Re: Problems verifying certificates generated by Microsoft Certificate Authority and timestamping

2009-06-02 Thread Brad Mitchell
Hi,

 

I've been trying to get Time Stamping working where the CA issuing the Time
Stamping certificate is issued by a Microsoft Windows Server 2003 Enterprise
CA.

 

I've had success in terms of being able to actually sign the digest and I
actually have a certificate with the purpose of Time Stamp Signing as YES.

 

I am however having issues when I try to verify a token against the
certificate.

 

error 34 at 0 depth lookup:unhandled critical extension

 

This also happens when:

 

openssl verify -Cafile ca.cer tsatest.cer

 

tsatest.cer: /C=AU/ST=NSW/L=Sydney/O=Test TSA/OU=TSA/CN=Mr
Test/emailAddress=tes

t...@test.com.au

error 34 at 0 depth lookup:unhandled critical extension

OK

 

Sure I can get this to ignore the critical extension:

 

openssl verify -ignore_critical -CAfile ca.cer tsatest.cer

tsatest.cer: OK

 

There is no way however to do this using the "ts" commands for verifying
RFC3161 tokens/responses.

 

Whilst I could modify the ts.c and set the ignore_critical flag in the X509
STORE, according to RFC3280.

Line from the verify help page for openssl:

 

"Normally if an unhandled critical extension is present which is not
supported by OpenSSL the certificate is rejected (as required by RFC3280 et
al). If this option is set critical extensions are ignored."

 

I'm guessing this has something to do with these stupid application
extensions it has put on the certificate when generated from the Microsoft
CA:

 

 

X509v3 Basic Constraints: critical

CA:FALSE

X509v3 Key Usage:

Digital Signature, Non Repudiation

1.3.6.1.4.1.311.21.7:

0..&+.7.Y../...z.=...z...@..d...

X509v3 Extended Key Usage: critical

Time Stamping

1.3.6.1.4.1.311.21.10: critical

0.0

 

Does anyone out there have any experience with generating certificates from
Microsoft CA without these unknown extensions?

 

I'm guessing in this case it's the 1.3.6.1.4.1.311.21.10.

 

Application Policies extension -- same encoding as szOID_CERT_POLICIES
szOID_APPLICATION_CERT_POLICIES 1.3.6.1.4.1.311.21.10

 

^^ from some Microsoft page.

 

Any ideas??

 

Thanks,

Brad



Re: TLS compatibility problem -- can connect to server with NSS but not OpenSSL.

2009-06-02 Thread Victor Duchovni
On Tue, Jun 02, 2009 at 01:25:32PM +0100, David Woodhouse wrote:

> On Mon, 2009-06-01 at 17:15 -0400, Victor Duchovni wrote:
> > > I found another strange behaviour that I didn't expect -- the _order_ of
> > > the certificates in the cafile seems to be important.
> > 
> > Yes, the TLS protocol requires the trust chain to be delivered bottom-up.
> 
> That makes sense, but we're talking about the order of the certificates
> in the cafile, not on the wire. OpenSSL really ought to get that right.

The CAfile is for verification, not for sending alon the trust chain
of a given certificate. DO NOT append your CAfile to your certificate,
instead include just the leaf cert, then the issuing CAs bottom-up in
the right order.

-- 
Viktor.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Re: TLS w/LDAP - SOLVED

2009-06-02 Thread Victor Duchovni
On Tue, Jun 02, 2009 at 03:49:13PM +0200, Steffen DETTMER wrote:

> (OT)
> 
> * Michael S. Zick wrote on Sun, May 31, 2009 at 08:05 -0500:
> > A more general solution would be:
> > 
> > # Am I running as user 0 (root)?
> > uid=$(/usr/bin/id -u) 2>/dev/null
> > if [ $uid == 0 ] ; then
> 
> BTW, shouldn't it be just one "=" (to be compliant with POSIX and
> /usr/bin/test)?

Yes, and quotes are required, just in case "id -u" fails, and
the "uid" value is empty:

if [ "$uid" = 0 ]

Michael must have had [[ ]] in mind, but forgot the outer "[]".

