Re: Openssl for Java application

2008-06-02 Thread Larry Bugbee


So, I hope that I will get sufficient information from you on how to  
integrate OpenSSL into my Java application.


You might find it a lot easier if you were to use Bouncy Castle.
  http://www.bouncycastle.org/




[PATCH] allow setting make command via env var

2008-06-02 Thread Hanno Böck
Taken from Gentoo Linux, please apply.

-- 
Hanno Böck  Blog:   http://www.hboeck.de/
GPG: 3DBD3B20   Jabber/Mail:[EMAIL PROTECTED]
respect $MAKE if it is set in the environment so we don't get a mix
of the host `make` and whatever $MAKE is set to when recursing

http://bugs.gentoo.org/146316

--- openssl-0.9.8e/Configure
+++ openssl-0.9.8e/Configure
@@ -931,6 +931,7 @@
 $default_ranlib= &which("ranlib") or $default_ranlib="true";
 $perl=$ENV{'PERL'} or $perl=&which("perl5") or $perl=&which("perl")
   or $perl="perl";
+my $make = $ENV{'MAKE'} || "make";
 
 chop $openssldir if $openssldir =~ /\/$/;
 chop $prefix if $prefix =~ /\/$/;
@@ -1554,7 +1557,7 @@
 EOF
 	close(OUT);
 } else {
-	my $make_command = "make PERL=\'$perl\'";
+	my $make_command = "$make PERL=\'$perl\'";
 	my $make_targets = "";
 	$make_targets .= " links" if $symlink;
 	$make_targets .= " depend" if $depflags ne $default_depflags && $make_depend;


signature.asc
Description: This is a digitally signed message part.


[PATCH] Enable setting CC and AR with environment vars

2008-06-02 Thread Hanno Böck
This patch allows the Configure script to detect the ar and cc command via 
environment variables. Taken from Gentoo package.

Please apply.

-- 
Hanno Böck  Blog:   http://www.hboeck.de/
GPG: 3DBD3B20   Jabber/Mail:[EMAIL PROTECTED]
--- Configure
+++ Configure
@@ -928,7 +928,8 @@
 print "IsMK1MF=$IsMK1MF\n";
 
 my @fields = split(/\s*:\s*/,$table{$target} . ":" x 30 , -1);
-my $cc = $fields[$idx_cc];
+my $cc = $ENV{'CC'} || $fields[$idx_cc];
+my $ar = $ENV{'AR'} || "ar";
 my $cflags = $fields[$idx_cflags];
 my $unistd = $fields[$idx_unistd];
 my $thread_cflag = $fields[$idx_thread_cflag];
@@ -951,7 +951,7 @@
 my $shared_cflag = $fields[$idx_shared_cflag];
 my $shared_ldflag = $fields[$idx_shared_ldflag];
 my $shared_extension = $fields[$idx_shared_extension];
-my $ranlib = $fields[$idx_ranlib];
+my $ranlib = $ENV{'RANLIB'} || $fields[$idx_ranlib];
 my $arflags = $fields[$idx_arflags];
 
 my $no_shared_warn=0;
@@ -1292,6 +1292,7 @@
 	s/^RMD160_ASM_OBJ=.*$/RMD160_ASM_OBJ= $rmd160_obj/;
 	s/^PROCESSOR=.*/PROCESSOR= $processor/;
 	s/^RANLIB=.*/RANLIB= $ranlib/;
+	s/^AR=ar /AR= $ar /;
 	s/^ARFLAGS=.*/ARFLAGS= $arflags/;
 	s/^PERL=.*/PERL= $perl/;
 	s/^KRB5_INCLUDES=.*/KRB5_INCLUDES=$withargs{"krb5-include"}/;


signature.asc
Description: This is a digitally signed message part.


Re: Openssl for Java application

2008-06-02 Thread Julius Davies
Hi, Khoo Wei Hiong,

What are you trying to do exactly?

