Re: [openssl-users] OpenSSL FIPS test failure starting from version 1.0.2g

2016-03-29 Thread Aaron
Thank you very much, Viktor. It works.

Regards,
Aaron



--
View this message in context: 
http://openssl.6102.n7.nabble.com/OpenSSL-FIPS-test-failure-starting-from-version-1-0-2g-tp65320p65325.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


[openssl-users] OpenSSL FIPS test failure starting from version 1.0.2g

2016-03-28 Thread Aaron
Greetings. 

I am using OpenSSl 1.0.2f on various platforms including Solaris, Linux,
RS6000, ibmplinux, HPIA and Windows. Now I am going to upgrade to OpenSSL
1.0.2g. However I hit a test failure when building and tesing 1.0.2g. The
issue occurs on all my platforms except Windows which I haven't tested, so
it is likely a generic problem. The issue didn't occur when I built and
tested 1.0.2f, so it may be a regression in 1.0.2g.

It is very stratforward to repro the issue. Take platform linux_x86-64 as an
example, the repro steps are as follows. 

cd openssl-1.0.2g 
make clean 
./Configure no-idea no-mdc2 no-rc5 no-ec2m fips -m64 no-asm linux-x86_64 
make depend 
make 
make test<--- Hit the issue here. 

Error message: 
test SSL protocol 
test ssl3 is forbidden in FIPS mode 
*** IN FIPS MODE *** 
Available compression methods: 
  NONE 
46912496310224:error:140A9129:SSL routines:SSL_CTX_new:only tls allowed in
fips mode:ssl_lib.c:1877: 
46912496310224:error:140A9129:SSL routines:SSL_CTX_new:only tls allowed in
fips mode:ssl_lib.c:1877: 
test ssl2 is forbidden in FIPS mode 
Testing was requested for a disabled protocol. Skipping tests. 
make[1]: *** [test_ssl] Error 1 
make[1]: Leaving directory
`/tzedek_ocsdev/qun/crs/797167/openssl_diff/openssl-1.0.2g.test/test' 
make: *** [tests] Error 2 

Anyone knows how to fix the issue please? 

Thanks in advance, 
Aaron 




--
View this message in context: 
http://openssl.6102.n7.nabble.com/OpenSSL-FIPS-test-failure-starting-from-version-1-0-2g-tp65320.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] How to fix OpenSSL 1.0.1q Windows x86_64 build failure?

2016-01-16 Thread Aaron
Thank you very much, jjf.

Regards,
Aaron



--
View this message in context: 
http://openssl.6102.n7.nabble.com/How-to-fix-OpenSSL-1-0-1q-Windows-x86-64-build-failure-tp62289p62402.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] How to fix OpenSSL 1.0.1q Windows x86_64 build failure?

2016-01-16 Thread Aaron
Hello,

Anyone knows how to check what is updated in commit
9501418ea2287658d1a11ce888ff97fa49e9164d ? 

Any help is appreciated.

Aaron






--
View this message in context: 
http://openssl.6102.n7.nabble.com/How-to-fix-OpenSSL-1-0-1q-Windows-x86-64-build-failure-tp62289p62344.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] How to fix OpenSSL 1.0.1q Windows x86_64 build failure?

2016-01-16 Thread Aaron
Hello Viktor,

Thank you very much for your response. I believe you are right.

As I am new to OpenSSL, I don't know how to check what is updated in commit
9501418ea2287658d1a11ce888ff97fa49e9164d. 

I could not even find the commit in the list:
http://git.openssl.org/?p=openssl.git;a=shortlog

I wonder if you could show me what is updated in the commit or let me know
how to check it? Your help is appreciated.

Thanks again,
Aaron





--
View this message in context: 
http://openssl.6102.n7.nabble.com/How-to-fix-OpenSSL-1-0-1q-Windows-x86-64-build-failure-tp62289p62336.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] How to fix OpenSSL 1.0.1q Windows x86_64 build failure?

2016-01-15 Thread Aaron
Hi Jeff,

Thank you for your response.

I got the commit number from here:
http://openssl.6102.n7.nabble.com/Windows-x86-64-build-broken-RE-openssl-users-OpenSSL-version-1-0-1q-released-corrected-download-td61450.html

The commit number was provided by Steve (Dr Stephen N. Henson. OpenSSL
project core developer).

Aaron




--
View this message in context: 
http://openssl.6102.n7.nabble.com/How-to-fix-OpenSSL-1-0-1q-Windows-x86-64-build-failure-tp62289p62326.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] How to fix OpenSSL 1.0.1q Windows x86_64 build failure?

2016-01-15 Thread Aaron
Hi,

Anyone knows how to check what is updated in commit 544058202be49a6 ?

Thanks,
Aaron



--
View this message in context: 
http://openssl.6102.n7.nabble.com/How-to-fix-OpenSSL-1-0-1q-Windows-x86-64-build-failure-tp62289p62291.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


[openssl-users] How to fix OpenSSL 1.0.1q Windows x86_64 build failure?

2016-01-14 Thread Aaron
Hi Steve,

I encountered a Windows OpenSSL build issue when upgrading the OpenSSL used
in our product to version 1.0.1q. The error message is as follows.
NMAKE : fatal error U1073: don't know how to make 'tmp32\applink.obj' 

I searched related articles in this forum and found the following post.
http://openssl.6102.n7.nabble.com/Windows-x86-64-build-broken-RE-openssl-users-OpenSSL-version-1-0-1q-released-corrected-download-td61450.html
However I was not allowed to ask my question there, so I post my question
here. Hopefully you could see my question here. 

While I have already upgrraded OpenSSL on all our support platforms, this
issue blocks me from upgrading on Windows. Under this circumstance, I could
not wait for next OpenSSL release in which you have fixed the issue. I would
need to put your fix into OpenEEL 1.0.1q to complete my upgrading. Would you
please let me know how to fix the issue? 

Thanks a lot in advance, 
Aaron 



--
View this message in context: 
http://openssl.6102.n7.nabble.com/How-to-fix-OpenSSL-1-0-1q-Windows-x86-64-build-failure-tp62289.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] OpenSSL 1.0.1q build fails on RS6000, SunSparc and HPIA

2016-01-04 Thread Aaron
Thank you very much, Michael. It works.

Aaron



--
View this message in context: 
http://openssl.6102.n7.nabble.com/OpenSSL-1-0-1q-build-fails-on-RS6000-SunSparc-and-HPIA-tp62001p62018.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


[openssl-users] OpenSSL 1.0.1q build fails on RS6000, SunSparc and HPIA

2016-01-04 Thread Aaron
Hi,

I need to build OpenSSL 1.0.1q on various platforms. At first I could only
build 1.0.1q on windows. After reading the following post, I could build it
on various Linux platforms.
http://openssl.6102.n7.nabble.com/OpenSSL-version-1-0-1q-released-corrected-download-td61415.html

However building 1.0.1q on RS6000, SunSparc and HPIA still fails becasue
'make depend' doesn't work on these platforms at all.

Take RS6000 as an example, the following is the output of 'make depend'. 
$ pwd 
/rahav_ocsdev/qun/OpenSSL/openssl-1.0.1q 
$ make depend 
making depend in crypto... 
make[1]: Entering directory
`/rahav_ocsdev/qun/OpenSSL/openssl-1.0.1q/crypto' 
../util/domd[30]: makedepend:  not found 
mv: cannot rename Makefile.new to Makefile: 
No such file or directory 
make[1]: *** [local_depend] Error 127 
make[1]: Leaving directory `/rahav_ocsdev/qun/OpenSSL/openssl-1.0.1q/crypto' 
make: *** [depend] Error 1 

Anyone knows how to solve this issue? Any suggestion is appreciated. 

Thanks, 
Aaron 




--
View this message in context: 
http://openssl.6102.n7.nabble.com/OpenSSL-1-0-1q-build-fails-on-RS6000-SunSparc-and-HPIA-tp62001.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] Can OpenSSL applications/utilities use SunSPARC crypto accelerators?

2015-07-23 Thread Aaron
Hello Andy and David,

As the feature owners, would you please give me some tips for how to use the
functionality of the feature?

Thanks,
Aaron



The Changes between 1.0.1l and 1.0.2 [22 Jan 2015] 
... 
  *) Support for SPARC Architecture 2011 crypto extensions, first 
 implemented in SPARC T4. This covers AES, DES, Camellia, SHA1, 
 SHA256/512, MD5, GHASH and modular exponentiation. 
 [Andy Polyakov, David Miller] 
... 




--
View this message in context: 
http://openssl.6102.n7.nabble.com/Can-OpenSSL-applications-utilities-use-SunSPARC-crypto-accelerators-tp59163p59351.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] Can OpenSSL applications/utilities use SunSPARC crypto accelerators?

2015-07-21 Thread Aaron
I read the following description from Oracle Solaris website
(https://blogs.oracle.com/DanX/entry/how_to_tell_if_sparc) 

OpenSSL T4 engine Availability 
The OpenSSL t4 engine is available with Solaris 11 and 11.1. For Solaris 10
08/11 (U10), you need to use the OpenSSL pkcs11 engine. The OpenSSL t4
engine is distributed only with the version of OpenSSL distributed with
Solaris (and not third-party or self-compiled versions of OpenSSL). 
  
The following announcement is from OpenSSL. 
Changes between 1.0.1l and 1.0.2 [22 Jan 2015] 
... 
  *) Support for SPARC Architecture 2011 crypto extensions, first 
 implemented in SPARC T4. This covers AES, DES, Camellia, SHA1, 
 SHA256/512, MD5, GHASH and modular exponentiation. 
 [Andy Polyakov, David Miller] 
... 

I am confused. I don't know which one is right. 

I thought the announcement from OpenSSL was right and the description in
Oracle website was obsolete. But my test results could not verify my idea.   

Thanks, 
Aaron 



--
View this message in context: 
http://openssl.6102.n7.nabble.com/Can-OpenSSL-applications-utilities-use-SunSPARC-crypto-accelerators-tp59163p59218.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] Can OpenSSL applications/utilities use SunSPARC crypto accelerators?

2015-07-19 Thread Aaron
Hello Misaki, 

Thanks for your response. What you pointed out is exactly what I thought
previously. 

However my test showed that OpenSSL command utility 'openssl' built by my
from OpenSSL 1.0.2d source code does NOT utilize the crypto accelerator
provided in Sun SPARC Solaris 11.1. I tested the default 'openssl' installed
in Solaris 11.1 to verify that the machine on which I run my 'openssl' does
have the accelerator. I listed my test results in my previous messages.

Now my question is if I need build utility 'openssl' with some special
option to utilize the crypto accelerator?

Thanks again,
Aaron  



--
View this message in context: 
http://openssl.6102.n7.nabble.com/Can-OpenSSL-applications-utilities-use-SunSPARC-crypto-accelerators-tp59163p59198.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] Can OpenSSL applications/utilities use SunSPARC crypto accelerators?

2015-07-15 Thread Aaron
I checked utility 'openssl' built by my in solaris 11.1 and the default
'openssl' installed in Solaris 11.1. I noticed that my 'openssl' does NOT
have SPARC T4 engine support. This may be the reason why my 'openssl' is
much slower. Now the question is how to build 'openssl' to let it to have 
SPARC T4 engine support. I checked the OpenSSL documents, but seems there
are no descriptions regarding to this topic. 

1) This is the 'openssl' built by me on Solaris 11.1
ksol1% ./1.0.2d/normal/openssl/bin/openssl engine
(dynamic) Dynamic engine loading support
(4758cca) IBM 4758 CCA hardware engine support
(aep) Aep hardware engine support
(atalla) Atalla hardware engine support
(cswift) CryptoSwift hardware engine support
(chil) CHIL hardware engine support
(nuron) Nuron hardware engine support
(sureware) SureWare hardware engine support
(ubsec) UBSEC hardware engine support
(gost) Reference implementation of GOST engine

2) This is the default 'openssl' installed in Solaris 11.1
ksol1% /usr/bin/openssl engine
(t4) SPARC T4 engine support
(dynamic) Dynamic engine loading support
(pkcs11) PKCS #11 engine support

Anybody knows the answer please?

Thanks,
Aaron




--
View this message in context: 
http://openssl.6102.n7.nabble.com/Can-OpenSSL-applications-utilities-use-SunSPARC-crypto-accelerators-tp59163p59179.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


[openssl-users] How to let OpenSSL applications/utilities use SunSPARC crypto accelerators?

2015-07-14 Thread Aaron
Hello OpenSSL folks,

I noticed that the OpenSSL command line utility 'openssl' built in Solaris
11.1 does not use SunSPARC crypto accelerators. 

>From the change log of OpenSSL 1.0.2, I saw the following description.
Changes between 1.0.1l and 1.0.2 [22 Jan 2015] 
... 
  *) Support for SPARC Architecture 2011 crypto extensions, first 
 implemented in SPARC T4. This covers AES, DES, Camellia, SHA1, 
 SHA256/512, MD5, GHASH and modular exponentiation. 
 [Andy Polyakov, David Miller] 
...

My understanding is that starting from OpenSSL 1.0.2, OpenSSL
applications/utilities would use SunSPARC crypto accelerator in Solaris 11.1
which has the accelerator. 