[[ $uid == 0 ]]

note, the "==" is actually a pattern match when the second operand is
not quoted.

$ [[ foo == f* ]] && echo match || echo no match
match
$ [[ foo == "f*" ]] && echo match || echo no match
no match

For numeric equality:

[[ $uid -eq 0 ]]

but, when comparing with 0, this returns true also when $uid is not
a number.

-- 
Viktor.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Re:Re: about ec_point and ec_group

2009-06-02 Thread jazeltq





在2009-06-02,"Victor B. Wagner"  写道:
>On 2009.06.01 at 22:05:48 +0800, jazeltq wrote:
>
>>hello,
>>  where can i find the definition of ec_point_st and ec_group_st
>>what i found are:
>>typedef struct ec_point_st EC_POINT;
>>typedef struct ec_group_st
>>111 /*
>>112  EC_METHOD *meth;
>>113  -- field definition
>>114  -- curve coefficients
>>115  -- optional generator with associated information (order,
>>cofactor)
>>116  -- optional extra data (precomputed table for fast computation of
>>multiples of generator)
>>117  -- ASN1 stuff
>>118 */
>>119 EC_GROUP;
>>does anyone know ? thank  you
>
>These are hidden structures. They are defined in the internal include
why use the hidden structures? 

>file ec_lcl.h, which present in the OpenSSL sources, but not included in
which directory include file ec_lcl.h,  is it in the ec directory ?but in my 
sources i can't find it.
>the compiled distribution.
>
>Idea is that members of these structures are accessable only from within
>libcrypto library.
>
>Users or the library shouldn't look inside these structures, they only
>should operate via APIs, declared in the ec.h
>
>API could be incomplete. When dealing with other newer parts of OpenSSL
>API (especially EVP_PKEY_CTX API) I've encountered situations where
>neccessary API calls are missing. In this case best approach is to
>design new API function which provides neccessary functionality and
>sumbit a patch.
I just want to study the ecc, and want to know it deeply, 
>
>
>__
>OpenSSL Project http://www.openssl.org
>User Support Mailing Listopenssl-users@openssl.org
>Automated List Manager   majord...@openssl.org


Re: Security Vulnerability issue in openssl 9.8 version

2009-06-02 Thread Victor Duchovni
On Tue, Jun 02, 2009 at 12:33:46AM -0700, rajanchittil wrote:

> 
> Hi All,
> 
> Recently i got a security vulnerability issue alert reported in
> http://www.vupen.com/english/advisories/2009/1377. 

Are you using DTLS? If you application is not using DTLS (very few are),
you don't need to patch anything. DTLS support in OpenSSL does not
appear to be very mature at this time, and I don't expect that very
many users are impacted by this issue.

-- 
Viktor.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Re: Security Vulnerability issue in openssl 9.8 version

2009-06-02 Thread tensy joseph
I have used the following patch for this vulnerability issue

http://cvs.openssl.org/chngview?cn=18187

http://cvs.openssl.org/chngview?cn=18206

http://cvs.openssl.org/chngview?cn=18154

Is this is the correct patch which solve the vulnerability issue in openssl
0.9.8h and openssl 0.9.8k

Please help

Thanks

Rajan





On Tue, Jun 2, 2009 at 1:03 PM, rajanchittil  wrote:

>
> Hi All,
>
> Recently i got a security vulnerability issue alert reported in
> http://www.vupen.com/english/advisories/2009/1377.
>
> Is this vulnerability issue affects openssl 9.8h and openssl 9.8k . And i
> have also noticed that the patches
> provided http://cvs.openssl.org/chngview?cn=18188, make a build break in
> openssl 9.8h .
>
>  Can you please specify whether this vulnerability affects openssl 9.8h and
> openssl9.8k and the security patches to fix this three vulnerability issue
> in openssl 9.8h and openssl 9.8k.
>
> Thanks
>
> Rajan
> --
> View this message in context:
> http://www.nabble.com/Security-Vulnerability-issue-in-openssl-9.8-version-tp23827720p23827720.html
> Sent from the OpenSSL - User mailing list archive at Nabble.com.
>
> __
> OpenSSL Project http://www.openssl.org
> User Support Mailing Listopenssl-users@openssl.org
> Automated List Manager   majord...@openssl.org
>