If you're doing password-based encryption/decryption with symmetric
keys (e.g. AES, 3DES with "openssl enc" on command-line), then the
not-yet-commons-ssl java library will help you interop with OpenSSL:

http://juliusdavies.ca/commons-ssl/

In particular, here's the link describing the symmetric key
password-based-encryption (PBE) stuff:

http://juliusdavies.ca/commons-ssl/pbe.html


The library can also read any DSA or RSA private key generated by OpenSSL:

http://juliusdavies.ca/commons-ssl/pkcs8.html


Good luck!


yours,

Julius





On Mon, Jun 2, 2008 at 12:14 AM, Khoo Wei Hiong <[EMAIL PROTECTED]> wrote:
> This is my first time to use OpenSSL. I have wrote once to ask for help but
> no reply. I would like to write OpenSSL-enabled code in my Java application,
> but I have no idea where to start from. What I have explored is that OpenSSL
> is meant for C or I might be wrong.
>
> So, I hope that I will get sufficient information from you on how to
> integrate OpenSSL into my Java application.
>
>
>
> Thanks. Your help is much appreciated.



-- 
yours,

Julius Davies
250-592-2284 (Home)
250-893-4579 (Mobile)
http://juliusdavies.ca/
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: OpenSSL HTTPS application and Wireshark v1.0.0 (Win32)

2008-06-02 Thread Joe Flowers
Thanks Jean-Marc.

Do you think that because my OpenSSL app uses AES-256 for the cipher that
that could be the problem?

Joe



Re: OpenSSL HTTPS application and Wireshark v1.0.0 (Win32)

2008-06-02 Thread Jean-Marc Desperrier

Joe Flowers wrote:

[...]
I can decrypt the HTTPS traffic OK [...] where the HTTPS
traffic is initiated from a web browser (IE) on the client machine.

BUT, when I try my HTTPS client application (on the client machine,
talking to the server machine), the application seems to work correctly
other than I am not able to see the decrypted data in Wireshark. [...]

Is there a trick to getting Wireshark to work with OpenSSL applications
or is there something wrong with my application which prevents Wireshark
from decrypting the data?


This sounds more like a Wireshark than an openssl question.

I suspect, if your configuration of Wireshark is correct, that the 
negociated ciphersuite uses Diffie-Hellman, so can not be externally 
decrypted.


Two solutions :
- configure openssl on your server to disable the DH ciphersuites
- use Debian for the server so that's it possible to break the generated 
DH secret and decrypt the session ;-)

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


OpenSSL HTTPS application and Wireshark v1.0.0 (Win32)

2008-06-02 Thread Joe Flowers
Hello everyone,

Does anyone have ideas on how I can get Wireshark to decrypt my OpenSSL
HTTPS client application data?

I can decrypt the HTTPS traffic OK to the server machine from the client
machine with Wireshark installed on the client machine, where the HTTPS
traffic is initiated from a web browser (IE) on the client machine.

BUT, when I try my HTTPS client application (on the client machine, talking
to the server machine), the application seems to work correctly other than I
am not able to see the decrypted data in Wireshark. This is killing me when
trying to troubleshoot this application on other client machines.

Is there a trick to getting Wireshark to work with OpenSSL applications or
is there something wrong with my application which prevents Wireshark from
decrypting the data?


Thanks for any help or ideas to try!

Joe


RE: bug? SSL_ERROR_SSL/EAGAIN from SSL_write()

2008-06-02 Thread David Schwartz

> The problem is that SSL_write() sometimes returns SSL_ERROR_SSL with
> errno equal to EAGAIN. Calling SSL_write() again seems to solve the
> problem. I have the impression that SSL_write() should return
> SSL_ERROR_WANT_WRITE in this situation.

> * the underlying socket is blocking

It sounds like you're trying to get some kind of fake halfway-non-blocking
operation. This never works quite right. Either use blocking operations on
blocking sockets or non-blocking operations on non-blocking sockets.

DS


__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: Openssl for Java application

2008-06-02 Thread Mehdi Asgari
http://noc.kpnw.org/~scott/
http://www.bpsinfo.com/javassl/
http://sponsor.iti.informatik.tu-darmstadt.de/itissl/


bug? SSL_ERROR_SSL/EAGAIN from SSL_write()

2008-06-02 Thread Aleksander Korzynski

Hi all,

I'm seeing weird OpenSSL behaviour and I suspect it's a bug in the library.

The problem is that SSL_write() sometimes returns SSL_ERROR_SSL with
errno equal to EAGAIN. Calling SSL_write() again seems to solve the
problem. I have the impression that SSL_write() should return
SSL_ERROR_WANT_WRITE in this situation.

Please take note that it's very difficult to reproduce the error. I
observe it only when sending a particular buffer over SSL and only for
some percentage of the tries. With other buffers, everything works
ordinarily.