However my tests show there is no difference between the performance of
'openssl' 1.0.1p and that of its 1.0.2d counterpart. 

 ksol1% ./1.0.1p/shared64bit/openssl/bin/openssl speed -evp aes-128-cbc 
WARNING: can't open config file: /usr/local/ssl/openssl.cnf 
Doing aes-128-cbc for 3s on 16 size blocks: 19705194 aes-128-cbc's in 3.00s 
Doing aes-128-cbc for 3s on 64 size blocks: 5257594 aes-128-cbc's in 3.00s 
Doing aes-128-cbc for 3s on 256 size blocks: 1361128 aes-128-cbc's in 3.00s 
Doing aes-128-cbc for 3s on 1024 size blocks: 34 aes-128-cbc's in 3.00s 
Doing aes-128-cbc for 3s on 8192 size blocks: 43029 aes-128-cbc's in 3.00s 
OpenSSL 1.0.1p-fips 9 Jul 2015 
built on: Thu Jul  9 23:22:11 2015 
options:bn(64,32) rc4(ptr,char) des(ptr,risc1,16,int) aes(partial)
blowfish(ptr) 

compiler: cc -I. -I.. -I../include  -DOPENSSL_THREADS -D_REENTRANT
-DDSO_DLFCN - 
DHAVE_DLFCN_H -DOPENSSL_BUILD -KPIC -xtarget=ultra -xarch=v9 -xO5 -xstrconst
-xd 
epend -Xa -DB_ENDIAN -DOPENSSL_BN_ASM_MONT
-I/leo_ocsdev/qun/csi/allbuilt/main10 
/built/ant-generated/fips-sun_svr4/include -DSHA1_ASM -DSHA256_ASM
-DSHA512_ASM 
-DAES_ASM -DGHASH_ASM 
The 'numbers' are in 1000s of bytes per second processed. 
type 16 bytes 64 bytes256 bytes   1024 bytes   8192
bytes 
aes-128-cbc 105094.37k   112162.01k   116149.59k   117191.00k  
117497.86k 

ksol1% ./1.0.2d/shared64bit/openssl/bin/openssl speed -evp aes-128-cbc 
WARNING: can't open config file: /usr/local/ssl/openssl.cnf 
Doing aes-128-cbc for 3s on 16 size blocks: 18777502 aes-128-cbc's in 3.00s 
Doing aes-128-cbc for 3s on 64 size blocks: 5066291 aes-128-cbc's in 3.00s 
Doing aes-128-cbc for 3s on 256 size blocks: 1317102 aes-128-cbc's in 3.00s 
Doing aes-128-cbc for 3s on 1024 size blocks: 331672 aes-128-cbc's in 3.00s 
Doing aes-128-cbc for 3s on 8192 size blocks: 40739 aes-128-cbc's in 3.00s 
OpenSSL 1.0.2d-fips 9 Jul 2015 
built on: reproducible build, date unspecified 
options:bn(64,32) rc4(ptr,char) des(ptr,risc1,16,int) aes(partial)
blowfish(ptr) 

compiler: cc -I. -I.. -I../include  -DOPENSSL_THREADS -D_REENTRANT
-DDSO_DLFCN - 
DHAVE_DLFCN_H -DOPENSSL_BUILD -KPIC -xtarget=ultra -xarch=v9 -xO5 -xstrconst
-xd 
epend -Xa -DB_ENDIAN
-I/leo_ocsdev/qun/csi/allbuilt/main12/built/ant-generated/f 
ips-sun_svr4/include 
The 'numbers' are in 1000s of bytes per second processed. 
type 16 bytes 64 bytes256 bytes   1024 bytes   8192
bytes 
aes-128-cbc 100146.68k   108080.87k   112392.70k   113210.71k  
111244.63k 

I built 'openssl' on Solaris 11.1 using the following commands. 
Configure no-idea no-mdc2 no-rc5 no-asm solaris64-sparcv9-cc -KPIC 
make clean 
make 
make test 
make install 

When testing the default openssl installed in /usr/bin/ on Solaris 11.1, I
saw a much better result below. 
ksol1% /usr/bin/openssl speed -evp aes-128-cbc 
Doing aes-128-cbc for 3s on 16 size blocks: 113798920 aes-128-cbc's in 2.99s 
Doing aes-128-cbc for 3s on 64 size blocks: 48425338 aes-128-cbc's in 3.00s 
Doing aes-128-cbc for 3s on 256 size blocks: 14613535 aes-128-cbc's in 3.00s 
Doing aes-128-cbc for 3s on 1024 size blocks: 3768123 aes-128-cbc's in 3.00s 
Doing aes-128-cbc for 3s on 8192 size blocks: 488001 aes-128-cbc's in 3.00s 
OpenSSL 1.0.0k 5 Feb 2013 
built on: date not available 
options:bn(64,32) md2(int) rc4(ptr,int) des(ptr,risc1,16,int) aes(partial)
blowf 
ish(ptr) 
compiler: information not available 
The 'numbers' are in 1000s of bytes per second processed. 
type 16 bytes 64 bytes256 bytes   1024 bytes   8192
bytes 
aes-128-cbc 608957.43k  1033073.88k  1247021.65k  1286185.98k 
1332568.06k 

Hence I believe OpenSSL utility 'openssl' built by me does not use the
hardware crypto accelerators at all. 

I wonder if anyone knows the reason. 

Thanks in advance,
Aaron




--
View this message in context: 
http://openssl.6102.n7.nabble.com/How-to-let-OpenSSL-applications-utilities-use-SunSPARC-crypto-accelerators-tp59163.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] Has the support for SPARC architecture crypto extensions been Implemented?

2015-07-14 Thread Aaron
Some additional information here. When testing the default openssl installed
in /usr/bin/ on Solaris 11, I saw a much better result below. Hence I
believe OpenSSL utility 'openssl' built by me does not use the hardware
crypto accelerators at all. 

Anyone knows the reason?

Thanks,
Aaron 

ksol1% /usr/bin/openssl speed -evp aes-128-cbc
Doing aes-128-cbc for 3s on 16 size blocks: 113798920 aes-128-cbc's in 2.99s
Doing aes-128-cbc for 3s on 64 size blocks: 48425338 aes-128-cbc's in 3.00s
Doing aes-128-cbc for 3s on 256 size blocks: 14613535 aes-128-cbc's in 3.00s
Doing aes-128-cbc for 3s on 1024 size blocks: 3768123 aes-128-cbc's in 3.00s
Doing aes-128-cbc for 3s on 8192 size blocks: 488001 aes-128-cbc's in 3.00s
OpenSSL 1.0.0k 5 Feb 2013
built on: date not available
options:bn(64,32) md2(int) rc4(ptr,int) des(ptr,risc1,16,int) aes(partial)
blowf
ish(ptr)
compiler: information not available
The 'numbers' are in 1000s of bytes per second processed.
type 16 bytes 64 bytes256 bytes   1024 bytes   8192
bytes
aes-128-cbc 608957.43k  1033073.88k  1247021.65k  1286185.98k 
1332568.06k





--
View this message in context: 
http://openssl.6102.n7.nabble.com/Has-the-support-for-SPARC-architecture-crypto-extensions-been-Implemented-tp58866p59162.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] Has the support for SPARC architecture crypto extensions been Implemented?

2015-07-14 Thread Aaron
I am doing some tests using OpenSSL command line utility 'openssl'.  My tests
show regarding to the performance of executable ‘openssl’ there is no
difference between 1.0.1p and 1.0.2d. 

Here is the test results.

 ksol1% ./1.0.1p/shared64bit/openssl/bin/openssl speed -evp aes-128-cbc
WARNING: can't open config file: /usr/local/ssl/openssl.cnf
Doing aes-128-cbc for 3s on 16 size blocks: 19705194 aes-128-cbc's in 3.00s
Doing aes-128-cbc for 3s on 64 size blocks: 5257594 aes-128-cbc's in 3.00s
Doing aes-128-cbc for 3s on 256 size blocks: 1361128 aes-128-cbc's in 3.00s
Doing aes-128-cbc for 3s on 1024 size blocks: 34 aes-128-cbc's in 3.00s
Doing aes-128-cbc for 3s on 8192 size blocks: 43029 aes-128-cbc's in 3.00s
OpenSSL 1.0.1p-fips 9 Jul 2015
built on: Thu Jul  9 23:22:11 2015
options:bn(64,32) rc4(ptr,char) des(ptr,risc1,16,int) aes(partial)
blowfish(ptr)

compiler: cc -I. -I.. -I../include  -DOPENSSL_THREADS -D_REENTRANT
-DDSO_DLFCN -
DHAVE_DLFCN_H -DOPENSSL_BUILD -KPIC -xtarget=ultra -xarch=v9 -xO5 -xstrconst
-xd
epend -Xa -DB_ENDIAN -DOPENSSL_BN_ASM_MONT
-I/leo_ocsdev/qun/csi/allbuilt/main10
/built/ant-generated/fips-sun_svr4/include -DSHA1_ASM -DSHA256_ASM
-DSHA512_ASM
-DAES_ASM -DGHASH_ASM
The 'numbers' are in 1000s of bytes per second processed.
type 16 bytes 64 bytes256 bytes   1024 bytes   8192
bytes
aes-128-cbc 105094.37k   112162.01k   116149.59k   117191.00k  
117497.86k
ksol1%


ksol1% ./1.0.2d/shared64bit/openssl/bin/openssl speed -evp aes-128-cbc
WARNING: can't open config file: /usr/local/ssl/openssl.cnf
Doing aes-128-cbc for 3s on 16 size blocks: 18777502 aes-128-cbc's in 3.00s
Doing aes-128-cbc for 3s on 64 size blocks: 5066291 aes-128-cbc's in 3.00s
Doing aes-128-cbc for 3s on 256 size blocks: 1317102 aes-128-cbc's in 3.00s
Doing aes-128-cbc for 3s on 1024 size blocks: 331672 aes-128-cbc's in 3.00s
Doing aes-128-cbc for 3s on 8192 size blocks: 40739 aes-128-cbc's in 3.00s
OpenSSL 1.0.2d-fips 9 Jul 2015
built on: reproducible build, date unspecified
options:bn(64,32) rc4(ptr,char) des(ptr,risc1,16,int) aes(partial)
blowfish(ptr)

compiler: cc -I. -I.. -I../include  -DOPENSSL_THREADS -D_REENTRANT
-DDSO_DLFCN -
DHAVE_DLFCN_H -DOPENSSL_BUILD -KPIC -xtarget=ultra -xarch=v9 -xO5 -xstrconst
-xd
epend -Xa -DB_ENDIAN
-I/leo_ocsdev/qun/csi/allbuilt/main12/built/ant-generated/f
ips-sun_svr4/include
The 'numbers' are in 1000s of bytes per second processed.
type 16 bytes 64 bytes256 bytes   1024 bytes   8192
bytes
aes-128-cbc 100146.68k   108080.87k   112392.70k   113210.71k  
111244.63k
ksol1%

I built 'openssl' on Solaris 11.1 using the following commands.
Configure no-idea no-mdc2 no-rc5 no-asm solaris64-sparcv9-cc -KPIC
make clean
make
make test
make install

Anyone knows how to let OpenSSL applications or utilities use SPARC crypto
accelerator? 

Thanks in advance,
Aaron





--
View this message in context: 
http://openssl.6102.n7.nabble.com/Has-the-support-for-SPARC-architecture-crypto-extensions-been-Implemented-tp58866p59161.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] Has the support for SPARC architecture crypto extensions been Implemented?

2015-06-22 Thread Aaron
Found this, so the feature has been implemented.

Aaron

Changes between 1.0.1l and 1.0.2 [22 Jan 2015]
...
  *) Support for SPARC Architecture 2011 crypto extensions, first
 implemented in SPARC T4. This covers AES, DES, Camellia, SHA1,
 SHA256/512, MD5, GHASH and modular exponentiation.
 [Andy Polyakov, David Miller]





--
View this message in context: 
http://openssl.6102.n7.nabble.com/Has-the-support-for-SPARC-architecture-crypto-extensions-been-Implemented-tp58866p58867.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


[openssl-users] Has the support for SPARC architecture crypto extensions been Implemented?

2015-06-22 Thread Aaron
Hello OpenSSL folks,

We have a product which is an OpenSSL 1.0.1 application. One of my customers
is running my product on his SunSparc Solaris 11 platform which has a Crypto
Accelerator. Around the end of last year, he complained to me that OpenSSL
doesn't utilize the accelerator at all. I then checked on OpenSSL website
and found the following description. 

Changes between 1.0.1e and 1.0.2 [xx XXX ] 

  *) Initial support for PowerISA 2.0.7, first implemented in POWER8. 
 This covers AES, SHA256/512 and GHASH. "Initial" means that most 
 common cases are optimized and there still is room for further 
 improvements. Vector Permutation AES for Altivec is also added. 
 [Andy Polyakov] 

  *) Add support for little-endian ppc64 Linux target. 
 [Marcelo Cerri (IBM)] 

  *) Initial support for AMRv8 ISA crypto extensions. This covers AES, 
 SHA1, SHA256 and GHASH. "Initial" means that most common cases 
 are optimized and there still is room for further improvements. 
 Both 32- and 64-bit modes are supported. 
 [Andy Polyakov, Ard Biesheuvel (Linaro)] 

  *) Improved ARMv7 NEON support. 
 [Andy Polyakov] 

  *) Support for SPARC Architecture 2011 crypto extensions, first 
 implemented in SPARC T4. This covers AES, DES, Camellia, SHA1, 
 SHA256/512, MD5, GHASH and modular exponentiation. 
 [Andy Polyakov, David Miller] 

Hence I told him to wait until OpenSSL 1.0.2 to be released officially. I
promised him I would upgrade the OpenSSL used in my product to 1.0.2, so his
crypto accelerator would be utilized. He came back to me recently as OpenSSL
1.0.2 has been released officially. However after checking change log of
1.0.2, 1.0.2a, 1.0.2b and 1.0.2c, I could not find any description regarding
to 'Support for SPARC Architecture 2011 crypto extensions'. 