RE: Spam on this list

2009-06-02 Thread Mark
Hi, 

> > >> I would like to request that this list become moderated 
> as it is now
> > >> inundated by spam.  I have a strict quota for email 
> lists at work (which
> > >> also
> > >> includes the spam) and after the quota is up I get no 
> more emails for
> > >> the rest of the month.  Last month it stopped on the 20th.
> 
> as you have a local policy issue I guess its better adjusted 
> locally - I'd
> advise that you change your subscription to a daily digest. 
> then you get
> just 1 email per day.

I don't see any option to get a daily digest.


__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Re: TLS w/LDAP - SOLVED

2009-06-02 Thread Steffen DETTMER
(OT)

* Michael S. Zick wrote on Sun, May 31, 2009 at 08:05 -0500:
> A more general solution would be:
> 
> # Am I running as user 0 (root)?
> uid=$(/usr/bin/id -u) 2>/dev/null
> if [ $uid == 0 ] ; then

BTW, shouldn't it be just one "=" (to be compliant with POSIX and
/usr/bin/test)?

oki,

Steffen













--[ End of message ]--->8===



 
About Ingenico: Ingenico is the world’s leading provider of payment solutions, 
with over 15 million terminals deployed across the globe. Delivering the very 
latest secure electronic payment technologies, transaction management and the 
widest range of value added services, Ingenico is shaping the future direction 
of the payment solutions market. Leveraging on its global presence and local 
expertise, Ingenico is reinforcing its leadership by taking banks and 
businesses beyond payment through offering comprehensive solutions, a true 
source of differentiation and new revenues streams.
 This message may contain confidential and/or privileged information. If you 
are not the addressee or authorized to receive this for the addressee, you must 
not use, copy, disclose or take any action based on this message or any 
information herein. If you have received this message in error, please advise 
the sender immediately by reply e-mail and delete this message. Thank you for 
your cooperation.
 P Please consider the environment before printing this e-mail
 
 
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


[RANT] Loading a client certificate makes my head hurt.

2009-06-02 Thread David Woodhouse
Q: My application takes a filename for a client certificate on the
   command line. What is the OpenSSL function to load and use it?

A: Well, we make this lots of fun for you -- it would be boring if there
   was just one function which you could pass the filename to. You have
   to write 230 lines of code instead First you have to check for
   yourself what type of file it is -- is it a PKCS#12 file, is it a PEM
   file with a key in it, or is it a TPM key 'blob'?

   No, there's no function which determines that for you -- you have to 
   do it yourself. And depending on the answer, you have to do three
   entirely different things to load the key.

   To make things even more fun, those three file types have _wildly_
   different ways to handle their passphrase/PIN:

   For a PEM file, you can't tell OpenSSL the passphrase in advance --
   if the user gave it on the command line, you have to manually
   override the user interface function that OpenSSL will call, and make
   your replacement function return the pre-set passphrase. Or if you
   _do_ ask the user, you've got no way to easily tell whether the user
   got the passphrase wrong; if they get it wrong (and type 4 or more
   characters) then the 'load key' function will fail and you have to
   compare against a special error code, which may differ from version
   to version of OpenSSL because it has internal function names. Just
   for variety, if the user enters a wrong passphrase with _fewer_ than
   4 characters, they'll get _no_ feedback and will just be asked again.

   For a PKCS#12 file, it's the other way round -- you _have_ to give
   the passphrase in advance, so you have to ask the user for it
   yourself. Even if the file isn't actually encrypted -- because you
   don't know that yet.

   For a TPM file it's saner -- you can _either_ set the PIN in advance
   or otherwise OpenSSL will ask the user for it _if_ necessary. But
   you do have to jump through various other hoops to use the TPM
   'engine', instead of just pointing OpenSSL at the file and having
   everything handled for you.