Here is some more information about the error.
* the error queue contains "rsa routines:RSA_verify:wrong signature
length" and "asn1 encoding routines:ASN1_item_verify:EVP lib".
* the underlying socket is blocking
* I'm using OpenSSL 0.9.8h and Linux 2.6.18

Detailed information about the return values:

SSL_write() returned -1

SSL_get_error() returned 1
// the above corresponds to SSL_ERROR_SSL ("A failure in the SSL library
occurred, usually a protocol error. The OpenSSL error queue contains
more information on the error.")

ERR_get_error() returned 67596407
ERR_error_string() returned error:04077077:rsa routines:RSA_verify:wrong
signature length

ERR_get_error() returned 218910726
ERR_error_string() returned error:0D0C5006:asn1 encoding
routines:ASN1_item_verify:EVP lib

ERR_get_error() returned 0

errno is 11   // which corresponds to EAGAIN

Regards,
Aleksander Korzynski




__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: SSL

2008-06-02 Thread Mounir IDRASSI
Hi,

There is no way to bypass or override the passphrase associated with your
SSL key. The key is encrypted and only the right passphrase can decrypt it
to be usable by Apache. If you don't have this passphrase, you should
start thinking about generating a new key and acquiring a new SSL
certificate.
To find what key is Apache using, look in your httpd.conf file to see
where the SSL configuration is store and there you will find the path of
the SSL key and certificate.

Cheers,
-- 
Mounir IDRASSI
IDRIX
http://www.idrix.fr

On Sun, June 1, 2008 11:25 pm, Billy Chan Ting wrote:
> Hi there,
>
>
>
> Im trying to update an SSL certificate on our server (CentOS) but its
> asking for a pass phrase for the server before I can restart httpd and
> apache. The guys that created the current expired certificate don't work
> here anymore.
>
>
>
> How can I overwrite the pass phrase? How do I know which key or
> certificate file apache is currently referring to?
>
> Really need your help as our wireless hotspot login is not working at
> the moment because apache is not running.
>
>
>
>
>
> Kind regards,
>
> Billy Chan-Ting
>
> Systems Analyst/Webmaster
>
> Computer Services Limited, Apia, SAMOA
>
> Tel:(685) 20926 ext 31
>
> Mobile: 7702615
>
> Email: [EMAIL PROTECTED]
>
> Ground Floor, SLAC Building
>
>
>
> Need a website? www.csl.ws/web
>
> Having database problems? www.csl.ws/db
>
>
>
>
>
>
>
>
>
>

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: newbie: problem + RSA

2008-06-02 Thread Marek . Marcola
Hello,

[EMAIL PROTECTED] wrote on 05/30/2008 12:34:15 PM:

> Hello,
> i have created the following code to test the use of RSA (signautre):
> 
> #include 
> #include 
> #include 
> #include 
> #include 
> #include 
> #include 
> #include 
> #include 
> #include 
> #include 
> 
> main ()
> {
> 
> long erreur = 0;
> char *message="vatos locos para siempre";
> char *encrypt, *decrypt, *sign, 
hash[SHA_DIGEST_LENGTH],hash1[SHA_DIGEST_LENGTH];
> int longmsg,i,random,ok;
> int siglong;
> RSA *rsa;
> 
>  random= RAND_load_file("/dev/urandom ",1024);//seeding the 
Pseudo random generator
> 
>  rsa = RSA_generate_key(128,13,NULL,NULL);//generating a key 
having a 128 bits modulus 
> 
>  SHA1(message,strlen(message),hash);//computing a digest 
using SHA1
>  for(i=0; i<20; ++i){
>  printf("%x",hash[i]);}
>  printf("\n"); 
> 
>  sign=(unsigned char*)malloc(RSA_size(rsa)); 
>  ok= 
RSA_sign(NID_sha1,hash,strlen(hash),sign,&siglong,rsa);//generating the 
> signature using RSA
>  erreur= ERR_get_error();
>  printf("signature = %d \n",ok);
>  printf("signature length =%d \n",siglong);
>  printf("erreur =%d \n",erreur); 
>  printf("PRNG random =%d \n",random);
>  printf("strlen(hash) =%d \n",strlen(hash)); 
> RSA_free(rsa);
> free(sign);
> 
> }
> 
> After i compiled it using: gcc rsa.c -o rsa -lssl
> And i received the following results:
> 
ff9c6bffdd1c5dff9157ffdbff93ffab3c23ffe5ffb344ff8b49632
> signature = 0 
> signature length =-1209806408 
> erreur =67588208 
> PRNG random =0 
> strlen(hash) =20 
> 
> here are my questions:
> 1- why RSA_sign returned a 0 (signautre = 0) which means the failure of 
the key generation?
> 2- why the signautre has a negative value unstead of having 20 bytes 
length?
> 3- why the function RAND_load_file returned zero unstead of returning 
the number of 
> bytes obtained after seeding the PRNG?
Try:
 - buffers for RSA_* functions mostly are "unsigned char*", not "char *"
 - use -Wall at compile time and look at any warnings like "passing 
argument 2 of ‘RSA_sign’ differ in signedness"
 - do not use strlen() on signatures, signatures are binary data, not 
strings
 - you can not create RSA signature from 160 bit hash using 128 bit RSA 
key.
 - add SSL_load_error_strings() and SSL_library_init().