My question is if the support for SPARC architecture crypto extensions has
been Implemented yet? 

Thanks in advance, 
Aaron 



--
View this message in context: 
http://openssl.6102.n7.nabble.com/Has-the-support-for-SPARC-architecture-crypto-extensions-been-Implemented-tp58866.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] The default cipher of executable 'openssl'

2015-06-15 Thread Aaron
>Does your test case result in ECDHE being used when you change only 
>the protocol on both ends from ssl3 to tls1?  
Yes, I tested and verified this.

Thanks again,
Aaron   
  



--
View this message in context: 
http://openssl.6102.n7.nabble.com/The-behavior-change-of-command-line-utility-openssl-tp58557p58697.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] The default cipher of executable 'openssl'

2015-06-12 Thread Aaron
Thanks so much, Viktor. Hence, this is an expected behavior change. In this
case I will update my application.

Aaron. 



--
View this message in context: 
http://openssl.6102.n7.nabble.com/The-behavior-change-of-command-line-utility-openssl-tp58557p58637.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] The default cipher of executable 'openssl'

2015-06-11 Thread Aaron
Hi Dave,

Thanks for your comments.

I am not really familiar with OpenSSL, so some parts of my descriptions may
not be not very clear.

Right, I am talking about s_server subcommand. You mentioned that there is
no change in this area. However I can easily show something is change using
s_server subcommand. I am using original OpenSSL code to build my 'openssl',
to this change is not from me.

1) 1.0.1l 
./apps/openssl s_server -ssl3 -cert certdb/ssl_server.pem -WWW -CAfile
certdb/cafile.pem 
Using default temp DH parameters 
Using default temp ECDH parameters 
ACCEPT 

2) 1.0.2 
./apps/openssl s_server -ssl3 -cert certdb/ssl_server.pem -WWW -CAfile
certdb/cafile.pem 
Using default temp DH parameters 
ACCEPT 

Note that, in 1.0.2, openssl doesn't print out 'Using default temp ECDH
parameters'. 

I checked related code in s_server.c and ssl_conf.c, There are some updates.
Some related code is moved from s_server.c to ssl_conf.c. However I haven't
found the root cause of this change. 

I encountered a similar issue when upgrading from OpenSSL 1.0.1l to 1.0.1m.
I paste my analysis and fix below. After I applied my fix, the issue
disappeared.
1) Analysis
File s_server.c was updated in OpenSSL 1.0.1m. Variable 'no_ecdhe' was
uninitialized after the update. This causes the condition of the if
statement (if (!no_ecdheon) {...}) on line 1682 not to be true. Then
ECDHE-RSA-AES256-SHA is not the default temp ECDH parameters of 'openssl
s_server' any more.

2) Fix
273   diff -wruN openssl-1.0.1m.original/apps/s_server.c
openssl-1.0.1m.working/apps/s_server.c
274   --- openssl-1.0.1m.original/apps/s_server.c 2015-03-19
06:37:10.0 -0700
275   +++ openssl-1.0.1m.working/apps/s_server.c  2015-05-25
01:46:35.0 -0700
276   @@ -998,7 +998,7 @@
277int off = 0;
278int no_tmp_rsa = 0, no_dhe = 0, nocert = 0;
279#ifndef OPENSSL_NO_ECDH
280   -int no_ecdhe;
281   +int no_ecdhe = 0;
282#endif
283int state = 0;
284const SSL_METHOD *meth = NULL;

I noticed that the issue in 1.0.2 is not the same as the issue in 1.0.1m.
The issue started to appear in 1.0.2 rather than 1.0.2a.

Thanks,
Aaron




--
View this message in context: 
http://openssl.6102.n7.nabble.com/The-behavior-change-of-command-line-utility-openssl-tp58557p58631.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] The behavior change of command line utility -- 'openssl'

2015-06-10 Thread Aaron
I wonder if this is an expected behavior change or it is a bug.

Thanks, 
Aaron



--
View this message in context: 
http://openssl.6102.n7.nabble.com/The-behavior-change-of-command-line-utility-openssl-tp58557p58578.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


[openssl-users] The default cipher of executable 'openssl'

2015-06-10 Thread Aaron
Hello,

We are using executable 'apps/openssl' in our test cases. We upgraded from
OpenSSL 1.0.1l to OpenSSL 1.0.2a recently. Since then one of our test cases
started to fail. After checking, I noticed that the default cipher of
'openssl' was changed from ECDHE-RSA-AES256-SHA to DHE-RSA-AES256-SHA in
OpenSSL 1.0.2. The related description in OpenSSL 1.0.2 change log is as
follows.

474   *) Support for automatic EC temporary key parameter selection. If
enabled 
475  the most preferred EC parameters are automatically used instead of 
476  hardcoded fixed parameters. Now a server just has to call: 
477  SSL_CTX_set_ecdh_auto(ctx, 1) and the server will automatically 
478  support ECDH and use the most appropriate parameters. 
479  [Steve Henson] 

My question is how to enable automatic EC temporary key parameter selection?
Is it possible to change the default cipher back to ECDHE-RSA-AES256-SHA?

Thanks,
Aaron



--
View this message in context: 
http://openssl.6102.n7.nabble.com/The-default-cipher-of-executable-openssl-tp58557.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


[openssl-users] Default ciphersuite has changed from 1.0.1l to 1.0.2a?

2015-05-07 Thread Aaron
Hello,

We have an OpenSSL application in which the client calls SSL_connect() to
connect to the server. 

We upgraded the OpenSSL used inour application from 1.0.1l to 1.0.2a
recently.

When OpenSSL 1.0.1l was used, the ciphersuite the client got was
ECDHE_RSA_WITH_AES_256_CBC_SHA. When OpenSSL 1.0.1a is used, we notice that
the ciphersuite the client gets has become DHE_RSA_WITH_AES_256_CBC_SHA.

I traced OpenSSL 1.0.2a source code. Here is the stack trace.
ssl_get_cipher_by_char()
ssl3_get_server_hello()
ssl3_connect()
SSL_connect()
ssl23_get_server_hello()
ssl23_connect()
SSL_connect()

I noticed that in routine ssl_get_cipher_by_char() the internal cipher name
it gets is DHE_RSA_AES256_SHA which should be corresponding to
DHE_RSA_WITH_AES_256_CBC_SHA.

My question is if this behavior change is expected?

Thanks in advance,
Aaron



--
View this message in context: 
http://openssl.6102.n7.nabble.com/Default-ciphersuite-has-changed-from-1-0-1l-to-1-0-2a-tp57937.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


[openssl-users] Is there any plan for FIPS to be supported on Linux-aarch64?

2015-04-05 Thread Aaron
Hello, 

We are porting our products to Linux-aarch64. Our products are using OpenSSL
with FIPS. I know that OpenSSL 1.0.2 started to support Linux-aarch64, but
our products need OpenSSL FIPS as well. 

My question is when OpenSSL FIPS will be supported on Linux-aarch64? 

Thanks in advance, 
Aaron 



--
View this message in context: 
http://openssl.6102.n7.nabble.com/Is-there-any-plan-for-FIPS-to-be-supported-on-Linux-aarch64-tp57389.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


RE: Apache SSL proxy to Weblogic fails

2014-09-23 Thread Stromas, Aaron
I suspected that Apache and Weblogic fail to agree on the ciphers. The Weblogic 
logs shows its ciphers:









I’ve been trying to match them using the SSLCipherSuite directive, for example, 
setting it to AES:RC4+RSA:!TLSv1.2:!ECDH:!SPR:!DSS:!PSK:!EXP but none of the 
values work.


Best regards,

-a

Aaron Stromas  |   RSA  The Security Division of EMC | Practice Consultant  |  
Identity & Fraud Protection Practice |  M – 240 271 64 58 | 
aaron.stro...@rsa.com<mailto:aaron.stro...@rsa.com>

From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of Thulasi Goriparthi
Sent: Tuesday, 23 September, 2014 03:20
To: openssl-users@openssl org
Subject: Re: Apache SSL proxy to Weblogic fails



On 19 September 2014 22:34, Stromas, Aaron 
mailto:aaron.stro...@rsa.com>> wrote:
Greetings,

I am looking for  help with a problem I've ran into a using mod_proxy/mod_ssl. 
The Apache HTTP server on SLES 11 SP3 64 bit, OpenSSL 1.0.1.f acts as SSL proxy 
to the Weblogic 10.3 running on Redhat. The mod_ssl is configured correctly - 
it works when proxying to SSL connections to non-SSL serves. Also, the 
certificate on the proxy was issued with extensions allowing it to be used as 
both SSL client and server.

Yet, the Apache proxy fails connection over SSL to the Weblogic’s HTTPS port. 
Below is the excerpt from the Apache errors log. Any advice will be gerately 
appreciated. TIA

[Thu Sep 18 09:32:14 2014] [debug] mod_proxy.c(1036): Running scheme https 
handler (attempt 0)
[Thu Sep 18 09:32:14 2014] [debug] mod_proxy_http.c(1995): proxy: HTTP: serving 
URL https://appdev2.example.com:8102/auth/logon.jsp?aa_param=user
[Thu Sep 18 09:32:14 2014] [debug] proxy_util.c(2022): proxy: HTTPS: has 
acquired connection for (appdev2.example.com<http://appdev2.example.com>)
[Thu Sep 18 09:32:14 2014] [debug] proxy_util.c(2078): proxy: connecting 
https://appdev2.example.com:8102/auth/logon.jsp?aa_param=user to 
appdev2.example.com:8102<http://appdev2.example.com:8102>
[Thu Sep 18 09:32:14 2014] [debug] proxy_util.c(2236): proxy: connected 
/auth/logon.jsp?aa_param=user to 
appdev2.example.com:8102<http://appdev2.example.com:8102>
[Thu Sep 18 09:32:14 2014] [debug] proxy_util.c(2487): proxy: HTTPS: fam 2 
socket created to connect to appdev2.example.com<http://appdev2.example.com>
[Thu Sep 18 09:32:14 2014] [debug] proxy_util.c(2619): proxy: HTTPS: connection 
complete to 10.40.0.224:8102<http://10.40.0.224:8102> 
(appdev2.example.com<http://appdev2.example.com>)
[Thu Sep 18 09:32:14 2014] [info] [client 10.40.0.224] Connection to child 0 
established (server aaproxiedel1:443)
[Thu Sep 18 09:32:14 2014] [info] Seeding PRNG with 144 bytes of entropy
[Thu Sep 18 09:32:14 2014] [debug] ssl_engine_io.c(1090): [client 10.40.0.224] 
SNI extension for SSL Proxy request set to 
'appdev2.example.com<http://appdev2.example.com>'
[Thu Sep 18 09:32:14 2014] [debug] ssl_engine_kernel.c(1903): OpenSSL: 
Handshake: start
[Thu Sep 18 09:32:14 2014] [debug] ssl_engine_kernel.c(1911): OpenSSL: Loop: 
before/connect initialization
[Thu Sep 18 09:32:14 2014] [debug] ssl_engine_kernel.c(1911): OpenSSL: Loop: 
SSLv2/v3 write client hello A
[Thu Sep 18 09:32:14 2014] [debug] ssl_engine_io.c(1939): OpenSSL: read 7/7 
bytes from BIO#994fe0 [mem: 9ea880] (BIO dump follows)
[Thu Sep 18 09:32:14 2014] [debug] ssl_engine_io.c(1872): 
+-+
[Thu Sep 18 09:32:14 2014] [debug] ssl_engine_io.c(1911): | : 15 03 00 00 
02 02 28 ..(  |
[Thu Sep 18 09:32:14 2014] [debug] ssl_engine_io.c(1917): 
+-+
Content type 15  is alert.
[Thu Sep 18 09:32:14 2014] [debug] ssl_engine_kernel.c(1916): OpenSSL: Read: 
SSLv2/v3 read server hello A
[Thu Sep 18 09:32:14 2014] [debug] ssl_engine_kernel.c(1940): OpenSSL: Exit: 
error in SSLv2/v3 read server hello A
[Thu Sep 18 09:32:14 2014] [info] [client 10.40.0.224] SSL Proxy connect failed
[Thu Sep 18 09:32:14 2014] [info] SSL Library Error: 336032784 
error:14077410:SSL routines:SSL23_GET_SERVER_HELLO:sslv3 alert handshake failure
[Thu Sep 18 09:32:14 2014] [info] [client 10.40.0.224] Connection closed to 
child 0 with abortive shutdown (server aaproxiedel1:443)
[Thu Sep 18 09:32:14 2014] [error] (502)Unknown error 502: proxy: pass request 
body failed to 10.40.0.224:8102<http://10.40.0.224:8102> 
(appdev2.example.com<http://appdev2.example.com>)
[Thu Sep 18 09:32:14 2014] [error] [client 141.1.3.134] proxy: Error during SSL 
Handshake with remote server returned by /auth/logon.jsp
[Thu Sep 18 09:32:14 2014] [error] proxy: pass request body failed to 
10.40.0.224:8102<http://10.40.0.224:8102> 
(appdev2.example.com<http://appdev2.example.com>) from 141.1.3.134 ()
[Thu Sep 

RE: Apache SSL proxy to Weblogic fails

2014-09-19 Thread Stromas, Aaron
Hi Lewis,



The Weblogic logs show the following ciphers on startup:

















Based on the error, it looks to be a CertiCom SSL provider which supports 
TLSv1/SSLv3 and SSLv2.

