *key,
 unsigned char *ivec, const int enc) function.
How should I test this function?

Regards,
Jaya.



-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Marek Marcola
Sent: Monday, September 04, 2006 4:51 PM
To: openssl-users@openssl.org
Subject: Re: Aes-256

Hello,
   I want to test AES-256 encryption and decryption. And also 
 SH-512 hashing functionality in SSL. Pls can any one tell me how do I 
 do it?
If you want to check correctness of your implementation/OpenSSL API you
may download FIPS-197 (for AES) and FIPS-180 (for SHA1/256/384/512) and
use test vectors from this documents.

Best regards,
--
Marek Marcola [EMAIL PROTECTED]

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: Securing passwords

2006-09-06 Thread Bernhard Froehlich

David Irvine wrote:
[...]

Many thanks for replying - your right I am a bit off topic (and I hope I
don't need a surgeon for being so ;-) ) but I suppose it is slightly
related to the securing of info. 

Yes, I'll reply on the list till someone complains.

I think you are correct in your
assumption for some readers. I am thinking along the lines of a public
reader i.e. one which anybody can finger swipe to get access to data and
therefore the digitised stream may be sent somewhere.  I am using the
premise that any non encrypted data stream on a PC can be captured.

My thoughts were that if it were possible to have an encrypted (PKI)
copy of this stream  that only the server could decrypt (if there was a
server) or an application could decrypt, can such devices create a
secure link between them and a server or application to transmit this,
and if so can it be easily compromised (everything can to some degree I
suppose).
  
If it's only the data between the reader and computer that can be 
captured, the method outlined above (using the fingerprint as a PIN for 
a smartcard chip) should be secure under the usual assumptions 
concerning key size etc.
Just remember, most probably it's not really encryption you want, it's 
authentication! Encryption can help but it's not the only way.


The problems start if the bad guys start using screwdrivers or are 
otherwise fiddeling around with the reader (see for example 
http://ds.ccc.de/080/finger if you can read german) or the computer.
If computer and reader themselves are not considered secure you'll 
probably have to go for something like TPM to increase the security.

Apart from that what is the most effective way of entering a password to
stop keyloggers I have been racking my brain thinking of a defeat for
them but can't come up with one yet although I'm sure there is an answer
somewhere. [...]
IMHO the most efficient way currently is to use a class 2 smartcard 
reader. Whether to use a fingerprint sensor (integrated to the reader!) 
or a PIN (entered on the pinpad of the reader!) to unlock signature 
generation is more or less a matter of personal taste or other 
circumstances of your application. For example I'd prefer a fingerprint 
reader if it's easy for an attacker to install a web cam to watch the 
pinpad. On the other hand, if you can enter the PIN in some closet with 
no public access I'd prefer the pinpad.


Of course both versions can still be defeated by installing keyloggers 
inside the reader device or capturing the PIN/fingerprint using known 
techniques, but you have better chances to defend against this.

My concern is that I have a p2p app which needs AES / RSA etc. and
therefore a pass at some time - can't use a server so kerberos / single
pass etc. is a no goer.
  
Hmm, maybe *encryption* should be handled between the peers using the 
peer's keys and *authentication* can be done by a smartcard/class 2 
reader? This seems to take care of your problems if the peers themselves 
are secure.


Another approach I've seen with homebanking (less secure than a class 2 
reader/smartcard but probably easier to implement) is to use the mouse 
to enter a PIN  on a screen pinpad, which is at a random position on the 
screen and/or the keys are randomly distributed. This is still 
vulnerable to webcams but the image quality has to be much better if you 
use a tiny cursor...

[...]

So far

1:  A bio reader that stores a pass seems to be quite good (although
personalised)
  
No, a stored password is not really good, since the transmission can be 
intercepted.

By the way, are you familliar with smartcard technology?

2: A bio reader that can encrypt and secure a link between it and
authority mechanism (server or app) would be better - not personalised.
3: A passphrase - well this is the issue - we can make them stronger by
running through pbkdf2 etc. but it's the entering that's not right
(insecure).
  
4. Biometric sensors can be fooled considerably easier than realized in 
public perception (BTW, the same thing is probably true for encryption 
in general). Biometric sensors are still to be considered  somewhat 
experimental, especially if the reader devices are cheap! Pinpads have 
their own risks, but at least those are more publicly known (or are they?).