Best regards,
--
Marek Marcola <[EMAIL PROTECTED]>

:��I"Ϯ��r�m
(Z+�K�+1���x��h[�z�(Z+���f�y���f���h��)z{,���

Re: Wider fallout from Debian issue?

2008-06-02 Thread Mathias Brossard

Yves Rutschle wrote:

On Wed, May 28, 2008 at 07:55:35PM +1200, Deane Sloan wrote:

Finally - how real is this concern? What is the probability that say a
2048bit generated key could fall into the 32,767 keys in the metasploit
SSH example on unaffected systems?


32,768 = 2^15

number of 2048 bit keys: 2^2048


	I think that's really oversimplified. If you look at the OpenSSL RSA key 
generator, you'll notice that RSA keys are built from 2 prime numbers of 1024 
bits. Well not really 1024 bits but 1022 bits because top and bottom bit are 
always set. Also not all 2^1022 odd numbers between 2^1023 + 1 and 2^1024 - 1 
are prime numbers.


	Also those prime numbers are generated using the output of the OpenSSL RNG 
which is commonly (assuming no entropy from uninitialized memory, which should 
be the case on Linux, and no .rnd file) seeded only with the 2^15 bit PID and 
ENTROPY_NEEDED (32) bytes from urandom. This would mean an upper limit 
2^(15+256) = 2^271 keys that can be generated from OpenSSL (within those 
parameters).



Probability that a "proper" key falls in the space of the
"bad debian" keys: 2^15 / 2^2048 = 1 / 2^2033.

That's a lot of zeros before the first non-zero digit.


I get 2^15 / 2^271 = 1 / 2^256 which is a lot less impressive than your figure 
but still a very small probability.


Sincerely,
--
Mathias Brossard
begin:vcard
fn:Mathias Brossard
n:Brossard;Mathias
org:OpenTrust;R&D
email;internet:[EMAIL PROTECTED]
title:Senior Architect
x-mozilla-html:FALSE
version:2.1
end:vcard



Re: SSL

2008-06-02 Thread Kyle Hamilton
If you don't know the passphrase, you must generate a new keypair, and
get that public key certified into a new certificate.  (For more
information, including the appropriate commands, please refer to the
FAQ on openssl.org and any special instructions provided by your CA.)

Apache will use PrivateKeyFile and CertificateFile directives (in the
httpd.conf) to figure out what files to load from.  It will load
without a passphrase complaint if the private key is not encrypted by
a passphrase.

As a side note, if the machine has the ability to start Apache without
a passphrase complaint on bootup but is having trouble when you try to
start it manually, then the passphrase is somewhere on the disk
(probably in the rc.d script to start Apache, or referenced from
there).  You might be able to locate it by looking through the startup
scripts.

Good luck.