I had tried to experiment with SSLCipherSuite but met no success. Last value I 
attempted was ALL:RC4+RSA:+HIGH:+MEDIUM:+LOW:!NULL:+SSLv2:+EXP



This is what I see in the Weblogic log:













<27112312 
SSL3/TLS MAC>

<27112312 
received HANDSHAKE>




(Unknown Source)

at 
com.certicom.tls.record.handshake.HandshakeHandler.handleHandshakeMessages(Unknown
 Source)

at com.certicom.tls.record.MessageInterpreter.interpretContent(Unknown 
Source)

at com.certicom.tls.record.MessageInterpreter.decryptMessage(Unknown 
Source)

at com.certicom.tls.record.ReadHandler.processRecord(Unknown Source)

at com.certicom.tls.record.ReadHandler.readRecord(Unknown Source)

at 
com.certicom.tls.record.ReadHandler.readUntilHandshakeComplete(Unknown Source)

at 
com.certicom.tls.interfaceimpl.TLSConnectionImpl.completeHandshake(Unknown 
Source)

at javax.net.ssl.impl.SSLSocketImpl.startHandshake(Unknown Source)

at 
weblogic.server.channels.DynamicSSLListenThread$1.run(DynamicSSLListenThread.java:130)

at weblogic.work.ExecuteThread.execute(ExecuteThread.java:201)

at weblogic.work.ExecuteThread.run(ExecuteThread.java:173





Best regards,



-a



Aaron Stromas  |   RSA  The Security Division of EMC | Practice Consultant  |  
Identity & Fraud Protection Practice |  M – 240 271 64 58 | 
aaron.stro...@rsa.com





-Original Message-
From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of Lewis Rosenthal
Sent: Friday, 19 September, 2014 14:11
To: openssl-users@openssl.org
Subject: Re: Apache SSL proxy to Weblogic fails



Hi, Aaron...



On 09/19/2014 01:04 PM, Stromas, Aaron wrote:

>

> Greetings,

>

> I am looking for  help with a problem I've ran into a using

> mod_proxy/mod_ssl. The Apache HTTP server on SLES 11 SP3 64 bit,

> OpenSSL 1.0.1.f acts as SSL proxy to the Weblogic 10.3 running on

> Redhat. The mod_ssl is configured correctly - it works when proxying

> to SSL connections to non-SSL serves. Also, the certificate on the

> proxy was issued with extensions allowing it to be used as both SSL

> client and server.

>

> Yet, the Apache proxy fails connection over SSL to the Weblogic’s

> HTTPS port. Below is the excerpt from the Apache errors log. Any

> advice will be gerately appreciated. TIA

>



> [Thu Sep 18 09:32:14 2014] [debug] ssl_engine_kernel.c(1940): OpenSSL:

> Exit: error in SSLv2/v3 read server hello A

>

> [Thu Sep 18 09:32:14 2014] [info] [client 10.40.0.224] SSL Proxy

> connect failed

>

> [Thu Sep 18 09:32:14 2014] [info] SSL Library Error: 336032784

> error:14077410:SSL routines:SSL23_GET_SERVER_HELLO:sslv3 alert

> handshake failure

>

> [Thu Sep 18 09:32:14 2014] [info] [client 10.40.0.224] Connection

> closed to child 0 with abortive shutdown (server aaproxiedel1:443)

>

> [Thu Sep 18 09:32:14 2014] [error] (502)Unknown error 502: proxy: pass

> request body failed to 10.40.0.224:8102 (appdev2.example.com)

>

> [Thu Sep 18 09:32:14 2014] [error] [client 141.1.3.134] proxy: Error

> during SSL Handshake with remote server returned by /auth/logon.jsp

>

> [Thu Sep 18 09:32:14 2014] [error] proxy: pass request body failed to

> 10.40.0.224:8102 (appdev2.example.com) from 141.1.3.134 ()

>

> [Thu Sep 18 09:32:14 2014] [debug] proxy_util.c(2040): proxy: HTTPS:

> has released connection for (appdev2.example.com)

>

> [Thu Sep 18 09:32:14 2014] [debug] ssl_engine_kernel.c(1921): OpenSSL:

> Write: SSL negotiation finished successfully

>

> [Thu Sep 18 09:32:14 2014] [info] [client 141.1.3.134] Connection

> closed to child 2 with standard shutdown (server aaproxiedel1:443)

>

What cipher suites is the server behind the proxy set to accept, and what 
version of SSL is that server using?



--

Lewis

-

Lewis G Rosenthal, CNA, CLP, CLE, CWTS, EA

Rosenthal & Rosenthal, LLC
www.2rosenthals.com<http://www.2rosenthals.com>

visit my IT blog
www.2rosenthals.net/wordpress<http://www.2rosenthals.net/wordpress>

IRS Circular 230 Disclosure applies   see 
www.2rosenthals.com<http://www.2rosenthals.com>

-





--

This email was Anti Virus checked by Astaro Security Gateway. 
http://www.astaro.com

__

OpenSSL Project http://www.openssl.org

User Support Mailing List
openssl-users@openssl.org<mailto:openssl-users@openssl.org>

Automated List Manager   
majord...@openssl.org<mailto:majord...@openssl.org>


Apache SSL proxy to Weblogic fails

2014-09-19 Thread Stromas, Aaron
Greetings,

I am looking for  help with a problem I've ran into a using mod_proxy/mod_ssl. 
The Apache HTTP server on SLES 11 SP3 64 bit, OpenSSL 1.0.1.f acts as SSL proxy 
to the Weblogic 10.3 running on Redhat. The mod_ssl is configured correctly - 
it works when proxying to SSL connections to non-SSL serves. Also, the 
certificate on the proxy was issued with extensions allowing it to be used as 
both SSL client and server.

Yet, the Apache proxy fails connection over SSL to the Weblogic's HTTPS port. 
Below is the excerpt from the Apache errors log. Any advice will be gerately 
appreciated. TIA

[Thu Sep 18 09:32:14 2014] [debug] mod_proxy.c(1036): Running scheme https 
handler (attempt 0)
[Thu Sep 18 09:32:14 2014] [debug] mod_proxy_http.c(1995): proxy: HTTP: serving 
URL https://appdev2.example.com:8102/auth/logon.jsp?aa_param=user
[Thu Sep 18 09:32:14 2014] [debug] proxy_util.c(2022): proxy: HTTPS: has 
acquired connection for (appdev2.example.com)
[Thu Sep 18 09:32:14 2014] [debug] proxy_util.c(2078): proxy: connecting 
https://appdev2.example.com:8102/auth/logon.jsp?aa_param=user to 
appdev2.example.com:8102
[Thu Sep 18 09:32:14 2014] [debug] proxy_util.c(2236): proxy: connected 
/auth/logon.jsp?aa_param=user to appdev2.example.com:8102
[Thu Sep 18 09:32:14 2014] [debug] proxy_util.c(2487): proxy: HTTPS: fam 2 
socket created to connect to appdev2.example.com
[Thu Sep 18 09:32:14 2014] [debug] proxy_util.c(2619): proxy: HTTPS: connection 
complete to 10.40.0.224:8102 (appdev2.example.com)
[Thu Sep 18 09:32:14 2014] [info] [client 10.40.0.224] Connection to child 0 
established (server aaproxiedel1:443)
[Thu Sep 18 09:32:14 2014] [info] Seeding PRNG with 144 bytes of entropy
[Thu Sep 18 09:32:14 2014] [debug] ssl_engine_io.c(1090): [client 10.40.0.224] 
SNI extension for SSL Proxy request set to 'appdev2.example.com'
[Thu Sep 18 09:32:14 2014] [debug] ssl_engine_kernel.c(1903): OpenSSL: 
Handshake: start
[Thu Sep 18 09:32:14 2014] [debug] ssl_engine_kernel.c(1911): OpenSSL: Loop: 
before/connect initialization
[Thu Sep 18 09:32:14 2014] [debug] ssl_engine_kernel.c(1911): OpenSSL: Loop: 
SSLv2/v3 write client hello A
[Thu Sep 18 09:32:14 2014] [debug] ssl_engine_io.c(1939): OpenSSL: read 7/7 
bytes from BIO#994fe0 [mem: 9ea880] (BIO dump follows)
[Thu Sep 18 09:32:14 2014] [debug] ssl_engine_io.c(1872): 
+-+
[Thu Sep 18 09:32:14 2014] [debug] ssl_engine_io.c(1911): | : 15 03 00 00 
02 02 28 ..(  |
[Thu Sep 18 09:32:14 2014] [debug] ssl_engine_io.c(1917): 
+-+
[Thu Sep 18 09:32:14 2014] [debug] ssl_engine_kernel.c(1916): OpenSSL: Read: 
SSLv2/v3 read server hello A
[Thu Sep 18 09:32:14 2014] [debug] ssl_engine_kernel.c(1940): OpenSSL: Exit: 
error in SSLv2/v3 read server hello A
[Thu Sep 18 09:32:14 2014] [info] [client 10.40.0.224] SSL Proxy connect failed
[Thu Sep 18 09:32:14 2014] [info] SSL Library Error: 336032784 
error:14077410:SSL routines:SSL23_GET_SERVER_HELLO:sslv3 alert handshake failure
[Thu Sep 18 09:32:14 2014] [info] [client 10.40.0.224] Connection closed to 
child 0 with abortive shutdown (server aaproxiedel1:443)
[Thu Sep 18 09:32:14 2014] [error] (502)Unknown error 502: proxy: pass request 
body failed to 10.40.0.224:8102 (appdev2.example.com)
[Thu Sep 18 09:32:14 2014] [error] [client 141.1.3.134] proxy: Error during SSL 
Handshake with remote server returned by /auth/logon.jsp
[Thu Sep 18 09:32:14 2014] [error] proxy: pass request body failed to 
10.40.0.224:8102 (appdev2.example.com) from 141.1.3.134 ()
[Thu Sep 18 09:32:14 2014] [debug] proxy_util.c(2040): proxy: HTTPS: has 
released connection for (appdev2.example.com)
[Thu Sep 18 09:32:14 2014] [debug] ssl_engine_kernel.c(1921): OpenSSL: Write: 
SSL negotiation finished successfully
[Thu Sep 18 09:32:14 2014] [info] [client 141.1.3.134] Connection closed to 
child 2 with standard shutdown (server aaproxiedel1:443)

Best regards,

-a
____
Aaron Stromas  |   RSA  The Security Division of EMC | Practice Consultant  |  
Identity & Fraud Protection Practice |  M - 240 271 64 58 | 
aaron.stro...@rsa.com<mailto:aaron.stro...@rsa.com>



RE: New and bleeding - Install Win64 problems

2014-04-15 Thread Aaron Bahmer
Call me wimpy, but after six hours of fighting the compiling process, I went 
with the slproweb binary. New certificates are also in place. Thanks for the 
help--I'm no longer bleeding!

==
Aaron Bahmer
Director, Instructional Technology
Eastern Wyoming College
http://ewc.wy.edu | (307) 532-8284
1-866-327-8996 (1-866-EAST WYO) x8284

> > -Original Message-
> > From: Aaron Bahmer
> > Sent: Monday, April 14, 2014 6:22 PM
> > To: openssl-users@openssl.org
> > Subject: New and bleeding - Install Win64 problems
> >
> > Sorry for the newbie question, but the archives didn't provide me any
> > help. I'm dealing with the heartbleed bug, so updating openssl from
> > 1.0.1e to 1.0.1g on a Windows box where I run Apache/Tomcat.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


New and bleeding - Install Win64 problems

2014-04-14 Thread Aaron Bahmer
Sorry for the newbie question, but the archives didn't provide me any help. I'm 
dealing with the heartbleed bug, so updating openssl from 1.0.1e to 1.0.1g on a 
Windows box where I run Apache/Tomcat.

I downloaded the new openssl tarball (albeit with non-matching MD5 signatures) 
and unpacked it to my server.
I then opened the Install.w64 file for guidance. Here's an excerpt where I am 
working:

>>>
Compiling procedure
 ---

 You will need Perl. You can run under Cygwin or you can download
 ActiveState Perl from http://www.activestate.com/ActivePerl.

 You will need Microsoft Platform SDK, available for download at
 http://www.microsoft.com/msdownload/platformsdk/sdkupdate/. As per
 April 2005 Platform SDK is equipped with Win64 compilers, as well
 as assemblers, but it might change in the future.

 To build for Win64/x64:

 > perl Configure VC-WIN64A
 > ms\do_win64a
 > nmake -f ms\ntdll.mak
 > cd out32dll
 > ..\ms\test
>>>

So, I downloaded and installed ActivePerl and installed the Windows SDK for Win 
7 and .NET 4. I had to play with the Windows PATH environment variable a bit to 
get things to work.

The "Configure" command seems to work.
The ms\do_win64a has a problem on one line:
  >> C:\Installers\openssl-1.0.1g>ml64 -c -Foms\uptable.obj ms\uptable.asm
  >> 'ml64' is not recognized as an internal or external command,
  >> operable program or batch file.