Have I got any parts of the above answer wrong? Is there anyone out
there who thinks that this is a _sensible_ state of affairs?

This is my load_certificate() function -- could it be simpler? Surely
OpenSSL ought to provide a function with basically equivalent
functionality, rather than leaving it to the client application?

Am I missing something?

(Unless specified on the command line, vpninfo->cert_type will be
CERT_TYPE_UNKNOWN. When the autodetection is _working_ there's no real
need to specify it on the command line, of course.)

static int pem_pw_cb(char *buf, int len, int w, void *v);
static int load_pkcs12_certificate(struct openconnect_info *vpninfo, PKCS12 
*p12);
static int load_tpm_certificate(struct openconnect_info *vpninfo);

static int load_certificate(struct openconnect_info *vpninfo)
{
vpninfo->progress(vpninfo, PRG_TRACE,
  "Using certificate file %s\n", vpninfo->cert);

if (vpninfo->cert_type == CERT_TYPE_PKCS12 ||
vpninfo->cert_type == CERT_TYPE_UNKNOWN) {
FILE *f;
PKCS12 *p12;

f = fopen(vpninfo->cert, "r");
if (!f) {
vpninfo->progress(vpninfo, PRG_ERR,
  "Failed to open certificate file 
%s\n",
  vpninfo->cert);
return -ENOENT;
}
p12 = d2i_PKCS12_fp(f, NULL);
fclose(f);
if (p12)
return load_pkcs12_certificate(vpninfo, p12);

/* Not PKCS#12 */
if (vpninfo->cert_type == CERT_TYPE_PKCS12) {
vpninfo->progress(vpninfo, PRG_ERR, "Read PKCS#12 
failed\n");
report_ssl_errors(vpninfo);
return -EINVAL;
}
/* Clear error and fall through to see if it's a PEM file... */
ERR_clear_error();
}

/* It's PEM or TPM now, and either way we need to load the plain cert: 
*/
if (!SSL_CTX_use_certificate_file(vpninfo->https_ctx, vpninfo->cert,
  SSL_FILETYPE_PEM)) {
vpninfo->progress(vpninfo, PRG_ERR,
  "Load certificate failed\n");
report_ssl_errors(vpninfo);
return -EINVAL;
}

if (vpninfo->cert_type == CERT_TYPE_UNKNOWN) {
FILE *f = fopen(vpninfo->sslkey, "r");
char buf[256];

if (!f) {
vpninfo->progress(vpninfo, PRG_ERR,
  "Failed to open certificate file 
%s\n",
  vpninfo->cert);
return -ENOENT;
}

buf[2

Re: Spam on this list

2009-06-02 Thread A . L . M . Buxey
Hi,

> >> I would like to request that this list become moderated as it is now
> >> inundated by spam.  I have a strict quota for email lists at work (which
> >> also
> >> includes the spam) and after the quota is up I get no more emails for
> >> the rest of the month.  Last month it stopped on the 20th.

as you have a local policy issue I guess its better adjusted locally - I'd
advise that you change your subscription to a daily digest. then you get
just 1 email per day.

alan
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Re: TLS compatibility problem -- can connect to server with NSS but not OpenSSL.

2009-06-02 Thread David Woodhouse
On Mon, 2009-06-01 at 17:15 -0400, Victor Duchovni wrote:
> > I found another strange behaviour that I didn't expect -- the _order_ of
> > the certificates in the cafile seems to be important.
> 
> Yes, the TLS protocol requires the trust chain to be delivered bottom-up.

That makes sense, but we're talking about the order of the certificates
in the cafile, not on the wire. OpenSSL really ought to get that right.

The problem turned out to be that OpenSSL was picking the _wrong_
certificates.

http://rt.openssl.org/Ticket/Display.html?id=1942&user=guest&pass=guest

-- 
dwmw2

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Re: Spam on this list

2009-06-02 Thread Victor B. Wagner
On 2009.06.02 at 12:15:54 +0100, Rob Stradling wrote:

>   openssl-build for reporting build errors with the OpenSSL sources.