-Kyle H

On Sun, Jun 1, 2008 at 2:25 PM, Billy Chan Ting <[EMAIL PROTECTED]> wrote:
> Hi there,
>
>
>
> Im trying to update an SSL certificate on our server (CentOS) but its asking
> for a pass phrase for the server before I can restart httpd and apache. The
> guys that created the current expired certificate don't work here anymore.
>
>
>
> How can I overwrite the pass phrase? How do I know which key or certificate
> file apache is currently referring to?
>
> Really need your help as our wireless hotspot login is not working at the
> moment because apache is not running.
>
>
>
>
>
> Kind regards,
>
> Billy Chan-Ting
>
> Systems Analyst/Webmaster
>
> Computer Services Limited, Apia, SAMOA
>
> Tel:(685) 20926 ext 31
>
> Mobile: 7702615
>
> Email: [EMAIL PROTECTED]
>
> Ground Floor, SLAC Building
>
> Need a website? www.csl.ws/web
>
> Having database problems? www.csl.ws/db
>
>
>
>
>
>
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Openssl for Java application

2008-06-02 Thread Khoo Wei Hiong
This is my first time to use OpenSSL. I have wrote once to ask for help but
no reply. I would like to write OpenSSL-enabled code in my Java application,
but I have no idea where to start from. What I have explored is that OpenSSL
is meant for C or I might be wrong. 

So, I hope that I will get sufficient information from you on how to
integrate OpenSSL into my Java application. 

 

Thanks. Your help is much appreciated.



SSL

2008-06-02 Thread Billy Chan Ting
Hi there,

 

Im trying to update an SSL certificate on our server (CentOS) but its
asking for a pass phrase for the server before I can restart httpd and
apache. The guys that created the current expired certificate don't work
here anymore. 

 

How can I overwrite the pass phrase? How do I know which key or
certificate file apache is currently referring to? 

Really need your help as our wireless hotspot login is not working at
the moment because apache is not running. 

 

 

Kind regards,

Billy Chan-Ting

Systems Analyst/Webmaster

Computer Services Limited, Apia, SAMOA

Tel:(685) 20926 ext 31

Mobile: 7702615

Email: [EMAIL PROTECTED]

Ground Floor, SLAC Building

 

Need a website? www.csl.ws/web

Having database problems? www.csl.ws/db



 

 

 

<>

Strategy for freeing EVP and RSA keys

2008-06-02 Thread Kenneth Goldman
I'd like confirmation that I understand how to free RSA keys.

I create an RSA *key.  I then use it to create an EVP_PKEY
using EVP_PKEY_new() and EVP_PKEY_assign_RSA().

Later, want to free everything.

I _think_ that EVP_PKEY_free() will free both the EVP_PKEY and the
RSA objects.  Is that correct - that there's an implied free of the RSA
object?

If so, is this the correct strategy:

If the EVP_PKEY was created correctly
  free the EVP_KEY
else if the RSA key created correctly
  free the RSA key

--
Ken Goldman   [EMAIL PROTECTED]
914-784-7646 (863-7646)
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Install Error OpenSSL-0.9.8h

2008-06-02 Thread Eric D. Wade

Greetings,

I am receiving the following errors when attempting to install  
OpenSSL-0.9.8h on SuSE Linux Enterprise 9.  However, there was no  
issue with "make" and "make test".  Please advise,


Thanks,
-Eric ;.,

SSL.3 => ssl.3
making install in crypto...
make[1]: Entering directory `/usr/local/src/openssl-0.9.8h/crypto'
cp: cannot create regular file `usr/local/include/openssl/crypto.h':  
No such file or directory
chmod: cannot access `usr/local/include/openssl/crypto.h': No such  
file or directory
cp: cannot create regular file `usr/local/include/openssl/tmdiff.h':  
No such file or directory
chmod: cannot access `usr/local/include/openssl/tmdiff.h': No such  
file or directory
cp: cannot create regular file `usr/local/include/openssl/ 
opensslv.h': No such file or directory
chmod: cannot access `usr/local/include/openssl/opensslv.h': No such  
file or directory
cp: cannot create regular file `usr/local/include/openssl/ 
opensslconf.h': No such file or directory
chmod: cannot access `usr/local/include/openssl/opensslconf.h': No  
such file or directory
cp: cannot create regular file `usr/local/include/openssl/ebcdic.h':  
No such file or directory
chmod: cannot access `usr/local/include/openssl/ebcdic.h': No such  
file or directory
cp: cannot create regular file `usr/local/include/openssl/ 
symhacks.h': No such file or directory
chmod: cannot access `usr/local/include/openssl/symhacks.h': No such  
file or directory
cp: cannot create regular file `usr/local/include/openssl/ 
ossl_typ.h': No such file or directory
chmod: cannot access `usr/local/include/openssl/ossl_typ.h': No such  
file or directory

make[1]: *** [install] Error 1
make[1]: Leaving directory `/usr/local/src/openssl-0.9.8h/crypto'
make: *** [install_sw] Error 1
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Developing application with OpenSSL support

2008-06-02 Thread Mehdi Asgari
Look at this book:
Network Security With OpenSSL


openssl 0.9.8 with fips

2008-06-02 Thread Beth E. Okun
Hi,
 
I'm wondering about integrating fips into openssl-0.9.8g.  We were previously 
using openssl-0.9.7m, and have noted that the fips1.0 directory is absent in 
the 0.9.8g release, and also that the "./Configure" script does not contain any 
of the fips functionality.
 
