Re: How to sign new certificates

2010-10-11 Thread Mounir IDRASSI

 Hi Ariel,

You can't achieve what you want because the certificate you bought is 
not a CA one : if you look at its extensions, you will find that the 
value of the Certificate Basic Constraints extension is End Entity and 
that it is set as Critical.
if the contrary was possible, then it would have been a big security 
hole : you could issue valid certificates for domains without 
authorization (like paypal.com) and it will enable you to mount 
sophisticated man-in-the-middle attacks.


To authenticate users in your website, create you own CA, issue 
certificates for them and then configure your webserver to accept only 
client certificates issued by your CA.


Cheers,
--
Mounir IDRASSI
IDRIX
http://www.idrix.fr

On 10/12/2010 5:41 AM, Ariel wrote:

Hi again,

I could enable my site to use SSL with a wildcard certificate bought to
GoDaddy by concatening the "mysite.com.crt" and the "gd_bundle.crt" into a
combined one "mysite.com.combined.crt" (explained in a previous email).
Now I want to enable SSL Client certificate, creating new keypair files, new
certificate signed requests (csr) and signing them using my combined cert
file as the CA.
Is that possible? How can achieve this goal using the command line tool?

Thanks,



__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


How to sign new certificates

2010-10-11 Thread Ariel
Hi again,

I could enable my site to use SSL with a wildcard certificate bought to
GoDaddy by concatening the "mysite.com.crt" and the "gd_bundle.crt" into a
combined one "mysite.com.combined.crt" (explained in a previous email).
Now I want to enable SSL Client certificate, creating new keypair files, new
certificate signed requests (csr) and signing them using my combined cert
file as the CA.
Is that possible? How can achieve this goal using the command line tool?

Thanks,

-- 
Ariel Diaz Bermejo
http://www.linkedin.com/in/adiazbermejo


Re: Issue with SSL certificate chain

2010-10-11 Thread Ariel
On Mon, Oct 11, 2010 at 11:41 PM, Dave Thompson wrote:

> >   From: owner-openssl-us...@openssl.org On Behalf Of Ariel
> >   Sent: Monday, 11 October, 2010 20:05
>
> >   I have a site (Rails app) that I'm trying to setup with SSL
> > and SSL Client Certificate (using nginx).
> >   I bought a wildcard one-domain certificate at GoDaddy in order
> > to support multiple subdomains to my site: *.mysite.com
>
> >   I downloaded the cert file and the bundle file; combined them into
> > one single cert and setup my nginx SSL directives to use it as suggested
> here [1].
>
> >   Then I try to verify my setup using the openssl command line tool
> and I got this:
>
> >   $ openssl s_client -connect mysite.com:443 -showcerts
> >CONNECTED(0003)
> >depth=3 /L=ValiCert Validation Network/O=ValiCert,
> Inc./OU=ValiCert
> Class 2 Policy Validation
> Authority/CN=http://www.valicert.com//emailaddress=i...@valicert.com
> >verify error:num=19:self signed certificate in certificate chain
> >verify return:0
> >---
> >Certificate chain
> 
>
> Looks right, but you have to give s_client the root(s) to verify against.
> It does NOT automatically default, at least not in the standard distro.
>
> Get your desired root cert -- ValiCert Class 2 Policy Validation Authority
> --
> in a file in PEM format and give s_client -CAfile filename .
> (There are other ways to do this, but that's simplest.)
>
> Or test from a browser that comes with 'mainstream' CAs builtin.
> Even if your app doesn't talk HTTP, the browser should complete
> the SSL connection successfully before it gets an HTTP error.
> The two I have to hand, IE7 and FF3.6, do appear to include this CA.
> That is a good place to get the file you use for s_client above.
>
> Thanks, it worked. Tested using the command line tool with the "-CAfile"
option and also with a browser.


-- 
Ariel Diaz Bermejo
http://www.linkedin.com/in/adiazbermejo


RE: Issue with SSL certificate chain

2010-10-11 Thread Dave Thompson
>   From: owner-openssl-us...@openssl.org On Behalf Of Ariel
>   Sent: Monday, 11 October, 2010 20:05

>   I have a site (Rails app) that I'm trying to setup with SSL 
> and SSL Client Certificate (using nginx). 
>   I bought a wildcard one-domain certificate at GoDaddy in order 
> to support multiple subdomains to my site: *.mysite.com

>   I downloaded the cert file and the bundle file; combined them into 
> one single cert and setup my nginx SSL directives to use it as suggested
here [1].

>   Then I try to verify my setup using the openssl command line tool
and I got this:

>   $ openssl s_client -connect mysite.com:443 -showcerts
>CONNECTED(0003)
>depth=3 /L=ValiCert Validation Network/O=ValiCert, Inc./OU=ValiCert
Class 2 Policy Validation
Authority/CN=http://www.valicert.com//emailaddress=i...@valicert.com
>verify error:num=19:self signed certificate in certificate chain
>verify return:0
>---
>Certificate chain


Looks right, but you have to give s_client the root(s) to verify against.
It does NOT automatically default, at least not in the standard distro.