May be I should make our autobuilder post results of automated builds
and test on 50+ platforms there?  Now I typically first investigate test
failures myself and then send request to r...@.

>   openssl-api for asking questions about how to use the OpenSSL C API.

It is better to write documentation for those parts of API which are not
documented yet. Especially such important and widely-used things as
X509_STORE.

>   openssl-cmd for asking questions about how to use the OpenSSL command-line 
> tool.

There is less reason separate list, because cmdline utility is better
documenteted than API.

>   openssl-users for anything else.

Splitting lists typically doesn't help. It helps to split moderated
web-forums where moderator is able to move message from one forum to
another, more relevant. User asking question never knows right place to
ask.


__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Re: Spam on this list

2009-06-02 Thread Lutz Jaenicke
Rob Stradling wrote:
> Is it time to divide openssl-users into several lists?
>
> Maybe something like...
>   openssl-fips for matters pertaining to OpenSSL/FIPS.
>   openssl-build for reporting build errors with the OpenSSL sources.
>   openssl-api for asking questions about how to use the OpenSSL C API.
>   openssl-cmd for asking questions about how to use the OpenSSL command-line 
> tool.
>   openssl-users for anything else.
>
> On Tuesday 02 June 2009 09:02:51 Mark wrote:
>   
>> Hi,
>>
>> I would like to request that this list become moderated as it is now
>> inundated by spam.  I have a strict quota for email lists at work (which
>> also
>> includes the spam) and after the quota is up I get no more emails for
>> the rest of the month.  Last month it stopped on the 20th.
>>
>> 

Hi,

so far we have been able to not have SPAM on the list (which is partly
moderated). This is an open list for the discussion of user problems.
Users may be more or less experienced so that not all questions may be
of interest for anyone, yet they are worth to be considered and answered.
Actually I think that the amount and the size of the mails are quite
acceptable.

WRT to splitting up this list I am afraid that we would see the same
effect as with openssl-dev; a lot of posts are just sent to both lists
as it is not always clear for everyone where some certain topics should
be discussed.

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Re: Spam on this list

2009-06-02 Thread Rob Stradling
Is it time to divide openssl-users into several lists?

Maybe something like...
  openssl-fips for matters pertaining to OpenSSL/FIPS.
  openssl-build for reporting build errors with the OpenSSL sources.
  openssl-api for asking questions about how to use the OpenSSL C API.
  openssl-cmd for asking questions about how to use the OpenSSL command-line 
tool.
  openssl-users for anything else.

On Tuesday 02 June 2009 09:02:51 Mark wrote:
> Hi,
>
> I would like to request that this list become moderated as it is now
> inundated by spam.  I have a strict quota for email lists at work (which
> also
> includes the spam) and after the quota is up I get no more emails for
> the rest of the month.  Last month it stopped on the 20th.
>
> Mark.
>
> __
> OpenSSL Project http://www.openssl.org
> User Support Mailing Listopenssl-users@openssl.org
> Automated List Manager   majord...@openssl.org

-- 
Rob Stradling
Senior Research & Development Scientist
Comodo - Creating Trust Online
Office Tel: +44.(0)1274.730505
Fax Europe: +44.(0)1274.730909
www.comodo.com

Comodo CA Limited, Registered in England No. 04058690
Registered Office:
  3rd Floor, 26 Office Village, Exchange Quay,
  Trafford Road, Salford, Manchester M5 3EQ

This e-mail and any files transmitted with it are confidential and intended
solely for the use of the individual or entity to whom they are addressed.
If you have received this email in error please notify the sender by replying
to the e-mail containing this attachment. Replies to this email may be
monitored by Comodo for operational or business reasons. Whilst every
endeavour is taken to ensure that e-mails are free from viruses, no liability
can be accepted and the recipient is requested to use their own virus checking
software.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Spam on this list

2009-06-02 Thread Mark
Hi,

I would like to request that this list become moderated as it is now
inundated by spam.  I have a strict quota for email lists at work (which
also
includes the spam) and after the quota is up I get no more emails for
the rest of the month.  Last month it stopped on the 20th.