...but I threw caution to the wind and tried to proceed anyhow.

The nmake command is where I crash and burn. It seems to get most of the way 
through, then chokes out with this error message:
  >> NMAKE : fatal error U1077: '"C:\Program Files (x86)\Microsoft Visual 
Studio 10.0
  >> \VC\bin\cl.EXE"' : return code '0xc135'

...in researching this, it sounds like I need to run devenv.exe to work within 
the VS environment and then execute the cl command. However, having only 
installed the runtime libraries for VS9 and VS10, I don't have a devenv.exe to 
run.

If I change to the 32bit installation from its instruction file, the nmake 
command still fails with this same error.

Could this still be a path problem? Or???
Thanks.

==
Aaron Bahmer
Director, Instructional Technology
Eastern Wyoming College
http://ewc.wy.edu | (307) 532-8284
1-866-327-8996 (1-866-EAST WYO) x8284
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


CRYPTO_set_mem_functions() Doesn't Work in Version 1.0.1b

2013-10-04 Thread Aaron
It looks like CRYPTO_set_mem_functions() of OpenSSL 1.0.1e-4.fc18 does not
work: CRYPTO_set_mem_functions() calls indirectly CRYPTO_malloc() which sets
"allow_customize = 0;" and so CRYPTO_set_mem_functions() does nothing (just
return 0, instead of 1).

Gdb trace with a modified _ssl module:

#0  0x003803463100 in CRYPTO_malloc () from /lib64/libcrypto.so.10
#1  0x003803542fae in FIPS_drbg_new () from /lib64/libcrypto.so.10
#2  0x0038035448e1 in FIPS_drbg_health_check () from
/lib64/libcrypto.so.10
#3  0x003803542e88 in FIPS_drbg_init () from /lib64/libcrypto.so.10
#4  0x0038034cf9d1 in RAND_init_fips () from /lib64/libcrypto.so.10
#5  0x003803465764 in OPENSSL_init_library () from
/lib64/libcrypto.so.10
#6  0x003803462c61 in CRYPTO_set_mem_functions () from
/lib64/libcrypto.so.10
#7  0x7135bc6c in PyInit__ssl () at
/home/haypo/prog/python/default/Modules/_ssl.c:

Anyone have encountered the same issue? Will this be fixed?

Thanks a lot,
Aaron   



--
View this message in context: 
http://openssl.6102.n7.nabble.com/CRYPTO-set-mem-functions-Doesn-t-Work-in-Version-1-0-1b-tp46745.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Re: KDF algorithms

2013-07-05 Thread Aaron
Thanks so much for answering my question, Matthew. 



--
View this message in context: 
http://openssl.6102.n7.nabble.com/KDF-algorithms-tp45762p45779.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


KDF algorithms

2013-07-03 Thread Aaron
Hi All,

I am working on a product using Certicom KDF function. In fact, we 
use  HU_KDF_IEEE_KDF1_SHA1 and HU_KDF_ANSI_SHA256 only.

The function hu_KDFDerive() has an argument specifying which KDF 
algorithm to use to compute a cryptographic key. This is referred to 
as a key derivation algorithm ID. The following constants are defined 
in hukdf.h:
• HU_KDF_IEEE_KDF1_SHA1 (IEEE 1363-2000 KDF1 based on SHA-1)
• HU_KDF_ANSI_SHA1 (ANSI X9.42/X9.63 KDF based on SHA-1)
• HU_KDF_ANSI_SHA224 (ANSI X9.42/X9.63 KDF based on SHA-224)
• HU_KDF_ANSI_SHA256 (ANSI X9.42/X9.63 KDF based on SHA-256)
• HU_KDF_ANSI_SHA384 (ANSI X9.42/X9.63 KDF based on SHA-384)
• HU_KDF_ANSI_SHA512 (ANSI X9.42/X9.63 KDF based on SHA-512)
• HU_KDF_NIST_ALT1_SHA1 (SP 800-56A)
• HU_KDF_NIST_ALT1_SHA224 (SP 800-56A)
• HU_KDF_NIST_ALT1_SHA256 (SP 800-56A)
• HU_KDF_NIST_ALT1_SHA384 (SP 800-56A)
• HU_KDF_NIST_ALT1_SHA512 (SP 800-56A)

Now my company is going to use OpenSSL instead. I checked OpenSSL 
and it seems to me that OpenSSL doesn't support these KDF algorithms. 

My question is - is there any way to implement these algorithms in OpenSSL?

Thanks so much in advance,
Aaron



--
View this message in context: 
http://openssl.6102.n7.nabble.com/KDF-algorithms-tp45762.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Re: nonblocking implementation question

2009-05-28 Thread Aaron Wiebe
On Thu, May 28, 2009 at 3:32 PM, Victor Duchovni
 wrote:
> NO! You call
>
>        n = SSL_write(myssl, buffer, len);
>        err = SSL_get_error(myssl, n);
>
> "err" may be SSL_ERROR_WANT_READ or SSL_ERROR_WANT_WRITE, in which case
> you must retry the write again later, after there is room.
>
> On success (n>=0), or with WANT_READ/WANT_WRITE, arrange to move data from
> the network bio to the peer and from the peer to the network bio. This
> activity may be asynchronous if you are using non-blocking sockets with
> select/epoll/... in an event loop. In that case you mark the socket for
> read/write interest with appropriate callbacks.

So, in the case of WANT_READ or WANT_WRITE, I interact with the
network BIO through BIO_read and BIO_write, and recv()'d data gets
dumped into the BIO via BIO_write() and data to be sent should be
retrieved via BIO_read()?

In the case I get an epoll-triggered recv() from the socket, do I dump
that data into the BIO via BIO_write, and follow that with a
SSL_read()?

Once this is all over, I'll write a little piece of example code that
could be thrown into a document somewhere - I would be surprised if
this wasn't a common bit of misunderstanding for developers.

-Aaron
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Re: nonblocking implementation question

2009-05-28 Thread Aaron Wiebe
On Tue, May 26, 2009 at 5:27 PM, Victor Duchovni
 wrote:
> On Tue, May 26, 2009 at 05:02:59PM -0400, Aaron Wiebe wrote:
>
>> >> You're looking for a BIO_s_mem.
>> >
>> > No, he is looking for BIO_new_bio_pair(3) and SSL_set_bio(3).

So, apologies for hammering this down, but I'm still a little fuzzy
and the documentation is lacking..

This would be in theory how to perform this work:

ctx = SSL_ctx_new();
myssl = SSL_new(ctx);
BIO_new_bio_pair(app_bio, 0, net_bio, 0);
SSL_set_bio(myssl, app_bio, app_bio);

Now, for a write sequence...

BIO_write(app_bio, buffer, len);   /* unencrypted */
BIO_read(net_bio, buf, size);  /* encrypted */
write(fd, buf, size);

and the same in reverse:

len = recv(fd, &buf, size);
BIO_write(net_bio, buf, len);
len = BIO_read(app_bio, buffer, size);


This is ignoring the obvious semantics involved in various other types
of situations, such as renegotiations or other state changes that
might be involved.  Am i on the right track?  If this makes my BIO
calls asynchronous, is the expectation that the other side of the BIO
pair will be ready immediately, assuming a clean response?

Thanks again all,
-Aaron
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Re: nonblocking implementation question

2009-05-26 Thread Aaron Wiebe
On Tue, May 26, 2009 at 4:46 PM, Victor Duchovni
 wrote:
> On Tue, May 26, 2009 at 01:13:33PM -0700, Kyle Hamilton wrote:
>
>> You're looking for a BIO_s_mem.
>
> No, he is looking for BIO_new_bio_pair(3) and SSL_set_bio(3).

And this is where I'm running into confusing bits of information.
Bluntly, the documentation that I can find is nearly useless.

Let me put it this way, in pseudocode of how I would like to interact
in my perfect world:

readfunc(int fd)
{
/* entry on a "can read" event from the select/poll/etc call */
len = recv(fd, &buffer, sizeof(buffer));
if(IsSSL(fd)) {
   if(have_crypted_buffer_already)
 merge_buffer(buffer, encrypted_buffer);
   switch(SSL_decrypt(context, buffer, &decr_buf, &dlen)) {
  case SSL_NOTENOUGHDATA:
   buffer_encrpyted_read(fd,
buffer, len);
  case SSL_GOTDATA:
   buffer_decrypted(fd, decr_buf, dlen);
   if(dlen != len)

buffer_encrypted_read(fd, buffer+dlen, len-dlen);
  case SSL_NEEDRENEG:
   enqueue(fd,
get_ssl_reneg_data(context));
   default:
   break;
}
}
}
(or something..)

Basically, I don't really want any calls to require more than a
context that needs to be maintained - I don't want to hand my data off
to the API and have to come back to it at some arbitrary later time,
having it buffered and/or queued by mechanisms built into the openssl
api.  I expect the API to do one thing and one thing only:  provide me
the necessary information to handle an SSL connection.  Not handle it
for me.

Not sure if I'm asking this well...

-Aaron
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


nonblocking implementation question

2009-05-26 Thread Aaron Wiebe
Greetings All,

I've gone through various levels of documentation to see if there is a
method available to implement SSL as I have envisioned, but I haven't
been able to find what I'm looking for.  Perhaps someone here could
point me in a good direction...

I'm developing a nonblocking application (backed by several
edge-trigger methods, such as epoll/kqueue/etc).  I'd like to
integrate SSL into the flow, but I'm not fond of pushing the buffering
and socket interaction routines into the SSL library.  What I would
prefer to do is to perform callouts to the ssl library, while
maintaining the buffering and socket handling within my application.

Ideally, I'd like to perform the recv() calls, buffer the data myself,
and pass it to a function that would be capable of decrypting the data
(if a complete encryption block is received) - and provide me
appropriate returns to let me know if additional steps are required
(such as a renegotiation).  I'd also prefer to be able to encrypt the
data through a function call, and be able to buffer and deliver that
data at my leisure.

In short, I don't really want SSL doing my writing or buffering.  I
just want the library to do my negotiation and encryption - but by
providing me the data I need rather than by writing to the socket.

Does the ability to do this exist?  I'm not too fond of fully
reverse-engineering SSL itself and using the pure encryption calls, so
I'm hoping there exists API's that will let me take this route.  If
anyone knows of an implementation out there like this, I'd love to see
it.

Thanks!
-Aaron
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


openssl-0.9.8k.tar.gz

2009-04-13 Thread Chuck Aaron
I have saved this file off the openssl site to my documents. I am trying 
to copy the *.gz file with
secure fx from my documents and the Alpha server using vms 8.3 and it 
will not allow me to

transfer the file. Any ideas on how I get it there to unzip it?

Thanks,
Chuck
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


test

2009-04-13 Thread Chuck Aaron


__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


SSL and LDAP

2008-04-25 Thread aaron . angel




Greetings...

We are trying to sync up the SSL and LDAP configurations and we
are
  having problems with the SSL certificates allowing Access when LDAP
has Locked the Account.
  Do you have any suggestions ?


Thanks
Aaron Angel
--
"NOTICE:  The information contained in this electronic mail transmission is
intended by Convergys Corporation for the use of the named individual or
entity to which it is directed and may contain information that is
privileged or otherwise confidential.  If you have received this electronic
mail transmission in error, please delete it from your system without
copying or forwarding it, and notify the sender of the error by reply email
or by telephone (collect), so that the sender's address records can be
corrected."
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Openssl

2008-04-18 Thread Chuck Aaron

What is the command please to view the entire contents of a certificate?

Thank you,
Chuck

Kyle Hamilton wrote:

ergh.  My apologies for not catching that.  You're right, it shouldn't
matter on the client side.

Okay...  going back to basics (I'm sorry if this seems a bit
patronizing, I honestly don't intend it to be such), a segfault occurs
on a pointer dereference, trying to gain access to memory which is
invalid (i.e., the pointer's pointing somewhere it shouldn't).  This
means that one of your pointers has either been changed in the
structure, or the memory that the pointer refers to has been
deallocated (and is thus invalid).  OpenSSL is just trying to use
what's being provided to it, and blindly assuming that what's provided
is appropriate and won't get it into trouble.

Do you have the registers available from the core?  If %ecx is
0x, you've isolated your problem (something has called
ssl_cleanup on the SSL* structure you're using, OR you're passing a
NULL pointer to read into -- I'm not sure which argument is being
dereferenced there, but since it looks like 32 bytes I'm conjecturing
that it's the SSL* structure).  If it's not, you have to take a more
global view to the debugging.

Since your server is multithreaded, the way that this generally
happens is through concurrency issues.  (My guess would be that a
separate thread is doing cleanup on a live connection.)  Have you
given OpenSSL the locking functions that it needs in a multithreaded
environment?

Are you properly locking the session (NOT the SSL* structure, but the
application session in your code which contains or references the SSL*
structure) before you try to read from it?  Are you sure that the
session is valid before you start the thread to handle it?  Is there a
catch-up in the thread which, after being spawned, will take a lock
against the session and examine it to ensure that it's still valid
before trying to handle it, handle it, and then unlock it enough for
other handlers to appropriate as necessary?

Generally speaking, OpenSSL will not cause a SIGSEGV if it's passed
valid data and valid pointers.  If it's been given the proper locking
methods, it will prevent itself from capriciously changing SSL*
structure states while another OpenSSL thread is working with them.