Get your desired root cert -- ValiCert Class 2 Policy Validation Authority
-- 
in a file in PEM format and give s_client -CAfile filename .
(There are other ways to do this, but that's simplest.)

Or test from a browser that comes with 'mainstream' CAs builtin.
Even if your app doesn't talk HTTP, the browser should complete 
the SSL connection successfully before it gets an HTTP error.
The two I have to hand, IE7 and FF3.6, do appear to include this CA.
That is a good place to get the file you use for s_client above.



__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Issue with SSL certificate chain

2010-10-11 Thread Ariel
Hi, I'm new to the list and I hope you can give some light into the
following:

I have a site (Rails app) that I'm trying to setup with SSL and SSL Client
Certificate (using nginx).
I bought a wildcard one-domain certificate at GoDaddy in order to support
multiple subdomains to my site: **.mysite.com*
I downloaded the cert file and the bundle file; combined them into one
single cert and setup my nginx SSL directives to use it as suggested here
[1].
So now I have something like this:

  ...
 ssl_certificate  /var/www/rails/mysite/ssl/mysite.com.combined.crt;
 ssl_certificate_key  /var/www/rails/mysite/ssl/mysite.com.key;
 ...


Then I try to verify my setup using the openssl command line tool and I got
this:

$ openssl s_client -connect mysite.com:443 -showcerts

 CONNECTED(0003)
 depth=3 /L=ValiCert Validation Network/O=ValiCert, Inc./OU=ValiCert Class 2
Policy Validation Authority/CN=
http://www.valicert.com//emailaddress=i...@valicert.com
 verify error:num=19:self signed certificate in certificate chain
 verify return:0
 ---
 Certificate chain
  0 s:/O=*.mysite.com/OU=Domain Control Validated/CN=*.mysite.com
i:/C=US/ST=Arizona/L=Scottsdale/O=GoDaddy.com, Inc./OU=
http://certificates.godaddy.com/repository/CN=Go Daddy Secure Certification
Authority/serialNumber=07969287
 -BEGIN CERTIFICATE-
 MIIFVzCCBD+gAwIBAgIHTyWPQS3tOjANBgkqhkiG9w0BAQUFADCByjELMAkGA1UE
 .more...
 mz61HEG2Bn/pe4dsaHFPgY3KjlDe+KaH/HuD
 -END CERTIFICATE-
  1 s:/C=US/ST=Arizona/L=Scottsdale/O=GoDaddy.com, Inc./OU=
http://certificates.godaddy.com/repository/CN=Go Daddy Secure Certification
Authority/serialNumber=07969287
i:/C=US/O=The Go Daddy Group, Inc./OU=Go Daddy Class 2 Certification
Authority
 -BEGIN CERTIFICATE-
 MIIE3jCCA8agAwIBAgICAwEwDQYJKoZIhvcNAQEFBQAwYzELMAkGA1UEBhMCVVMx
 .more...
 qDTMBqLdElrRhjZkAzVvb3du6/KFUJheqwNTrZEjYx8WnM25sgVjOuH0aBsXBTWV
 U+4=
 -END CERTIFICATE-
  2 s:/C=US/O=The Go Daddy Group, Inc./OU=Go Daddy Class 2 Certification
Authority
i:/L=ValiCert Validation Network/O=ValiCert, Inc./OU=ValiCert Class 2
Policy Validation Authority/CN=
http://www.valicert.com//emailaddress=i...@valicert.com
 -BEGIN CERTIFICATE-
 MIIE+zCCBGSgAwIBAgICAQ0wDQYJKoZIhvcNAQEFBQAwgbsxJDAiBgNVBAcTG1Zh
 .more...
 SxOaFIqII6hR8INMqzW/Rn453HWkrugp++85j09VZw==
 -END CERTIFICATE-
  3 s:/L=ValiCert Validation Network/O=ValiCert, Inc./OU=ValiCert Class 2
Policy Validation Authority/CN=
http://www.valicert.com//emailaddress=i...@valicert.com
i:/L=ValiCert Validation Network/O=ValiCert, Inc./OU=ValiCert Class 2
Policy Validation Authority/CN=
http://www.valicert.com//emailaddress=i...@valicert.com
 -BEGIN CERTIFICATE-
 MIIC5zCCAlACAQEwDQYJKoZIhvcNAQEFBQAwgbsxJDAiBgNVBAcTG1ZhbGlDZXJ0
 .more...
 W/POuZ6lcg5Ktz885hZo+L7tdEy8W9ViH0Pd
 -END CERTIFICATE-
 ---
 Server certificate
 subject=/O=*.mysite.com/OU=Domain Control Validated/CN=*.mysite.com
 issuer=/C=US/ST=Arizona/L=Scottsdale/O=GoDaddy.com, Inc./OU=
http://certificates.godaddy.com/repository/CN=Go Daddy Secure Certification
Authority/serialNumber=07969287
 ---
 No client certificate CA names sent
 ---
 SSL handshake has read 5355 bytes and written 319 bytes
 ---
 New, TLSv1/SSLv3, Cipher is DHE-RSA-AES256-SHA
 Server public key is 2048 bit
 Secure Renegotiation IS supported
 Compression: NONE
 Expansion: NONE
 SSL-Session:
 Protocol  : TLSv1
 Cipher: DHE-RSA-AES256-SHA
 Session-ID:
BBC2FD59A062A4FC48C1384842895C3BCA559F37E23F4890AD518D2EA32FB54F
 Session-ID-ctx:
 Master-Key:
9B51A344FB76A9606E69179849A40B0E23CD897094D5A4BFD8C31752E64181F481930348B785754234BB93C6822293F7
 Key-Arg   : None
 Start Time: 1286841464
 Timeout   : 300 (sec)
 Verify return code: 19 (self signed certificate in certificate chain)
 ---