Mark.

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Hi all

2009-06-02 Thread shekhar
I am a beginner.
I want to use TLS in my project.
Could please tell me how to  initialize openssl stack in order to use
TLS, and its apis.
Thanks in advance
 


[FWD] Openssl-0.9.8i build fails with Aix5.3 64 bit

2009-06-02 Thread Lutz Jaenicke
Forwarded to openssl-users for discussion

Best regards,
Lutz

- Forwarded message from "Jaiman, Yateendra" 
 -

Subject:  Openssl-0.9.8i build fails with Aix5.3 64 bit
Date: Mon, 1 Jun 2009 18:26:51 +0530
Thread-Topic:  Openssl-0.9.8i build fails with Aix5.3 64 bit
Thread-Index: AcnZQxWkTI+KJDUGSpakHdq0cjGSSQJdR8Ew
From: "Jaiman, Yateendra" 
To: r...@openssl.org

HI,

When I m executing this command I got this error,

 

./openssl req -engine LunaCA3 -new -nodes -key server.key -out
server.req -days 120

can't use that engine

389234:error:2606B08C:engine routines:ENGINE_finish:dsa not
implemented:e_lunaca3.c:670:DSO not set

389234:error:260B806D:engine routines:ENGINE_TABLE_REGISTER:init
failed:eng_table.c:161:

Enter pass phrase for server.key:

unable to load Private Key

389234:error:06065064:digital envelope routines:EVP_DecryptFinal_ex:bad
decrypt:evp_enc.c:466:

389234:error:0906A065:PEM routines:PEM_do_header:bad
decrypt:pem_lib.c:425:

 

Any help will be appreciated...

 

Thanks

Yateendra Jaiman

 

 

From: Jaiman, Yateendra 
Sent: Wednesday, May 20, 2009 5:34 PM
To: 'r...@openssl.org'
Subject: Openssl-0.9.8e/i build fails with Aix5.3 64 bit

 

Hi,

 

I am Building Openssl-0.9.8e/Openssl-0.9.8i On AIX 5.3 64 bit.

 

Steps that I am following are:

 

1.  ./Configure aix64-gcc -maix64 -lpthreads no-mdc2 no-rc5  no-idea
--prefix=/usr/local/ssl/ --openssldir=/usr/local/ssl/
2.  make
3.  make test
4.  make install

 

Runs fine.

 

When I am executing ./Openssl engine -t command from /usr/local/ssl/bin
directory.

 

The Out put Looks like this.

 

(dynamic) Dynamic engine loading support

 [ unavailable ]

(4758cca) IBM 4758 CCA hardware engine support

 [ unavailable ]

(aep) Aep hardware engine support

 [ unavailable ]

(atalla) Atalla hardware engine support

 [ unavailable ]

(cswift) CryptoSwift hardware engine support

 [ unavailable ]

(LunaCA3) Luna CA3 engine support

 [ unavailable ]

(chil) CHIL hardware engine support

 [ unavailable ]

(nuron) Nuron hardware engine support

 [ unavailable ]

(sureware) SureWare hardware engine support

 [ unavailable ]

(ubsec) UBSEC hardware engine support

 [ unavailable ]

 

I have checked my gcc version.