-Kyle H

On Fri, Apr 18, 2008 at 5:44 AM, Ion Scerbatiuc <[EMAIL PROTECTED]> wrote:

I'm not creating any MFC applications on linux. the client is for Windows
platform, but as I said I don't think the client matters. I also wrote some
client emulation on linux that emulates the behavior of the MFC clients  and
the server still crashes.


__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


RE: SSL Library Error

2007-09-12 Thread Aaron Smith
The system is 11.11.  I'm *pretty* sure everything has been compiled
with gcc.  I'm compiling apache with gcc, but OpenLDAP and Openssl might
have been compiled with something different. The apache install that
works was definitely also compiled with gcc and uses the same install of
OpenSSL and OpenLDAP.  There is no lsof on this system, but I might be
able to track down a copy.



-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Marek Marcola
Sent: Wednesday, September 12, 2007 11:43 AM
To: openssl-users@openssl.org
Subject: RE: SSL Library Error

Hello,
I've missed that this is on hpux11.
Very important is what version you have: hpux1100, hpux,
hpux1123ia, hpux1123pa, hpux1131ia or hpux1131pa ?

> I added --with-ssl=/usr/local to the the configure options and
> recompiled.  Although mod_ldap is still unhappy, that corrects the
> unresolved symbol error if I launch apache without mod_ldap.  However,
> the result is the same problem I've been wrestling with.  Piling up
> child processes in a "waiting..." state.  This installation has no
> mention in the ldd output of links to the 0.9.8 so it should be, as
far
> as I can tell, using ONLY the 0.9.7 system, OS installed Openssl
> libraries.
Check that all software is compiled with gcc or with HP compiler.
If some part (like Apache) is compiled with HP compiler and other
(like OpenSSL) with gcc then OpenSSL requires libgcc but Apache
has no link to this library because libgcc is not used by HP compiler.
On hpux1100 there is no standard OpenSSL library (and not OpenSSL
headers). If you have your Apapche running you may check with
lsof what shared libraries are used by apache and from what directories.
I think you should be able to perform clean rebuild of Apache and
current OpenSSL.
Depending on hpux you have, to be sure, you may temporary rename link
/usr/include/openssl (which sometime points
to /opt/openssl/include/openssl and sometimes is directory) when
you compile your applications to be sure that header files are
from your specified locations

If Aapache is running try to connect with 'openssl s_client'
with specified protocols (-ssl2, -ssl3 -tls1).

Best regards,
-- 
Marek Marcola <[EMAIL PROTECTED]>

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


RE: SSL Library Error

2007-09-12 Thread Aaron Smith
I added --with-ssl=/usr/local to the the configure options and
recompiled.  Although mod_ldap is still unhappy, that corrects the
unresolved symbol error if I launch apache without mod_ldap.  However,
the result is the same problem I've been wrestling with.  Piling up
child processes in a "waiting..." state.  This installation has no
mention in the ldd output of links to the 0.9.8 so it should be, as far
as I can tell, using ONLY the 0.9.7 system, OS installed Openssl
libraries.

Aaron

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Marek Marcola
Sent: Wednesday, September 12, 2007 9:41 AM
To: openssl-users@openssl.org
Subject: RE: SSL Library Error

Hello,
> Well, I recompiled AGAIN with no mention of the 0.9.8 library in any
of
> my environment variables.  The resulting httpd binary showed no links
to
> the 0.9.8 libraries, just 0.9.7 (the system OS libraries).  THIS one
> won't even start.  I get an error of:
> 
> /usr/lib/dld.sl: Unresolved symbol: __umoddi3 (code)  from
> /usr/local/lib/libcrypto.sl
This symbol is in libgcc. Depending on gcc compilation, libgcc may be
static or dynamic (or both). In this case it looks like main program
is linked static (or not) with libgcc and when loading libcrypto.sl
there is no link to this library.
You may need to add this dynamic library to httpd recompilation
(or rename temporary static version of libgcc).

Best regards,
-- 
Marek Marcola <[EMAIL PROTECTED]>

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


RE: SSL Library Error

2007-09-12 Thread Aaron Smith
Well, I recompiled AGAIN with no mention of the 0.9.8 library in any of
my environment variables.  The resulting httpd binary showed no links to
the 0.9.8 libraries, just 0.9.7 (the system OS libraries).  THIS one
won't even start.  I get an error of:

/usr/lib/dld.sl: Unresolved symbol: __umoddi3 (code)  from
/usr/local/lib/libcrypto.sl

Not to mention that in order to get THAT far, I have to comment out the
loading of the mod_ldap because it throws a much more vague "Unresolved
External" error when it tries to load.

This system is cursedCURSED I SAY!

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Victor Duchovni
Sent: Tuesday, September 11, 2007 4:12 PM
To: openssl-users@openssl.org
Subject: Re: SSL Library Error

On Tue, Sep 11, 2007 at 03:34:13PM -0400, Aaron Smith wrote:

> Looking at the output of LDD closer, it looks like the httpd binary is
> linked to both libraries.  BUT, I don't think this is the cause of the
> problem as the httpd binary that DOES work is ALSO linked this way

Being linked to both libraries is a problem, but even more so if the
first library that is loaded does not match the compile-time headers.

First escape DLL-hell, then debug other issues. If your LDAP library
depends on OpenSSL 0.9.7, you need to link Apache also with 0.9.7.

Mixing 0.9.7 and 0.9.8 in the same binary leads to unspecified
behaviour.

-- 
Viktor.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


RE: SSL Library Error

2007-09-11 Thread Aaron Smith
I'll see if I can figure out what's causing apache to link to 0.9.7.  As
far as I know, I've got all my environment variables set to look at the
0.9.8 libraries.  It seems odd that the original compile would work
though.


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Victor Duchovni
Sent: Tuesday, September 11, 2007 4:12 PM
To: openssl-users@openssl.org
Subject: Re: SSL Library Error

On Tue, Sep 11, 2007 at 03:34:13PM -0400, Aaron Smith wrote:

> Looking at the output of LDD closer, it looks like the httpd binary is
> linked to both libraries.  BUT, I don't think this is the cause of the
> problem as the httpd binary that DOES work is ALSO linked this way

Being linked to both libraries is a problem, but even more so if the
first library that is loaded does not match the compile-time headers.

First escape DLL-hell, then debug other issues. If your LDAP library
depends on OpenSSL 0.9.7, you need to link Apache also with 0.9.7.

Mixing 0.9.7 and 0.9.8 in the same binary leads to unspecified
behaviour.

-- 
Viktor.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


RE: SSL Library Error

2007-09-11 Thread Aaron Smith


Looking at the output of LDD closer, it looks like the httpd binary is
linked to both libraries.  BUT, I don't think this is the cause of the
problem as the httpd binary that DOES work is ALSO linked this way

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Victor Duchovni
Sent: Tuesday, September 11, 2007 1:57 PM
To: openssl-users@openssl.org
Subject: Re: SSL Library Error

On Tue, Sep 11, 2007 at 01:43:50PM -0400, Aaron Smith wrote:

> I apologize in advance if this is not the correct forum for this
> question.  I haven't had much luck in the apache forums.   I have an
> apache 2.0.55 installation that I'm attempting to recompile on an
HP-UX
> 11 system.  It has mod_ssl 2.0.66 and I have OpenSSL 0.9.8d installed
in
> /opt/openssl098d. The system itself apparently has an older version of
> OpenSSL (0.9.7e) installed in /usr/local.  We have apache running on
> this system just fine, but I have to recompile in order to add LDAP
> support.  If I take a fresh tarball of apache-2.0.55 and do a
configure,
> make, make install, everything completes without error.  Doing an LDD
of
> the httpd binary shows it linked to the OpenSSL 0.9.8d libraries in
> /opt/openssl098d/lib.  The server starts up without issue, but when I
> connect (with apache in debug mode), I get this:

Perhaps you are using headers from one version of OpenSSL and linking
with libraries from another. Make sure compile-time and run-time
versions match.

-- 
Viktor.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


SSL Library Error

2007-09-11 Thread Aaron Smith
I apologize in advance if this is not the correct forum for this
question.  I haven't had much luck in the apache forums.   I have an
apache 2.0.55 installation that I'm attempting to recompile on an HP-UX
11 system.  It has mod_ssl 2.0.66 and I have OpenSSL 0.9.8d installed in
/opt/openssl098d. The system itself apparently has an older version of
OpenSSL (0.9.7e) installed in /usr/local.  We have apache running on
this system just fine, but I have to recompile in order to add LDAP
support.  If I take a fresh tarball of apache-2.0.55 and do a configure,
make, make install, everything completes without error.  Doing an LDD of
the httpd binary shows it linked to the OpenSSL 0.9.8d libraries in
/opt/openssl098d/lib.  The server starts up without issue, but when I
connect (with apache in debug mode), I get this:

 

 

[Tue Sep 11 10:10:43 2007] [info] Connection to child 2 established
(server ourserver.name.scrubbed:8040, client )

[Tue Sep 11 10:10:43 2007] [info] Seeding PRNG with 136 bytes of entropy

[Tue Sep 11 10:10:43 2007] [debug] ssl_engine_io.c(1512): OpenSSL: read
11/11 bytes from BIO#401a3500 [mem: 401aabb0] (BIO dump fo

llows)

[Tue Sep 11 10:10:43 2007] [debug] ssl_engine_io.c(1459):
+---

--+

[Tue Sep 11 10:10:43 2007] [debug] ssl_engine_io.c(1484): | : 80 67
01 03 01 00 4e 00-00 00 10 .gN

  |

[Tue Sep 11 10:10:43 2007] [debug] ssl_engine_io.c(1490):
+---

--+

[Tue Sep 11 10:10:43 2007] [info] SSL library error 1 in handshake
(server ourserver.name.scrubbed:8040, client )

[Tue Sep 11 10:10:43 2007] [info] SSL Library Error: 336027900
error:140760FC:SSL routines:SSL23_GET_CLIENT_HELLO:unknown protocol

 speaking not SSL to HTTPS port!?

[Tue Sep 11 10:10:43 2007] [info] Connection to child 2 closed with
abortive shutdown(server ourserver.name.scrubbed:8040, )

 

 

That's if mod_ssl is compiled as a shared module.  If I compile it into
the httpd binary statically, then each request results in a child
process spawning and sitting in the "Waiting" mode.  The pile up and
pile up until they eventually drive the server load up to really high
levels.

 

One oddity I notice is that even though I set every environment variable
I know of (SHLIB_PATH, LD_LIBRARY_PATH, CPPFLAGS, LDFLAGS) to point to
/opt/openssl098d/lib, the apache server-status lists OpenSSL 0.9.7e (the
local system install).  The other thing is that a few months ago, I was
working on the same issue and manage to compile a version of apache in a
parallel directory using the same configure commands (I believe) as now,
and that install works perfectly!!  I'm thinking it's something strange
with my current build environment but am uncertain where else to look.
Where could apache be picking up that other SSL library?

 

 



Custom oid in openssl.cnf

2007-06-12 Thread Aaron Barnes
A quick question for everyone...

In the openssl.cnf, by default there is a new_oids section with a
testoid line to serve as an example.  So if I have a unique assigned
oid, can I just remove the # on the testoid1 line?  I recall reading
someone mentioning using a line of dc=(oid number) instead.  Which one
is correct?


Re: Recall: do_cipher function

2007-05-01 Thread Aaron Turner

Recalling emails doesn't work on the internet.

On 5/1/07, Bhat, Jayalakshmi Manjunath <[EMAIL PROTECTED]> wrote:

Bhat, Jayalakshmi Manjunath would like to recall the message, "do_cipher 
function".
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]




--
Aaron Turner
http://synfin.net/
http://tcpreplay.synfin.net/ - Pcap editing & replay tools for Unix
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: openssl tool vs. EVP API missmatch for desx & des-ede3-cbc

2007-04-30 Thread Aaron Turner

crap... hit send not save...  rest of the email is below

On 4/30/07, Aaron Turner <[EMAIL PROTECTED]> wrote:

I'm having a problem under OS X (10.4.9/Intel) where Openssl 0.9.8e
(compiled from source) is returning different encrypted values using
the cli (openssl enc) and the EVP interface for desx and des-ede3-cbc.


echo -n "Why doesn't this work?" | openssl enc -iv 0B0B0B0B0B0B0B0B  -K \
0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A0A -des-ede3-cbc -a
cUT/lE4Zmui1FCqVUAosCd1nmwQ1gNd1

but using the EVP API I get:

NDHoSSaYJvwx09SoYm87iZmDbcU6Ew==

openssl enc for desx using same parameters as above:

1qLukPtJ6f4p4KsulWiJDomyVA67zkX2


EVP API for desx:

cUT/lE4Zmui1FCqVUAosCd1nmwQ1gNd1

Notice that the EVP desx == openssl enc for des-ede3-cbc!

I've tested the results for all the other DES modes as well as AES,
Rc2,4,5, Blowfish, and Cast5 and they all match as I would expect, so
it doesn't seem to be an issue with how I'm using the EVP API.
Suggestions?

--
Aaron Turner
http://synfin.net/
http://tcpreplay.synfin.net/ - Pcap editing & replay tools for Unix
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


openssl tool vs. EVP API missmatch for desx & des-ede3-cbc

2007-04-30 Thread Aaron Turner

I'm having a problem under OS X (10.4.9/Intel) where Openssl 0.9.8e
(compiled from source) is returning different encrypted values using
the cli (openssl enc) and the EVP interface for desx and des-ede3-cbc.