Problem software or hardware loggers (think worst case - hardware) can
read anything we input to screen mouse or keyboard so

1: Are they easy to detect (NO!)
2: Can they be fooled by cut paste etc. / NO many read clipboard
  

But cut'n paste is still vulnerable to webcams watching the screen!

So

assuming somebody can SEE everything we type or move the mouse to
(images etc.) what can be done ?
  

1. Use inputs that cannot be seen so easily (the biometric approach)
2. Make sure the input cannot be seen (the pinpad reader approach)

One very important thing to remember: There is *no* perfect security in 
real life! Just forget what your insurance agent is always telling you! ;)

And that's the 

Problem with DER formatted file when downloaded thru HTTP

2006-09-06 Thread surendra.ande


Hi Team,

I am seeing a problem with DER formatted file. I downloaded the DER
formatted file (crl file) using a standard http client application. But
I could not open that file and it is saying The file is invalid for
use as the following: Certificate Revocation List while trying to open
it.

But with same http client application, I could download the Base-64
formatted file successfully and I could open the file successfully.
After that, I used the load_crl() function. That's also success.


But for the DER formatted file, I am seeing an issue in opening the file
and thereby load_crl() is failing since it is a invalid crl file. So my
question is: After downloading the DER formatted file, should I need to
append any particular EOF (End Of File) character? If so, what is that?
Please let me know your thoughts on end of file character for DER
formatted file.

Thousands of thanks to you,
-Surendra


The information contained in this electronic message and any attachments to 
this message are intended for the exclusive use of the addressee(s) and may 
contain proprietary, confidential or privileged information. If you are not the 
intended recipient, you should not disseminate, distribute or copy this e-mail. 
Please notify the sender immediately and destroy all copies of this message and 
any attachments.

WARNING: Computer viruses can be transmitted via email. The recipient should 
check this email and any attachments for the presence of viruses. The company 
accepts no liability for any damage caused by any virus transmitted by this 
email.

www.wipro.com
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Question reagrding OpenSSL recent security advisory

2006-09-06 Thread Hagai Yaffe








Hello,



I have read the advisory an I am a bit puzzled regarding the
there are CAs using exponent 3 in wide use
comment, I have tried to check and could not found any CA using this exponent, all
the CAs I have seen are using 0x10001 (CAs I have generate by OpenSSL using
default values, world wide trusted CAs such as VeriSign and Thawte etc..), I
understand that specifying CAs using exponent 3 will give specific targets to malicious
people and that is defiantly not a good idea, how ever I would like to try and better
understand the range of the problem, are only old CAs using exponent 3 ? 



Could anyone elaborate some on this? 



Regards,

Hagai,












Query regarding AES support in Open SSL

2006-09-06 Thread V, Bharath (Bharath)



Hi,

I am using keytool 
command to generate the certificates, currently i am using RSA 
algorithm.
We are planning to 
change this to AES, does Open SSL support AES? 
If yes can i use it 
with keytool command.

Thanks
Bharath


RE: Query regarding AES support in Open SSL

2006-09-06 Thread Bhat, Jayalakshmi Manjunath



Yes OpenSSL supports AES.

Regards,
Jaya



From: [EMAIL PROTECTED] 
[mailto:[EMAIL PROTECTED] On Behalf Of V, Bharath 
(Bharath)Sent: Wednesday, September 06, 2006 3:08 PMTo: 
'openssl-users@openssl.org'Subject: Query regarding AES support in 
Open SSL

Hi,

I am using keytool 
command to generate the certificates, currently i am using RSA 
algorithm.
We are planning to 
change this to AES, does Open SSL support AES? 
If yes can i use it 
with keytool command.

Thanks
Bharath


RE: Aes-256 /testing of AES_cbc_encrypt

2006-09-06 Thread Marek Marcola
Hello,
 
   I went through  FIPS-197 for AES. Now if I want to test 
   void AES_cbc_encrypt(const unsigned char *in, unsigned
 char *out,
const unsigned long length, const AES_KEY *key,
unsigned char *ivec, const int enc) function.
   How should I test this function?
For test vectors you may look in test/evptests.txt in OpenSSL source.
For example if you will have test line like:

AES-128-CBC:2B7E151628AED2A6ABF7158809CF4F3C:000102030405060708090A0B0C0D0E0F:6BC1BEE22E409F96E93D7E117393172A:7649ABAC8119B246CEE98E9B12E9197D

then to test this from command line you may run:

$ perl -e 'print pack(H*,6BC1BEE22E409F96E93D7E117393172A)' | \
openssl enc -e -aes-128-cbc \
-K 2B7E151628AED2A6ABF7158809CF4F3C \
-iv 000102030405060708090A0B0C0D0E0F | \ 
perl -e '$a=STDIN; print unpack(H*,$a), \n'

to get: 7649abac8119b246cee98e9b12e9197d8964e0b149c10b7b682e6e39aaeb731c

and of course if you run:

$ perl -e 'print
pack(H*,7649abac8119b246cee98e9b12e9197d8964e0b149c10b7b682e6e39aaeb731c)'|\
openssl enc -d -aes-128-cbc \
-K 2B7E151628AED2A6ABF7158809CF4F3C \
-iv 000102030405060708090A0B0C0D0E0F | \
perl -e '$a=STDIN; print unpack(H*,$a), \n'

you will get: 6bc1bee22e409f96e93d7e117393172a

The same results you should get using AES_cbc_encrypt() but you should
be aware that padding is not removed by this function when you decrypt
data.

Best regards,
-- 
Marek Marcola [EMAIL PROTECTED]

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Retrieving certificate data

2006-09-06 Thread Giuseppe

Hi,
I have to retrieve data from a client certificate (on a smart card)
My code:

$cert = openssl_x509_parse($_SERVER['SSL_CLIENT_CERT']);
echo($cert['subject']['CN']);

if I run it in local it works, otherwise on remote server nothing is printed
out.
Any idea?
Thanks
-- 
View this message in context: 
http://www.nabble.com/Retrieving-certificate-data-tf2225542.html#a6167169
Sent from the OpenSSL - User forum at Nabble.com.

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: Question reagrding OpenSSL recent security advisory

2006-09-06 Thread Marek Marcola
Hello,
 I have read the advisory an I am a bit puzzled regarding the there are
 CAs using exponent 3 in wide use comment, I have tried to check and
 could not found any CA using this exponent, all the CA’s I have seen
 are using 0x10001 (CA’s I have generate by OpenSSL using default
 values, world wide trusted CA’s such as VeriSign and Thawte etc..), I
 understand that specifying CA’s using exponent 3 will give specific
 targets to malicious people and that is defiantly not a good idea, how
 ever I would like to try and better understand the range of the
 problem,  are only old CA’s using exponent 3 ? 
 
  
 
 Could anyone elaborate some on this?
Look at:
http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html

Best regards,
-- 
Marek Marcola [EMAIL PROTECTED]

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Is there any API available to convert the DER formatted file to Base64 formatted file?

2006-09-06 Thread surendra.ande

Hi Team,

Is there any API available in OPENSSL to convert the DER formatted file
to Base64 formatted file?  Please let me know your thoughts. Thank you.

 -Suren


The information contained in this electronic message and any attachments to 
this message are intended for the exclusive use of the addressee(s) and may 
contain proprietary, confidential or privileged information. If you are not the 
intended recipient, you should not disseminate, distribute or copy this e-mail. 
Please notify the sender immediately and destroy all copies of this message and 
any attachments.

WARNING: Computer viruses can be transmitted via email. The recipient should 
check this email and any attachments for the presence of viruses. The company 
accepts no liability for any damage caused by any virus transmitted by this 
email.

www.wipro.com
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


RE: Aes-256 /testing of AES_cbc_encrypt

2006-09-06 Thread Bhat, Jayalakshmi Manjunath

Thank you very much for the quick reply. 

Regards,
Jaya.

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Marek Marcola
Sent: Wednesday, September 06, 2006 3:31 PM
To: openssl-users@openssl.org
Subject: RE: Aes-256 /testing of AES_cbc_encrypt

Hello,
 
   I went through  FIPS-197 for AES. Now if I want to test 
   void AES_cbc_encrypt(const unsigned char *in, unsigned
char *out,
const unsigned long length, const AES_KEY *key,
unsigned char *ivec, const int enc) function.
   How should I test this function?
For test vectors you may look in test/evptests.txt in OpenSSL source.
For example if you will have test line like:

AES-128-CBC:2B7E151628AED2A6ABF7158809CF4F3C:000102030405060708090A0B0C0
D0E0F:6BC1BEE22E409F96E93D7E117393172A:7649ABAC8119B246CEE98E9B12E9197D

then to test this from command line you may run:

$ perl -e 'print pack(H*,6BC1BEE22E409F96E93D7E117393172A)' | \
openssl enc -e -aes-128-cbc \
-K 2B7E151628AED2A6ABF7158809CF4F3C \
-iv 000102030405060708090A0B0C0D0E0F | \ 
perl -e '$a=STDIN; print unpack(H*,$a), \n'

to get: 7649abac8119b246cee98e9b12e9197d8964e0b149c10b7b682e6e39aaeb731c

and of course if you run:

$ perl -e 'print
pack(H*,7649abac8119b246cee98e9b12e9197d8964e0b149c10b7b682e6e39aaeb7
31c)'|\
openssl enc -d -aes-128-cbc \
-K 2B7E151628AED2A6ABF7158809CF4F3C \
-iv 000102030405060708090A0B0C0D0E0F | \
perl -e '$a=STDIN; print unpack(H*,$a), \n'

you will get: 6bc1bee22e409f96e93d7e117393172a

The same results you should get using AES_cbc_encrypt() but you should
be aware that padding is not removed by this function when you decrypt
data.

Best regards,
--
Marek Marcola [EMAIL PROTECTED]

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: [SECURITY] OpenSSL 0.9.8c and 0.9.7k released

2006-09-06 Thread Haridharan

  This release fixes an important security vulnerability which could
  allow RSA Signature Forgery, CVE-2006-4339.  Please see
  http://www.openssl.org/news/secadv_20060905.txt


I could see the patch available in the location 
http://www.openssl.org/news/patch-CVE-2006-4339.txt is been updated with 
removal of unwanted code lines.


Will these changes be commited to the OpenSSL releases 0.9.7k and 0.9.8c. 
If so, when will the tar-balls be available.


--Haridharan. 


__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Description of the X509 object

2006-09-06 Thread Frank Büttner
Hello, I want to implement my own certificate storage.
But I can't find information about the OpenSSL X509 and the X509_STORE
object. But this is need to feed OpenSSL with the certs and key's of
my Certificate storage.
Have anybody some documentatoion about these object's?

Thanks.



smime.p7s
Description: S/MIME Cryptographic Signature


Re: Query regarding AES support in Open SSL

2006-09-06 Thread Richard Salz
 I am using keytool command to generate the certificates, currently i
 am using RSA algorithm.
 We are planning to change this to AES

You can't do that.  (Well, actually, you can, but it means that anyone who 
can verify the certificate can also generate their own counterfeit that is 
impossible to detect.

You probably need to read some intro material on crypto.

/r$

--
SOA Appliances
Application Integration Middleware

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: Query regarding AES support in Open SSL

2006-09-06 Thread Wes Kussmaul




V, Bharath (Bharath) wrote:

  
  
  I
am using keytool command to generate the certificates, currently i am
using RSA algorithm.
  We
are planning to change this to AES, does Open SSL support AES? 
  If
yes can i use it with keytool command.

RSA is an asymmetric algorithm, which is used to establish a channel by
which symmetric keys can be exchanged in confidence.

AES is a symmetric algorithm, which is used after the key exchange has
taken place.

They are not interchangeable.



__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: Question reagrding OpenSSL recent security advisory

2006-09-06 Thread Dr. Stephen Henson
On Wed, Sep 06, 2006, Hagai Yaffe wrote:

 
 I have read the advisory an I am a bit puzzled regarding the there are
 CAs using exponent 3 in wide use comment, I have tried to check and
 could not found any CA using this exponent, all the CA's I have seen are
 using 0x10001 (CA's I have generate by OpenSSL using default values,
 world wide trusted CA's such as VeriSign and Thawte etc..), I understand
 that specifying CA's using exponent 3 will give specific targets to
 malicious people and that is defiantly not a good idea, how ever I would
 like to try and better understand the range of the problem,  are only
 old CA's using exponent 3 ? 
 
 Could anyone elaborate some on this? 
 

I don't want to name names here but a brief study I did revealed 8 public CA
root certificates which used exponent 3.

Steve.
--
Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
OpenSSL project core developer and freelance consultant.
Funding needed! Details on homepage.
Homepage: http://www.drh-consultancy.demon.co.uk
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Including attributes in the signed certificate

2006-09-06 Thread Quarantel, Hubert
Hi !

I'm trying to include attributes/fields in a signed certificate.