How can I solve this issue?? Any hints?

Thanks,

[1]
http://nginx.groups.wuyasea.com/articles/how-to-setup-godaddy-ssl-certificate-on-nginx/2


-- 
Ariel Diaz Bermejo
http://www.linkedin.com/in/adiazbermejo


probleme traffic secure with lib perl MIME::Lite

2010-10-11 Thread fakessh
hello guys and hello girls

and professor

hello my friends. I work on the lib perl MIME:: Lite and am having
problems related to traffic secure. I do not know how to discuss the
subject except by proposing a pastebin


http://pastebin.com/hsr2ctMU

I do not understand why it does not my code from MIME:: Lite is good



-- 
http://pgp.mit.edu:11371/pks/lookup?op=get&search=0x092164A7


gpg --keyserver pgp.mit.edu --recv-key 092164A7


signature.asc
Description: Ceci est une partie de message	numériquement signée


Re: Crosscompiling openssl-fips-1.2 for arm-linux - still FIPS compliant?

2010-10-11 Thread Dr. Stephen Henson
On Mon, Oct 11, 2010, Ronald Wahl wrote:

> Hi,
>
> I'm currently trying to cross compile openssl-fips-1.2 for arm-linux on a 
> x86 host. This does abort at a certain point. The problem has been already 
> reported and solutions are provided. See here:
>
> http://www.mail-archive.com/openssl-users@openssl.org/msg59904.html
>
> I have not tried the solutions yet but my question is: If I do so - is the 
> resulting module still FIPS compliant? The according SecurityPolicy 
> document contains the statement:
>
>   "Note that failure to use one of the specified commands sets exactly
>as shown will result in a module that cannot be considered compliant
>with FIPS 140-2."
>
> So my current assumption is that we probably could build the module but you 
> can't actually call it FIPS compliant anymore which makes it rather 
> useless. Is this correct?
>

The result *is* FIPS compliant: a change leter specifically supports cross
compilation as long as you use the specified commands. You should be able to
use them unmodified (using incore or a copying script) though you many need to
change the environment variables to match the target system.

Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Crosscompiling openssl-fips-1.2 for arm-linux - still FIPS compliant?

2010-10-11 Thread Ronald Wahl

Hi,

I'm currently trying to cross compile openssl-fips-1.2 for arm-linux on 
a x86 host. This does abort at a certain point. The problem has been 
already reported and solutions are provided. See here:


http://www.mail-archive.com/openssl-users@openssl.org/msg59904.html

I have not tried the solutions yet but my question is: If I do so - is 
the resulting module still FIPS compliant? The according SecurityPolicy 
document contains the statement:


  "Note that failure to use one of the specified commands sets exactly
   as shown will result in a module that cannot be considered compliant
   with FIPS 140-2."

So my current assumption is that we probably could build the module but 
you can't actually call it FIPS compliant anymore which makes it rather 
useless. Is this correct?


greets,
ron

--
Ronald Wahl - ronald.w...@raritan.com - Phone +49 375271349-0 Fax -99
Raritan Deutschland GmbH, Kornmarkt 7, 08056 Zwickau, Germany
WEEE-Reg-Nr. DE28850302, USt-IdNr. DE813094160, Steuer-Nr. 226/117/02950
Amtsgericht Chemnitz HRB 23605
Geschäftsführung: Gerard W. J. Heuvel, Burkhard Wessler
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


RE: Getting detailed ssl-handshake debug output

2010-10-11 Thread Jeff Saremi
 I received the answer in a direct email and just wanted to share it
here too:

- command line:

openssl s_client -state -debug -connect host:port

- programmatic:

One can look in the callback mechanism used in the above, specifically in 
apps/s_cb.c
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org