--
Aaron Turner
http://synfin.net/
http://tcpreplay.synfin.net/ - Pcap editing & replay tools for Unix
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Openssl root and subordinate, CA creation problem

2007-02-14 Thread Aaron Barnes
I've setup an openssl root and a subordinate CA.  I have successfully
signed CA certificate for the subordinate from the root (used the
-newreq option), however when I execute the 'ca.pl -newca' it doesn't
set up the subordinate authority at all.  When it asks for the CA
certificate filename, I point it to the signed certificate but it
immediately terminates after that not giving any errors.  I could just
hit enter but then that would make the subordinate think it needs to
self-sign its certificates.

Do I have my steps mixed up?


Newca error, -create_serial

2007-02-05 Thread Aaron Barnes
 
Let me preface first by saying I did see some previous users had this
problem also.  I've even gone so far as to completely wipe the system
and start fresh only to have the same issue.

Running a FreeBSD 6.2 server with OpenSSL 0.9.8d.  After I do the
installation, I execute the CA.pl -newca option.  After I enter the
information, it gives me the "unknown option -create_serial" error.

I'm using the root account on this machine to keep it simple, which
defaults to csh.  By default the openssl installation has placed it in
the /usr/local/ssl directory, so I added /usr/local/ssl/misc to the PATH
in .cshrc and still receive the same error.

Any suggestions?
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


RE: OpenSSL with Windows subordinates

2006-12-29 Thread Aaron Barnes
Wonderful!
I redid the root CA setup using ca.pl, modified the openssl.cnf file to
CA:TRUE in the v3_ca section, and signed the subordinate request using
the previous command:
(ca -config /path/openssl.cnf -out thecertificate.pem -in
requestfile.req -extensions v3_ca).  I imported the the pem file for the
subordinate, and also the root cert, and the Windows services started up
just fine.  
I was also able to verify its functionality by requesting some user
certs from it.

Is there much difference between signing with the openssl command above
and the ca.pl perl script?  It seems to me it is mainly helpful for
automating the process.

One last question if you don't mind.  I noticed the keysize for my
subordinate is 1024 bits.  Where can I indicate the keysize when signing
the request?  In the openssl.cnf file I used, I have 4096 listed in the
req section, but does this need to be placed elsewhere?  It didn't work
when I placed it in the v3_ca section.

Thanks,
Aaron
 

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Dr. Stephen Henson
Sent: Thursday, December 28, 2006 15:47
To: openssl-users@openssl.org
Subject: Re: OpenSSL with Windows subordinates



Yes the root CA has basicConstraints CA:FALSE on it which is causing the
error.

I'd suggest you redo the root CA and the subordinate using CA.pl: CA.sh
is an older script that isn't maintained any more.

The command CA.pl -signCA automatically signs a request as a CA instead
of an end entity cert.

Steve.
--
Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage OpenSSL
project core developer and freelance consultant.
Funding needed! Details on homepage.
Homepage: http://www.drh-consultancy.demon.co.uk
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


RE: OpenSSL with Windows subordinates

2006-12-28 Thread Aaron Barnes
I think I see what you're getting at now.  I reviewed the text of the
root and the subordinate certs;  the root does NOT have the CA:TRUE
(false obviously), the subordinate does have CA:TRUE.   So I guess this
tells me I must have installed the root CA incorrectly.

I didn't use CA.pl, but rather CA.sh.  I'll list each step I did to set
up OpenSSL and the root.

1. ./config
2. make
3. make test
4. make install
5.  ./CA.sh -newca
6.  ./CA.sh -sign

It sounds like I'll probably need to redo the root setup, but let me
know if there is an adjustment I need to make based on how many tiers I
want to set up in the overall PKI.
I'll also email you copies of the certificates separately.
Aaron


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Dr. Stephen Henson
Sent: Thursday, December 28, 2006 12:34
To: openssl-users@openssl.org
Subject: Re: OpenSSL with Windows subordinates


If you used the CA.pl script to generate the certificates it should just
"do the right thing". The standard openssl.cnf has some sensible
defaults which should suit most purposes.

That includes using basicConstraints for a CA certificate.

If you've used other commands (all manner of weird stuff is recommended
by some cookbooks) then the certificates may not suit your purpose.

If you do:

openssl x509 -in cert.pem -text -noout

you should see the basicConstraints extension. It must have CA:TRUE for
both the root CA and the subordinate. If that doesn't help just post (or
mail me
privately) with the two certificates you have created.

Steve.
--
Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage OpenSSL
project core developer and freelance consultant.
Funding needed! Details on homepage.
Homepage: http://www.drh-consultancy.demon.co.uk
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


RE: OpenSSL with Windows subordinates

2006-12-28 Thread Aaron Barnes
Yes I did.  I had to install that yesterday also in order for the
subordinate to trust the root.

I was reading on the web site (specifically on this web page:
http://www.openssl.org/docs/apps/x509v3_config.html# )  It would seem to
indicate one should modify the basicConstraints lines in the openssl.cnf
file, but again I am not terribly familiar with this option.  The only
things I have modified in my openssl.cnf file so far are the lines to
include email address, location, directory structure , changed policy
fields to optional, and the key size.  

If I am understanding this correctly, the OpenSSL root issued the
certificate as a simple 'machine' cert, not as a subordinate CA.  Am I
on the right track?  

Aaron

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Dr. Stephen Henson
Sent: Thursday, December 28, 2006 11:55
To: openssl-users@openssl.org
Subject: Re: OpenSSL with Windows subordinates

On Thu, Dec 28, 2006, Aaron Barnes wrote:

> I think we're making some progress with resolving this problem.   I
> signed a new request with the switch you mentioned and loaded it onto 
> the subordinate.  I don't receive the old ASN1 error, which is good, 
> but now I've received one I've never seen before, "A certificate's 
> basic constraint extension has not been observed."  Does this mean I 
> may have something configured incorrectly in the openssl.cnf file?
> 

Did you install a root CA onto that system too? If so that might be a
problem depending on how you created it.

Steve.
--
Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage OpenSSL
project core developer and freelance consultant.
Funding needed! Details on homepage.
Homepage: http://www.drh-consultancy.demon.co.uk
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


RE: OpenSSL with Windows subordinates

2006-12-28 Thread Aaron Barnes
I think we're making some progress with resolving this problem.   I
signed a new request with the switch you mentioned and loaded it onto
the subordinate.  I don't receive the old ASN1 error, which is good, but
now I've received one I've never seen before, "A certificate's basic
constraint extension has not been observed."  Does this mean I may have
something configured incorrectly in the openssl.cnf file?  

One bit of good news though is that I no longer have to export the
certificate into .der format;  the .pem file worked just fine.

Aaron




-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Dr. Stephen Henson
Sent: Wednesday, December 27, 2006 15:04
To: openssl-users@openssl.org
Subject: Re: OpenSSL with Windows subordinates

> 

Yes the signing command is incorrect. By default the certificate is an
end entity certificate for OpenSSL not a CA certificate.

Try the command line switch: -extensions v3_ca 

Steve.
--
Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage OpenSSL
project core developer and freelance consultant.
Funding needed! Details on homepage.
Homepage: http://www.drh-consultancy.demon.co.uk
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


RE: OpenSSL with Windows subordinates

2006-12-27 Thread Aaron Barnes
With Windows certificate services, upon installation it will ask you to
select the type of CA the server is to become from 4 different options.
I've chosen an enterprise online CA, however its parent is offline, so
of course I cannot make an online certificate request.  I saved the
actual certificate request as a .der file (Windows defaults to .req I
believe) and copied to the OpenSSL parent box.

Perhaps my signing command was in error.  I used "ca -config
/pathtoconfigfile/openssl.cnf -out thecertificate.pem -in
windowsrequestfile.der".

When installing the subordinate's certificate, it does not like .pem
files...which doesn't really surprise me.  The available options are
.cer, .crt, .p12, .pfx and .p7b.  I was using pkcs12 as it indicated
there was an available export option for that command.  When I tried to
use the .pem file it would give me the error "The certificate is not a
CA certificate".  

I also executed the command you suggested and tried installing the .der
file; it gives the same error.

Regards,
Aaron
 

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Dr. Stephen Henson
Sent: Wednesday, December 27, 2006 11:24
To: openssl-users@openssl.org
Subject: Re: OpenSSL with Windows subordinates


The private key resides on the Windows machine and doesn't leave it
which is as it should be. A PKCS#12 file is only really used when the
private key and matching certificate are present.

You really need to just install the certificate and have Windows
associate the key with it.

How you do that depends on exactly what you did in Step #1. You may be
able to just install the newcert.pem file or you can convert it to DER
using:

openssl x509 -in newcert.pem -outform DER -out newcert.der

Steve.
--
Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage OpenSSL
project core developer and freelance consultant.
Funding needed! Details on homepage.
Homepage: http://www.drh-consultancy.demon.co.uk
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


OpenSSL with Windows subordinates

2006-12-27 Thread Aaron Barnes
I have an OpenSSL CA running on a BSD 6.1 machine as the root, and am 
trying to have that act as the parent to subordinate Windows online 
enterprise CAs. 


The installation went fine. I signed the Windows subordinate CA cert 
request with SSL, then converted it to pkcs12 to be installed. That's 
where I get the problem. When I try to installed the pkcs12 cert on the 
Windows machine, it doesn't like it, giving me an "ASN1 unexpected end 
of data". 


I suspect that possibly it is because it isn't seeing the private key 
when OpenSSL converts to pkcs12. I was actually only able to get the 
.pem -> .p12 conversion to work by using the -nokeys option. 


So let me walk you through each step. 


1. Received Windows CA generated request file (.der). 
2. Signed it using "ca -config blahblah/openssl.cnf -in 
windowsreqfile.der -out newcert.pem" 
3. Converted it using "pkcs12 -export -in newcert.pem -out 
newercert.p12 -nokeys" 


So as I said I could only get the conversion command to work using the 
nokeys option. If I didn't, it would error out on me saying "unable to 
load private key". This tells me I may have missed a step in the 
signing process, but I'm unsure what exactly. Do I need to execute 
another command after step 2 to output a separate private key file? 
Shouldn't the private key be included in the .pem file in step 2? 


RE: Wierd Linking issue with 0.9.8d

2006-12-21 Thread Aaron Smith
Ah!  Excellent!  That did indeed correct that annoying error.  Thank
you.


Aaron Smith[EMAIL PROTECTED]
System Administrator   (269) 337-7496
Kalamazoo College
 

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Marek Marcola
Sent: Thursday, December 21, 2006 10:36 AM
To: openssl-users@openssl.org
Subject: Re: Wierd Linking issue with 0.9.8d

Hello,
> So I downloaded a copy of OpenSSL 0.9.8d to my HP-UX
> system, did a ./config -prefix=/opt/openssl098d shared, make, make
> test, make install and all worked well.  However, I've run into a
> problem while compiling other pieces of software that use OpenSSL
> (such as Apache's mod_auth_ldap module) where it's trying to find
> "./libcrypto.sl.0.9.8".  Yes, there's a "../" on there.  If I run ldd
> on libssl.sl.0.9.8, it shows:
> 
>  
> 
> # /usr/ccs/bin/ldd libssl.sl.0.9.89
> 
> /usr/lib/libdld.2 =>/usr/lib/libdld.2
> 
> /usr/lib/libc.2 =>  /usr/lib/libc.2
> 
> /usr/lib/libdld.2 =>/usr/lib/libdld.2
> 
> ../libcrypto.sl.0.9.8 => ../libcrypto.sl.0.9.8
> 
> /usr/lib/libdld.2 =>/usr/lib/libdld.2
> 
>  
> 
> I can get things to compile by copying that libcrypto library into
> whatever local directory it happens to be trying to compile in, but
> that's a dirty hack and I suspect that this is the cause of me not
> being able to run those resultant binaries (they throw errors about
> unresolved symbols like ap_set_flag_slot and apr_pool_cleanup_null).
>  What did I do wrong with the install here to cause this to happen?
Nothing, sometimes on hpux this works this way.
To change this you may after "make install" change definition
of SHLIBDEPS variable in main Makefile in line:

$(MAKE) SHLIBDIRS=ssl SHLIBDEPS='-lcrypto' build-shared; \

to:

SHLIBDEPS='/opt/openssl098d/lib/libcrypto.sl.0.9.8'

and next:

# ldd libssl.sl.0.9.8
# rm libssl.sl.0.9.8
# make libssl.sl.0.9.8
# ldd libssl.sl.0.9.8
# cp libssl.sl.0.9.8 /opt/openssl098d/lib

this will change "./" to "/opt/openssl098d/lib".

Next dirty hack.