Output put of installed RPM on my system

bash-3.2# rpm -qa

cdrecord-1.9-7

mkisofs-1.13-4

conserver-8.1.7-2

info-4.6-1

gdbm-1.8.3-1

libgcc-4.0.0-1

gdbm-devel-1.8.3-1

libstdc++-devel-4.0.0-1

make-3.80-1

bash-3.2-1

expat-2.0.1-2

AIX-rpm-5.3.8.0-2

perl-IO-Multiplex-1.10-1

libxml2-2.6.17-3

osinstall-1.0-1

tk-8.5.6-1

perl-Crypt-Blowfish-2.10-1

libgcc-4.2.4-1

libstdc++-4.2.4-1

libstdc++-devel-4.2.4-1

gcc-4.2.4-1

gcc-cpp-4.2.4-1

gcc-c++-4.2.4-1

gettext-0.10.40-8

gdb-6.8-1

tcl-8.5.6-1

perl-5.8.8-1

perl-Crypt-CAST5-0.05-1

perl-Digest-CRC-0.14-1

perl-Crypt-CBC-2.29-1

egd-0.8-1

zlib-1.2.3-5

zlib-devel-1.2.3-5

dos2unix-3.1-1

prngd-0.9.29-1

zip-2.3-3

unzip-5.51-1

vim-common-6.3-1

vim-enhanced-6.3-1

 

I want to install Openssl with Apache on AIX 5.3 .So please provide me
some details regarding this matter.

 

 

Thanks&Regards,

 

Yateendra Jaiman

Software Engineer HSM-Integrations

SafeNet InfoTech Pvt Ltd.

25 Years of Information Security Leadership
 

 


The information contained in this electronic mail transmission 
may be privileged and confidential, and therefore, protected 
from disclosure. If you have received this communication in 
error, please notify us immediately by replying to this 
message and deleting it from your computer without copying 
or disclosing it.


- End forwarded message -
--
Lutz Jaenicke   jaeni...@openssl.org
OpenSSL Project http://www.openssl.org/~jaenicke/
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Re: sslv3 alert certificate unknown

2009-06-02 Thread Frank Vyncke
Dave,

This explains the problems I have.

Indeed, it appears I need to install my home generated certificate in a
TrustManager.
I indeed get the SSL exception on the java side.

Thanks for the pointer

Frank

On 02/06/2009 03:07, "Dave Thompson" 
wrote:

>> From: owner-openssl-us...@openssl.org On Behalf Of Kyle Hamilton
>> Sent: Friday, 29 May, 2009 20:29
> 
>> "certificate unknown" means that the Java side sent an alert
>> to state that there's a problem with the certificate, but
>> it's not going to tell you what it is.  It probably it
>> relates to the fact that the CA that you're using on your
>> openssl server isn't in the Java trust store.
>> 
> More precisely, in the Java trust store _being used_.
> Java can support multiple trust (or key) stores if you want.
> 
>> (The most correct and appropriate alert in this case would be
>> "unknown CA", but many implementations won't send the correct
>> code due to security policies that the developers make on
>> behalf of their API
>> clients.)
>> 
>> -Kyle H
>> 
>> On Fri, May 29, 2009 at 7:12 AM, Vyncke, Frank
>>  wrote:
> 
>>> I don't know exactly what this error means, so it hard to
>> check what I 
>>> am doing wrong. I presume I will have to setup some
>> parameters on the
>>> JAVA side (the only thing I do different now versus the plain http
>>> setup is to change the URL to https).
>>> 
> Meaning you use URL("https",...).openConnection -> HttpsURLConnection ?
> (And don't set[Default]SSLSocketFactory?) That should use the (system)
> default SSLSocketFactory, which under the standard configuration uses
> a SSLContext which has a default (X.509/PKIX) TrustManager which uses
> the store in /lib/security/jssecacerts if present else cacerts
> (and a null X.509 KeyManager, which is usually okay for web clients).
> 
> Your client should have gotten javax.net.ssl.SSLHandshakeException
> referencing/caused by sun.security.validator.ValidatorException
> and sun.security.provider.certpath.SunCertPathBuilderException .
> You might check to see if this was reported, or why not.
> 
>>> Any body an idea, and/or info on the things I need to setup on the
>>> JAVA side ? I am using JAVA JRE 1.6
>>> 
> See JSSERefGuide in the docs package under 'security' for (very!)
> full details. In brief, there are number of possibilities:
> 
> - add the CAcert(s) you want to use to the default truststore(s)
> -- assuming you have access on the client machine(s) and this
> doesn't interfere with (endanger?) any other Java app(s) there
> 
> - put the CAcert(s) you want to use in your own truststore
> (per-app or per-user or whatever) and configure to use that
> 
> - get for your server and use a cert under a 'wellknown' CA
> that is already in the distributed cacerts -- may cost money
> 
> - have your client(s) request/allow anonymous ciphersuite(s)
> and your server use no certificate at all -- loses the benefit
> of server authentication
> 
> - write your own TrustManager and/or CertPathValidator to do
> whatever you want (get certs or other auth data from other
> sources like LDAP or DNS or whatever, and accept or reject
> the server based on other information than the certs or
> fetched data such as hardcoding, manual choice, ...)
> -- quite a bit more complicated
> 
> Note that HttpsURLConnection also verifies that the server
> cert's name matches the desired (requested) URL.host.
> I'm not sure of the exact (default) rules since I use the
> lower-level SSL[Server]Socket which leaves this check to me.
> According to the docs this can be overridden by writing
> and setting your own HostnameVerifier .
> 
> 
> 
> __
> OpenSSL Project http://www.openssl.org
> User Support Mailing Listopenssl-users@openssl.org
> Automated List Manager   majord...@openssl.org