I've first issued a CSR with some extra attributes in it, here's what the CSR 
looks like with openssl req -in test.csr -text -noout :

Certificate Request:
Data:
Version: 0 (0x0)
Subject: O=TEST, OU=Support, CN=TEST/[EMAIL PROTECTED]
Subject Public Key Info:
Public Key Algorithm: dsaEncryption
DSA Public Key:
pub:
(snip)
P:
(snip)
Q:
(snip)
G:
(snip)
Attributes:
countryName  :FR
localityName :Paris
uidNumber:4321
gidNumber:1234
uid  :test
Signature Algorithm: dsaWithSHA1
(snip)

I'm very happy so far, as I the attributes/fields countryName, uid, uidNumber, 
... I added in the [req_attribute] of the default openssl.cnf file, along with 
their respective OIDs in the [new_oids] section.

But, when I sign the certificate request with that same openssl.cnf file, 
either with openssl ca or with openssl x509, the produced certificate does not 
include those attributes, as shown by 
openssl x509 -text -in test.crt -noout

Certificate:
Data:
Version: 3 (0x2)
Serial Number: 2 (0x2)
Signature Algorithm: sha1WithRSAEncryption
Issuer: CN=TEST CA, O=TEST/[EMAIL PROTECTED]
Validity
Not Before: Sep  6 11:09:06 2006 GMT
Not After : Sep  7 11:09:06 2006 GMT
Subject: O=TEST, OU=Support, CN=TEST/[EMAIL PROTECTED]Subject 
Public Key Info:
Public Key Algorithm: dsaEncryption
DSA Public Key:
pub:
  (snip)
P:
  (snip)
Q:
  (snip)
G:
  (snip)
X509v3 extensions:
X509v3 Basic Constraints:
CA:FALSE
Netscape Comment:
OpenSSL Generated Certificate
X509v3 Subject Key Identifier:
19:88:DF:ED:6C:82:86:BA:91:81:AA:1A:A4:55:A7:5C:20:7B:5A:62
X509v3 Authority Key Identifier:

keyid:CF:A8:E1:B1:BD:5C:B2:55:9B:20:F5:44:8E:36:D2:F4:E6:E9:10:FF

Signature Algorithm: sha1WithRSAEncryption
  (snip) 




Would anyone help me ? or at least tell me where I got wrong ?

Thanks for any kind of help,

Hubert,
 
UNIX is user friendly.
It's just selective about who its friends are.














Ce message et les pièces jointes sont confidentiels et établis à l'attention 
exclusive de ses destinataires. Toute utilisation ou diffusion, même partielle, 
non autorisée est interdite. Tout message électronique est susceptible 
d'altération. Brink's décline toute responsabilité au titre de ce message s'il 
a été altéré, déformé ou falsifié. Si vous n'êtes pas le destinataire de ce 
message, merci de le détruire et d'avertir l'expéditeur.

This message and any attachments are confidential and intended solely for the 
addressees. Any unauthorized use or disclosure, either whole or partial is 
prohibited. E-mails are susceptible to alteration. Brink's shall not be liable 
for the message if altered, changed or falsified. If you are not the intended 
recipient of this message, please delete it and notify the sender.
*

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


PFX to PEM

2006-09-06 Thread Sascha Kiefer
Hi,

how is PFX to PEM converting done?
I know of the command

openssl --pkcs12 --in foo.pfx --out foo.pem

but what is done internally? Just converting to base64?

Thanks for hints.
--sk
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


RE: Including attributes in the signed certificate

2006-09-06 Thread Mouse
There is one more problem with attributes and official CA's. If you are your
own CA, it makes a big difference (less trust around in the world - but you
can enforce any attribute verification policy that you choose yo).

Atttributes are added at the time of certification (good - so they can't be
maliciously changed/removed/added later), but currently CA's do NOT verify
them (bad - crap placed in by the identity owner is still crap). Thus, you
can prove that you are Hubert - and add a whole bunch of stuff about you
(the tallest man in Germany, undercover assistant of UN Secretary General,
whatever). Resulting cert will contain a mix of true statements with
something uncertain.

A solution can be Attribute Certificate. I don’t know if it makes sense to
you - running your own CA you're free to do what's right regardless of what
VeriSign is doing.

Sorry I didn't answer your question - somebody more knowledgeable about
OpenSSL will explain why it exhibits what I consider a bug (whatever is
placed in the CSR must be signed IMHO).


 -Original Message-
 From: [EMAIL PROTECTED] 
 [mailto:[EMAIL PROTECTED] On Behalf Of 
 Quarantel, Hubert
 Sent: Wednesday, September 06, 2006 08:46
 To: openssl-users@openssl.org
 Subject: Including attributes in the signed certificate
 
 Hi !
 