I did note in some of the documentation that there is an openssl-0.9.8 fips 
build, I'm wondering if this is currently validated?  Also, is this a build 
that anyone can download?
 
Thank you so much for your time.
 
Sincerely,
 
Beth E. Okun 


Debugging i2d_X509() segfault

2008-06-02 Thread Kenneth Goldman
Subject says it:  What a good approach to debugging a segfault
in i2d_X509()?

The X509 certificate succeeds when I use X509_sign().  But
when I sign "by hand", adding the two signature algorithms,
signing with RSA_Sign(), and adding the signature to
the structure, X509_print_fp() segfaults.

The X509 structure (before serialization) verifies.
X509_print_fp() on the structure also succeeds.

Is there, for example, a way to i2d() the X509 parts
to narrow down the problem?

--
Ken Goldman   [EMAIL PROTECTED]
914-784-7646 (863-7646)
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Patches for CVE-2008-0891 and CVE-2008-1672

2008-06-02 Thread harini priya
Hi 

I am looking for the patches for the recently announced security 
vulnerabilities(CVE-2008-0891 and CVE-2008-1672) in version 0.9.8f of Openssl. 
Please let me know if the patches are available in the Openssl site or from 
Openssl.

Thanks & Regards
Harini


  

Re: Wider fallout from Debian issue?

2008-06-02 Thread travis
On Thu, May 29, 2008 at 10:14:12AM -0400, Victor Duchovni wrote:
> And then knowing that attackers never choose these keys, users start
> using these keys because attakers avoid them, and then attackers start
> checking these first again, ... This way lies madness. Fix your premise
> and don't change it in flight.

Agreed.

Let's assume that users tend to pick the password "password" when
given a choice.

Now adversaries try the most common password, namely "password", first.

Security conscious admins ban the word "password" as a password.
Yes, this does reduce the keyspace a tiny bit.

Do adversaries generally stop trying the password "password"?  Not generally.

For every security-conscious admin or user, there are 99 who are not.

For every cutting-edge security expert, there are 99 bottom-feeders
who will only get this information years later.

I still hear of people trying to tftp /etc/passwd.

I think that people will still be trying to brute-force their way in
with these keys for ten years.

I would ban the use of these keys to gain entry to anything, much like
security-conscious admins ban easily-guessed passwords.

Only the key space here is much, much larger than typical 8-character
passwords, so this loss will be unnoticeable.

I personally don't like the idea of generating keys that people will
try, or using a weak/known key with small probability, but in this
case I think it's so small that simply scanning for and banning such
keys is good enough.

I was hoping someone would release a tool to search for them in the
authorized_keys files on any OS (e.g. my OpenBSD box), but AFAIK,
nobody has.

I certainly don't want a kluge to the RNG.
-- 
Crypto ergo sum.  https://www.subspacefield.org/~travis/
Truth does not fear scrutiny or competition, only lies do.
If you are a spammer, please email [EMAIL PROTECTED] to get blacklisted.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


newbie: problem + RSA

2008-06-02 Thread Aymen BOUDGUIGA
Hello,
i have created the following code to test the use of RSA (signautre):

*#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 
#include 

main ()
{

long erreur = 0;
char *message="vatos locos para siempre";
char *encrypt, *decrypt, *sign,
hash[SHA_DIGEST_LENGTH],hash1[SHA_DIGEST_LENGTH];
int longmsg,i,random,ok;
int siglong;
RSA *rsa;

 random= RAND_load_file("/dev/urandom ",1024);//seeding the Pseudo
random generator

 rsa = RSA_generate_key(128,13,NULL,NULL);//generating a key having
a 128 bits modulus