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Security Vulnerability issue in openssl 9.8 version

2009-06-02 Thread rajanchittil

Hi All,

Recently i got a security vulnerability issue alert reported in
http://www.vupen.com/english/advisories/2009/1377. 

Is this vulnerability issue affects openssl 9.8h and openssl 9.8k . And i
have also noticed that the patches 
provided http://cvs.openssl.org/chngview?cn=18188, make a build break in
openssl 9.8h .

 Can you please specify whether this vulnerability affects openssl 9.8h and
openssl9.8k and the security patches to fix this three vulnerability issue
in openssl 9.8h and openssl 9.8k.

Thanks

Rajan
-- 
View this message in context: 
http://www.nabble.com/Security-Vulnerability-issue-in-openssl-9.8-version-tp23827720p23827720.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


SSL Handshake question

2009-06-02 Thread Steve Gallivan
Hello,

I apologize if this is an obvious NOOB question - my Google-Fu is not up to 
snuff on this one:

We're running  OpenSSL 0.9.8j 07 Jan 2009 and Server version: Apache/2.0.63 on 
a  Sunfire 280R running Solaris 9.

Clients are having intermittent problems successfully completing the SSL 
Handshake.

Running a trace on the wire revealed that the successful handshakes looked like 
this:
Client -> Server: Client Hello
Server -> Client: Server Hello
Server -> Client: Certificate
Client -> Server: Client Key Exchange
And so on, all good.

On the failures the exchange looks like this:
Client -> Server:  Client Hello
Server -> Client: Server Hello, Certificate, Server Hello Done
Client -> Server: Fatal, Description: Certificate Unknown

In running repeated tests using a java test client, we have many successful 
handshakes ( we close the socket after each one ) and then we'll hit a series 
of several failed ones, say 4-10 in a row, then it's all good again.
I'm trying to understand why the server would answer some requests with a 
"Server Hello, Certificate, Server Hello Done" all wrapped up in one packet ( 
the ones that are failing ), where most of the time it splits that out over 
several packets. The test "Client Hello" requests seem identical.

Any insights would be much appreciated.

Thanks,
Steve


OpenSSL FIPS Mode problem

2009-06-02 Thread Lior Aharoni
Hi All,

When loading OpenSSL FIPS DLLs, and using FIPS_mode_set function, the
following error is being returned:

9220:error:2D06906F:FIPS routines:FIPS_CHECK_INCORE_FINGERPRINT:fingerprint
does not match nonpic relocated:.\fips\fips.c:236:

As i understand it, the DLL could not be loaded to the appropriate address
in memory, therefore, the validation process could not be completed.

I tried to use different base-address for the DLL (as described in the user
guide) which solved the problem for now, but because my application can load
other DLLs dynamically I cannot guarantee that the new base address will
always be free for the FIPS DLL usage.

Does OpenSSL FIPS version has other ways for solving the above error?

Thanks,

-- 
Lior Aharoni