 I'm trying to include attributes/fields in a signed certificate.
 
 I've first issued a CSR with some extra attributes in it, 
 here's what the CSR looks like with openssl req -in test.csr 
 -text -noout :
 
 Certificate Request:
 Data:
 Version: 0 (0x0)
 Subject: O=TEST, OU=Support, 
 CN=TEST/[EMAIL PROTECTED]
 Subject Public Key Info:
 Public Key Algorithm: dsaEncryption
 DSA Public Key:
 pub:
   (snip)
 P:
   (snip)
 Q:
   (snip)
 G:
   (snip)
 Attributes:
 countryName  :FR
 localityName :Paris
 uidNumber:4321
 gidNumber:1234
 uid  :test
 Signature Algorithm: dsaWithSHA1
   (snip)
 
 I'm very happy so far, as I the attributes/fields 
 countryName, uid, uidNumber, ... I added in the 
 [req_attribute] of the default openssl.cnf file, along with 
 their respective OIDs in the [new_oids] section.
 
 But, when I sign the certificate request with that same 
 openssl.cnf file, either with openssl ca or with openssl 
 x509, the produced certificate does not include those 
 attributes, as shown by openssl x509 -text -in test.crt -noout
 
 Certificate:
 Data:
 Version: 3 (0x2)
 Serial Number: 2 (0x2)
 Signature Algorithm: sha1WithRSAEncryption
 Issuer: CN=TEST CA, O=TEST/[EMAIL PROTECTED]
 Validity
 Not Before: Sep  6 11:09:06 2006 GMT
 Not After : Sep  7 11:09:06 2006 GMT
 Subject: O=TEST, OU=Support, 
 CN=TEST/[EMAIL PROTECTED]Subject Public Key Info:
 Public Key Algorithm: dsaEncryption
 DSA Public Key:
 pub:
   (snip)
 P:
   (snip)
 Q:
   (snip)
 G:
   (snip)
 X509v3 extensions:
 X509v3 Basic Constraints:
 CA:FALSE
 Netscape Comment:
 OpenSSL Generated Certificate
 X509v3 Subject Key Identifier:
 
 19:88:DF:ED:6C:82:86:BA:91:81:AA:1A:A4:55:A7:5C:20:7B:5A:62
 X509v3 Authority Key Identifier:
 
 keyid:CF:A8:E1:B1:BD:5C:B2:55:9B:20:F5:44:8E:36:D2:F4:E6:E9:10:FF
 
 Signature Algorithm: sha1WithRSAEncryption
   (snip) 
 
 
 
 
 Would anyone help me ? or at least tell me where I got wrong ?
 
 Thanks for any kind of help,
 
 Hubert,
  
 UNIX is user friendly.
 It's just selective about who its friends are.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 Ce message et les pièces jointes sont confidentiels et 
 établis à l'attention exclusive de ses destinataires. Toute 
 utilisation ou diffusion, même partielle, non autorisée est 
 interdite. Tout message électronique est susceptible 
 d'altération. Brink's décline toute responsabilité au titre 
 de ce message s'il a été altéré, déformé ou falsifié. Si vous 
 n'êtes pas le destinataire de ce message, merci de le 
 détruire et d'avertir l'expéditeur.
 
 This message and any attachments are confidential and 
 intended solely for the addressees. Any unauthorized use or 
 disclosure, either whole or partial is prohibited. E-mails 
 are susceptible to alteration. Brink's shall not be liable 
 for the message if altered, changed or falsified. If you are 
 not 

Re: Securing passwords

2006-09-06 Thread David Irvine
Bernhard Froehlich wrote:
 David Irvine wrote:
 [...]
 Many thanks for replying - your right I am a bit off topic (and I hope I
 don't need a surgeon for being so ;-) ) but I suppose it is slightly
 related to the securing of info. 
 Yes, I'll reply on the list till someone complains.
 I think you are correct in your
 assumption for some readers. I am thinking along the lines of a public
 reader i.e. one which anybody can finger swipe to get access to data and
 therefore the digitised stream may be sent somewhere.  I am using the
 premise that any non encrypted data stream on a PC can be captured.

 My thoughts were that if it were possible to have an encrypted (PKI)
 copy of this stream  that only the server could decrypt (if there was a
 server) or an application could decrypt, can such devices create a
 secure link between them and a server or application to transmit this,
 and if so can it be easily compromised (everything can to some degree I
 suppose).
   