 SHA1(message,strlen(message),hash);//computing a digest using
SHA1
 for(i=0; i<20; ++i){
 printf("%x",hash[i]);}
 printf("\n");

 sign=(unsigned char*)malloc(RSA_size(rsa));
 ok= 
RSA_sign(NID_sha1,hash,strlen(hash),sign,&siglong,rsa);**//generating
the signature using RSA*
* erreur= ERR_get_error();
 printf("signature = %d \n",ok);
 printf("signature length =%d \n",siglong);
 printf("erreur =%d \n",erreur);
 printf("PRNG random =%d \n",random);
 printf("strlen(hash) =%d \n",strlen(hash));
RSA_free(rsa);
free(sign);

}
*
After i compiled it using: *gcc rsa.c -o rsa -lssl
*And i received the following results:
*
ff9c6bffdd1c5dff9157ffdbff93ffab3c23ffe5ffb344ff8b49632
signature = 0
**signature length** =-1209806408
erreur =67588208
PRNG random =0
strlen(hash) =20
*
here are my questions:
1- why RSA_sign returned a 0 (signautre = 0) which means the failure of the
key generation?
2- why the signautre has a negative value unstead of having 20 bytes length?
3- why the function RAND_load_file returned zero unstead of returning the
number of bytes obtained after seeding the PRNG?

Thank you for your help.
have a nice day.
-- 
Aymen


How java application to access OpenSSL toolkit

2008-06-02 Thread khoo wei hiong
I am new to openssl. Now I am writing a simple server and client simulators 
using Java. I would like to know:
1. what are the files that i need to have, in order to use OpenSSL toolkit from 
my java application?
2. After getting those files, which file i need to access in order to use 
the methods/functions to build secure communication in my application?
3. For those private key or certificates, can i generate them by writing code 
in my application or i must use OpenSSL command tool to generate them?
Thanks. Your help is very much appreciated.


  

Re: Wider fallout from Debian issue?

2008-06-02 Thread Steffen DETTMER
* John Parker wrote on Sat, May 31, 2008 at 15:35 -0500:
> > Probability that a "proper" key falls in the space of the
> > "bad debian" keys: 2^15 / 2^2048 = 1 / 2^2033.
> >
> > That's a lot of zeros before the first non-zero digit.
> 
> Put differently, if you were to start generating keys now at a rate
> of, say, 1000/s, how long would you have to wait before you got one of
> the Debian keys?  This is a fun math problem for probability theory
> students.

wow, big numbers, John!

Cool idea to make such a time estimation :)

Maybe we should say `a million keys per second', sounds much more
but just are three digits less in the result :)

Is the calculation that complicated? Aren't the keys independent
of each other, so that each key always have the same probability,
since we are not `searching' but `guessing' when generating?

  (beside, that all those values are so horrible big that
   practically it does not matter of course :-))

With Victor's number of 2013 bits probablility, couldn't we
statistically expect half of that? With a million per second does
this give

(2^2012) / 10^6 / 60 / 60 / 24 / 365.25

years which the 593 digit number

14902094353953870165214353410981143707238235188212334084836694330488\
81602740116106914618746657670317636941551690018457525299578948872878\
36765806488289940028625838604817603080995646449473721456572544453618\
55782431446798772374819591436871325406930507575507226972337350924070\
18286766525605611643878663746554436287030227901811414516143083673080\
28892637223535933402770689260083725677906317276399679998875094201786\
41124284757024653658707346461288521262653417342296719918707161098486\
04762949019240046008945125630714069482285597143371578237868834348990\
3212246280855279993597997641265155474006217516831

of years? Seems there even is a number word[1], so are that
around a hundred quintillion nonagintacentillions? lol

Assuming the age of the universe beeing 13.73 * 10^9 year
(http://en.wikipedia.org/wiki/Age_of_the_universe),

(2^2012) / 10^6 / 60 / 60 / 24 / 365.25 / (13.73 * 10^9)

or `in short':

10853673965006460426230410350314015810078831164029376609495043212300\
66717217855868109700470981551578759607830801178774599635527275216954\
38285365250029089605699809617492791756005569154751435875143877970588\
89863387798105442370589651447102203501041884614353406389175055297938\
95329036071089301998454962670469363646780938020255946479346747030648\
42602066441031269776235024952719392336421207047632687544701452441213\
70083237259304190574440893271149687736819677598176780712823860960295\
73753058280582699205349690918218550242014273228966917871718014820823\
249253188700311725680844693464323049818

universe ages would be needed, slighty more than 10^582, which is
a funny big number... Even when using `googols' (10^100) as
factor it remains terrible...

lol

SCNR.

oki,

Steffen

[1] 
http://en.wikipedia.org/wiki/Names_of_large_numbers#Extensions_of_the_standard_dictionary_numbers
 
About Ingenico Throughout the world businesses rely on Ingenico for secure and 
expedient electronic transaction acceptance. Ingenico products leverage proven 
technology, established standards and unparalleled ergonomics to provide 
optimal reliability, versatility and usability. This comprehensive range of 
products is complemented by a global array of services and partnerships, 
enabling businesses in a number of vertical sectors to accept transactions 
anywhere their business takes them.
www.ingenico.com This message may contain confidential and/or privileged 
information. If you are not the addressee or authorized to receive this for the 
addressee, you must not use, copy, disclose or take any action based on this 
message or any information herein. If you have received this message in error, 
please advise the sender immediately by reply e-mail and delete this message. 
Thank you for your cooperation.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: Wider fallout from Debian issue?

2008-06-02 Thread Steffen DETTMER
* [EMAIL PROTECTED] wrote on Fri, May 30, 2008 at 06:51 -0500:
> Back in the day, DES was the de facto encryption algorithm.
 [...] 
> In an ideal world, I think the system should throw an exception
> then and let the calling application feed it another key.
> However, I think the general consensus was that we should just
> ignore it.

I don't know what the general consensus was, but applications
I know do not ignore this situation but handle it by actively
rejecting it. Do you meant this by `ignore'?

I think best is to consider a weak or semi-weak [3-]DES[1] key as
a [3-]DES key acceptable and thus refuse to generate, store or
use it[2]. In practice usually it shouldn't be a big deal to iterate
a 16 elements table at key generation, which probably usually is
much more expensive.

So to say that DES is not defined / allowed for those numbers
(keys). I think it is a little like division by zero: it simply
cannot be done.

BTW, testing that can be difficult and probably needs special
considerations (e.g. some test driver with special `PRNG without
random' generating bits that lead to a weak key to check if the
generator correctly detects and refuses it).

oki,

Steffen

[1] A 3DES key with one weak or semi-weak key half should be
considered weak (not essentially stronger than single DES).
[2] http://en.wikipedia.org/wiki/Weak_key tells as a main
countermeasure: `Checking generated keys against a list of
known weak keys, or building rejection of weak keys into the
key scheduling.'
 
About Ingenico Throughout the world businesses rely on Ingenico for secure and 
expedient electronic transaction acceptance. Ingenico products leverage proven 
technology, established standards and unparalleled ergonomics to provide 
optimal reliability, versatility and usability. This comprehensive range of 
products is complemented by a global array of services and partnerships, 
enabling businesses in a number of vertical sectors to accept transactions 
anywhere their business takes them.
www.ingenico.com This message may contain confidential and/or privileged 
information. If you are not the addressee or authorized to receive this for the 
addressee, you must not use, copy, disclose or take any action based on this 
message or any information herein. If you have received this message in error, 
please advise the sender immediately by reply e-mail and delete this message. 
Thank you for your cooperation.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: Developing application with OpenSSL support

2008-06-02 Thread development
Hi

Just got a tutorial and started to write some basic code, will test
tomorrow and if it works then will continue with certificates but don't
understand too much.

I have implemented the urgent code in PHP and it is working, but still
want to do it in C++ with my own program, have tested it right now and
connects without problems, tomorrow will try I/O through the SSL and if it
works will see how to manage the certificates that are not too clear by
now, but hope to understand soon.

Thanks for your help

> Consider "stunnel". Naive, ground-up implementations of SSL/TLS often
> accidentally fail to do the job securely. Use an SSL proxy to connect your
> non-SSL code to an SSL webserver (provided your execution environment
> can restrict access to the proxy, if "stunnel" unix-domain sockets for
> the local end-point, file permissions on that is a reasonable approach
> on multi-user systems).
>
> Perhaps there are C++ class libraries that offer a high-level HTTPS
> connection primitive (and reasonably robust/flexible server certificate
> verification interface).
>
> --
>   Viktor.
> __
> OpenSSL Project http://www.openssl.org
> User Support Mailing Listopenssl-users@openssl.org
> Automated List Manager   [EMAIL PROTECTED]
>

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]