 If it's only the data between the reader and computer that can be
 captured, the method outlined above (using the fingerprint as a PIN
 for a smartcard chip) should be secure under the usual assumptions
 concerning key size etc.
 Just remember, most probably it's not really encryption you want, it's
 authentication! Encryption can help but it's not the only way.

 The problems start if the bad guys start using screwdrivers or are
 otherwise fiddeling around with the reader (see for example
 http://ds.ccc.de/080/finger if you can read german) or the computer.
 If computer and reader themselves are not considered secure you'll
 probably have to go for something like TPM to increase the security.
 Apart from that what is the most effective way of entering a password to
 stop keyloggers I have been racking my brain thinking of a defeat for
 them but can't come up with one yet although I'm sure there is an answer
 somewhere. [...]
 IMHO the most efficient way currently is to use a class 2 smartcard
 reader. Whether to use a fingerprint sensor (integrated to the
 reader!) or a PIN (entered on the pinpad of the reader!) to unlock
 signature generation is more or less a matter of personal taste or
 other circumstances of your application. For example I'd prefer a
 fingerprint reader if it's easy for an attacker to install a web cam
 to watch the pinpad. On the other hand, if you can enter the PIN in
 some closet with no public access I'd prefer the pinpad.

 Of course both versions can still be defeated by installing
 keyloggers inside the reader device or capturing the PIN/fingerprint
 using known techniques, but you have better chances to defend against
 this.
 My concern is that I have a p2p app which needs AES / RSA etc. and
 therefore a pass at some time - can't use a server so kerberos / single
 pass etc. is a no goer.
   
 Hmm, maybe *encryption* should be handled between the peers using the
 peer's keys and *authentication* can be done by a smartcard/class 2
 reader? This seems to take care of your problems if the peers
 themselves are secure.

 Another approach I've seen with homebanking (less secure than a class
 2 reader/smartcard but probably easier to implement) is to use the
 mouse to enter a PIN  on a screen pinpad, which is at a random
 position on the screen and/or the keys are randomly distributed. This
 is still vulnerable to webcams but the image quality has to be much
 better if you use a tiny cursor...
 [...]
 So far

 1:  A bio reader that stores a pass seems to be quite good (although
 personalised)
   
 No, a stored password is not really good, since the transmission can
 be intercepted.
 By the way, are you familliar with smartcard technology?
 2: A bio reader that can encrypt and secure a link between it and
 authority mechanism (server or app) would be better - not personalised.
 3: A passphrase - well this is the issue - we can make them stronger by
 running through pbkdf2 etc. but it's the entering that's not right
 (insecure).
   
 4. Biometric sensors can be fooled considerably easier than realized
 in public perception (BTW, the same thing is probably true for
 encryption in general). Biometric sensors are still to be considered 
 somewhat experimental, especially if the reader devices are cheap!
 Pinpads have their own risks, but at least those are more publicly
 known (or are they?).

 Problem software or hardware loggers (think worst case - hardware) can
 read anything we input to screen mouse or keyboard so

 1: Are they easy to detect (NO!)
 2: Can they be fooled by cut paste etc. / NO many read clipboard
   
 But cut'n paste is still vulnerable to webcams watching the screen!
 So

 assuming somebody can SEE everything we type or move the mouse to
 (images etc.) what can be done ?
   
 1. Use inputs that cannot be seen so easily (the biometric approach)
 2. Make sure the input cannot be seen (the pinpad reader approach)

 One very important thing to remember: There is *no* perfect security
 in real life! Just forget 

Trouble building 0.9.7k shared libraries

2006-09-06 Thread MeeAGhost

Using Cygwin I am trying to build 0.9.7k with shared libraries:

$ ./config --prefix=/tmp/bob shared
$ make depend
$ make test

The above completes no problem but when I do the 'make install' I get
the followng errors:
[snip]
installing libcrypto.dll.a
cp: cannot stat `cygcrypto-0.9.7.dll.a': No such file or directory
chmod: cannot access `/tmp/bob/bin/cygcrypto-0.9.7.dll.a.new': No such
file or directory
mv: cannot stat `/tmp/bob/bin/cygcrypto-0.9.7.dll.a.new': No such file
or directory
cp: cannot stat `libcrypto.dll.a.a': No such file or directory
chmod: cannot access `/tmp/bob/lib/libcrypto.dll.a.a.new': No such
file or directory
mv: cannot stat `/tmp/bob/lib/libcrypto.dll.a.a.new': No such file or directory
installing libssl.dll.a
cp: cannot stat `cygssl-0.9.7.dll.a': No such file or directory
chmod: cannot access `/tmp/bob/bin/cygssl-0.9.7.dll.a.new': No such
file or directory
mv: cannot stat `/tmp/bob/bin/cygssl-0.9.7.dll.a.new': No such file or directory
cp: cannot stat `libssl.dll.a.a': No such file or directory
chmod: cannot access `/tmp/bob/lib/libssl.dll.a.a.new': No such file
or directory
mv: cannot stat `/tmp/bob/lib/libssl.dll.a.a.new': No such file or directory

Anyone have any ideas?  Any help would be apprecicated.

TIA,
Chris
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: Question reagrding OpenSSL recent security advisory

2006-09-06 Thread William A. Rowe, Jr.
Marek Marcola wrote:
 Hello,
 I have read the advisory an I am a bit puzzled regarding the there are
 CAs using exponent 3 in wide use comment, I have tried to check and
 could not found any CA using this exponent, all the CA’s I have seen
 are using 0x10001 (CA’s I have generate by OpenSSL using default
 values, world wide trusted CA’s such as VeriSign and Thawte etc..)

 are only old CA’s using exponent 3 ? 
 Could anyone elaborate some on this?

 Look at:
 http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html

That's a rather worthless answer Marek, the question isn't what is the
flaw (mishandled exponent 3-signed certificates), but the prevalence.

My cursory examination shows most keygen tools have been using F4 style
exponents most of this century.  Two cases came to mind...

  Private CA's generated with very old tools (such tools fester a long time)

  Old signing keys reused for fresh signing request keys (anathema of best
  practices)

but most importantly, public signing keys.  Hagai asks how prevalent such
exponent 3 public or commercial signing keys still are?  Someone stated
they are in wide use.  This is not 'private' information, and Hagai just
asked if someone has done the actual research of affected public/commercial
signing authorities?




__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: Question reagrding OpenSSL recent security advisory

2006-09-06 Thread Joe Gluck
Hagai,

From my research I found that there are some known CA that use exponent of 3 (and some hardware implementation that use that as default).
About your ca, if you know that all your components (browsers and/orapplications)that will be involved will have good PKCS#1 implementation, then you should be ok with exponent of 3, or even exponent of 1, in fact it will make your public key operations (encrypt, verify) faster. And if your components don't have PKCS#1 then you have much more to worry about even with bigger exponents.


For example the standard OpenSSL RSA signature is RSA+PKCS#1, and i think must other standard implementations as well.

However I did see some government documents claiming that even 65537 is not enough, and they recommend even bigger, but I think a lot of that is politics.I know that a lot of people here will disagree but, just do the research and if you know the components involved have good PKCS#1 you should be fine with small public exponents.


Anyone that has a good reason to say this is wrong with details, I would love to hear that.

Joe Gluck
On 9/6/06, Dr. Stephen Henson [EMAIL PROTECTED] wrote:
On Wed, Sep 06, 2006, Hagai Yaffe wrote: I have read the advisory an I am a bit puzzled regarding the there are
 CAs using exponent 3 in wide use comment, I have tried to check and could not found any CA using this exponent, all the CA's I have seen are using 0x10001 (CA's I have generate by OpenSSL using default values,
 world wide trusted CA's such as VeriSign and Thawte etc..), I understand that specifying CA's using exponent 3 will give specific targets to malicious people and that is defiantly not a good idea, how ever I would
 like to try and better understand the range of the problem,are only old CA's using exponent 3 ? Could anyone elaborate some on this?I don't want to name names here but a brief study I did revealed 8 public CA
root certificates which used exponent 3.Steve.--Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepageOpenSSL project core developer and freelance consultant.Funding needed! Details on homepage.
Homepage: http://www.drh-consultancy.demon.co.uk__OpenSSL Project 
http://www.openssl.orgUser Support Mailing Listopenssl-users@openssl.orgAutomated List Manager 
[EMAIL PROTECTED]


Re: Is there any API available to convert the DER formatted file to Base64 formatted file?

2006-09-06 Thread Nils Larsch

[EMAIL PROTECTED] wrote:

Hi Team,

Is there any API available in OPENSSL to convert the DER formatted file
to Base64 formatted file?  Please let me know your thoughts. Thank you.


have a look at what openssl base64 ... does (or openssl enc -base64 ...).

Cheers,
Nils
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]