Best regards,
-- 
Marek Marcola <[EMAIL PROTECTED]>

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Wierd Linking issue with 0.9.8d

2006-12-21 Thread Aaron Smith
So I downloaded a copy of OpenSSL 0.9.8d to my HP-UX system,
did a ./config -prefix=/opt/openssl098d shared, make, make test, make
install and all worked well.  However, I've run into a problem while
compiling other pieces of software that use OpenSSL (such as Apache's
mod_auth_ldap module) where it's trying to find "./libcrypto.sl.0.9.8".
Yes, there's a "./" on there.  If I run ldd on libssl.sl.0.9.8, it
shows:

 

# /usr/ccs/bin/ldd libssl.sl.0.9.89

/usr/lib/libdld.2 =>/usr/lib/libdld.2

/usr/lib/libc.2 =>  /usr/lib/libc.2

/usr/lib/libdld.2 =>/usr/lib/libdld.2

./libcrypto.sl.0.9.8 => ./libcrypto.sl.0.9.8

/usr/lib/libdld.2 =>/usr/lib/libdld.2

 

I can get things to compile by copying that libcrypto library into
whatever local directory it happens to be trying to compile in, but
that's a dirty hack and I suspect that this is the cause of me not being
able to run those resultant binaries (they throw errors about unresolved
symbols like ap_set_flag_slot and apr_pool_cleanup_null).  What did I do
wrong with the install here to cause this to happen?

 

 

----

Aaron Smith[EMAIL PROTECTED]

System Administrator   (269) 337-7496

Kalamazoo College

 

 



N00B needs csr/key help

2006-11-01 Thread Aaron Martinez
I am trying to get my copy of pure-ftpd running with a signed 
certificate and having a horrible time.


I had to send them a csr so i did the following:

openssl genrsa -des3 -out ftp.mydomain.com.key 1024

openssl req -new -key ftp.mydomain.com.key -out ftp.mydomain.com.csr

I got the key signed from godaddy (it was cheap, anyone have any ideas 
on their service?) (also they use an intermediate key, does everyone 
now? I don't even know if pureftpd can use an intermediate key) and so i 
put the necessary files on my ftp machine and fired it up.  There is a 
problem however, i see this in the log:


Oct 31 17:19:33 ftp pure-ftpd: ([EMAIL PROTECTED]) [ERROR] SSL/TLS 
[/etc/pure/private/pure-ftpd.pem]: error:0906406D:PEM 
routines:DEF_CALLBACK:problems getting password


I assume since i used des3 generating the key, that is why it's looking 
for a password.  For ssl enabled web and ftp servers is it commonplace 
to create the private key without encryption?  Does anyone have an idea 
about this error?


I was also wondering, if i were to do the same as above only include the 
--passout file:/some/directory/path/file  like such:


openssl genrsa  -passout file:/etc/pure/pasfile -des3 -out 
ftp.mydomain.com.key 1024


that generates the key just fine without me having to type in the 
password, but does the key then know to read from that file as well when 
it's being used?  If so, would that also mean that when pureftpd is 
looking for the password, the password file is hardcoded soemhow into 
the key and it would be found?  I would just try these things, but of 
course i have to go through the whole process of generating a new csr 
and getting new keys every time i do that from godaddy.


Thanks in advance.

Aaron

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


RE: Certificate Verification

2006-10-12 Thread Aaron Smith








Well, I figured out PART of my problem.  Somehow
I got the wrong CA certificate.  Once I got the right one, I can do a
successful s_client connect as long as I provide the –Cafile argument to
point openssl to the correct CA file.  However, if I try to do it without
the –Cafile argument, I get the same “unable to get local issuer”
problem.  I don’t have a cacert.pem file on the system at all (this
is a stock Solaris 10 install).  Everything openssl related appears to be
in /etc/sfw/openssl, including the openssl.cnf file.  This file has the
following default options in the [CA_default] section:

 

dir   =
/etc/sfw/openssl

certs    =
$dir/certs

certificate =
$dir/cacert.pem

 

So, I take this to mean that openssl will
look for CA certificates in /etc/sfw/openssl/cacert.pem?  I took the CA
certificate (that works) and put it in /etc/sfw/openssl with the name of
cacert.pem but it still couldn’t find it.



 











From: owner-openssl-users@openssl.org [mailto:owner-openssl-users@openssl.org] On Behalf Of Vincenzo Sciarra
Sent: Thursday, October 12, 2006
4:29 AM
To: openssl-users@openssl.org
Subject: Re: Certificate
Verification



 



Try to add the CA certificate to cacert.pem default openssl CA
certificate





 





Simply:





 





cat MScaCERT.pem >> cacert.pem
 






 





2006/10/12, Dr. Stephen Henson <[EMAIL PROTECTED]>:


On Wed, Oct 11, 2006, Aaron Smith
wrote:

>
Ok.  This is hopefully a simple question, and one that I see 
> quite a bit in the archives.  However, everything I've tried and
gleaned
> from searching the archives have come up nothing.  I
have  server
> certificate from a Microsoft Domain Controller that was created via MS's 
> certificate authority.  I'm trying to get Openssl to connect to
it, but
> I get the now familiar "unable to get local issuer certificate"
error
> when using s_client.  I have the CA certificate, and there is,
to my 
> knowledge, no intermediate certificates.  I have tried putting
the CA
> certificate into the certs directory defined in openssl.cnf with a
> symbolic link of the cert's hash value pointing to it.  I have
tried 
> doing openssl verify -Cafile ./sandbox-ca.pem server-cert.pem and still
> get the same error.  Now, my assumption is that if I try to do a
verify
> on a server certificate and provide (via the -Cafile option) that SHOULD 
> be all it needs to verify the certificate correct?  Is there
something
> wrong with my certs?  I've provided both in the email so that
maybe
> someone can point out what the problem is:
>

The problem is that the subject key identifier (SKID) of the issuer certifcate
does not match the authority key identifier (AKID) of the server certificate.

You can see this for yourself by doing:

openssl x509 -in cert.pem -text -noout

So whatever generated the certificates needs to be configured so it correctly
uses the same value for AKID in the server as SKID in the CA.

Steve.
--
Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage 
OpenSSL project core developer and freelance consultant.
Funding needed! Details on homepage.
Homepage: http://www.drh-consultancy.demon.co.uk
__ 
OpenSSL
Project
http://www.openssl.org
User Support Mailing
Listopenssl-users@openssl.org 
Automated List
Manager  
[EMAIL PROTECTED]






-- 
Vincenzo Sciarra 








Certificate Verification

2006-10-11 Thread Aaron Smith








    Ok. 
This is hopefully a simple question, and one that I see quite a bit in the
archives.  However, everything I’ve tried and gleaned from searching
the archives have come up nothing.  I have  server certificate from a
Microsoft Domain Controller that was created via MS’s certificate authority.
 I’m trying to get Openssl to connect to it, but I get the now
familiar “unable to get local issuer certificate” error when using
s_client.  I have the CA certificate, and there is, to my knowledge, no intermediate
certificates.  I have tried putting the CA certificate into the certs
directory defined in openssl.cnf with a symbolic link of the cert’s hash
value pointing to it.  I have tried doing openssl verify –Cafile ./sandbox-ca.pem
server-cert.pem and still get the same error.  Now, my assumption is that
if I try to do a verify on a server certificate and provide (via the –Cafile
option) that SHOULD be all it needs to verify the certificate correct?  Is
there something wrong with my certs?  I’ve provided both in the
email so that maybe someone can point out what the problem is:

 

N1-wrath.sandbox.com (sandbox.com is a virtual domain used
for testing):

 

-BEGIN CERTIFICATE-

MIIFszCCBJugAwIBAgIKGlNrzjANBgkqhkiG9w0BAQUFADBDMRMwEQYK

CZImiZPyLGQBGRYDY29tMRcwFQYKCZImiZPyLGQBGRYHc2FuZGJveDETMBEGA1UE

AxMKU2FuZGJveCBDQTAeFw0wNjA4MjMxNTM5NDNaFw0wNzA4MjMxNTM5NDNaMB8x

HTAbBgNVBAMTFG4xLXdyYXRoLnNhbmRib3guY29tMIGfMA0GCSqGSIb3DQEBAQUA

A4GNADCBiQKBgQDfYb6tJxC8E4GMIIXwuV2VuUTKMavBRjem04DRZzYDpLky4mOo

cBd8s8DwlmRKqtW68LxIhRxHZc6K3y8ytXeFD9VMKTX9hPl3Tk+vvQ/Q2Xjv1CwG

wTRqaeAbnZK+15Q6WkM61yAu0XA3U1f6RaBA5PZFyFbTOkSN0TAJiHw2tQIDAQAB

o4IDTzCCA0swCwYDVR0PBAQDAgWgMEQGCSqGSIb3DQEJDwQ3MDUwDgYIKoZIhvcN

AwICAgCAMA4GCCqGSIb3DQMEAgIAgDAHBgUrDgMCBzAKBggqhkiG9w0DBzAdBgNV

HQ4EFgQUAduzIdaqGDT41RLrYhQJdAR+YPswLwYJKwYBBAGCNxQCBCIeIABEAG8A

bQBhAGkAbgBDAG8AbgB0AHIAbwBsAGwAZQByMB8GA1UdIwQYMBaAFEcKpdwNYJ/A

b+MFCQo8wgaO7VtCMIIBBAYDVR0fBIH8MIH5MIH2oIHzoIHwhoG0bGRhcDovLy9D

Tj1TYW5kYm94JTIwQ0EsQ049bjEtd3JhdGgsQ049Q0RQLENOPVB1YmxpYyUyMEtl

eSUyMFNlcnZpY2VzLENOPVNlcnZpY2VzLENOPUNvbmZpZ3VyYXRpb24sREM9c2Fu

ZGJveCxEQz1jb20/Y2VydGlmaWNhdGVSZXZvY2F0aW9uTGlzdD9iYXNlP29iamVj

dENsYXNzPWNSTERpc3RyaWJ1dGlvblBvaW50hjdodHRwOi8vbjEtd3JhdGguc2Fu

ZGJveC5jb20vQ2VydEVucm9sbC9TYW5kYm94JTIwQ0EuY3JsMIIBGgYIKwYBBQUH

AQEEggEMMIIBCDCBqwYIKwYBBQUHMAKGgZ5sZGFwOi8vL0NOPVNhbmRib3glMjBD

QSxDTj1BSUEsQ049UHVibGljJTIwS2V5JTIwU2VydmljZXMsQ049U2VydmljZXMs

Q049Q29uZmlndXJhdGlvbixEQz1zYW5kYm94LERDPWNvbT9jQUNlcnRpZmljYXRl

P2Jhc2U/b2JqZWN0Q2xhc3M9Y2VydGlmaWNhdGlvbkF1dGhvcml0eTBYBggrBgEF

BQcwAoZMaHR0cDovL24xLXdyYXRoLnNhbmRib3guY29tL0NlcnRFbnJvbGwvbjEt

d3JhdGguc2FuZGJveC5jb21fU2FuZGJveCUyMENBLmNydDAdBgNVHSUEFjAUBggr

BgEFBQcDAgYIKwYBBQUHAwEwQAYDVR0RBDkwN6AfBgkrBgEEAYI3GQGgEgQQgto8

vGzkE0+9zIRFWXgxVYIUbjEtd3JhdGguc2FuZGJveC5jb20wDQYJKoZIhvcNAQEF

BQADggEBAJjCdQkVc+QOSMp81/Og7/2X8nJDEP6qJqPnJjVLAfWnMJjYzbj3bZs0

XompdxVxNb7CchT3TEJoUMnGGzTSu7J0di+Qgwt7lMfOR6BFOYal03fscuLQmALZ

U4/4K//QJV9MWungDMkj0XBGg86HJzwtUpZeu7bUdgmcRCYfZhTdY42fD13a9bGD

IGcz6LAAYBMWwfIDQ0UL6CuFIkS6j7WTxxLWzB+i8cxrEMhLvpUT54fJQnYfNkhS

4Wg12/MUGn9ykK1IFk3ym+FgB20K5vjAykx3DVqdxKG1pa+NhDHdpgcv+cI7wyUA

bBtxiZa2V2vB2x+BV0f0LYVB+3KgrOU=

-END CERTIFICATE-

 

 

The CA certificate from the sandbox.com domain controller
(which happens to be n1-wrath):

-BEGIN CERTIFICATE-

MIIEgjCCA2qgAwIBAgIQHZSufQev7bBPeD3puDiTZDANBgkqhkiG9w0BAQUFADBD

MRMwEQYKCZImiZPyLGQBGRYDY29tMRcwFQYKCZImiZPyLGQBGRYHc2FuZGJveDET

MBEGA1UEAxMKU2FuZGJveCBDQTAeFw0wNjA4MjMxODEwNDJaFw0xMTA4MjMxODE5

MTFaMEMxEzARBgoJkiaJk/IsZAEZFgNjb20xFzAVBgoJkiaJk/IsZAEZFgdzYW5k

Ym94MRMwEQYDVQQDEwpTYW5kYm94IENBMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A

MIIBCgKCAQEAzi1RBABv+NIwN6V5Cb36Xvh4aBR0meZu6Dt7C03E2NGLRuqByGEZ

roxHFmxfw3iLEXCG4wuX8vgmofL25Zxs4SFh0AGTXRLtyCgWkcaRtaRLv/2uOdxu

cfzr0lQujvuaBwORG2b/oxMvaHNs7Fn1W+dDl8mtaq1GIoW4Cy37xWvEK/cLfxzK

Ar2ieI9edSMTDn23ckksKhFVhz4vQN2eDGR6hS7a22ocxFf+X5bbCZih8gtsZq7P

tNByxtAtqxPvFK+KvBphFi8W7W4xRwY9jbgigjluzM4HxtqmNHUWmhFtOjdwnfDd

RJPxgLVvkrlNz8xQi4s4j2f/naIZUDZMIQIDAQABo4IBcDCCAWwwEwYJKwYBBAGC

NxQCBAYeBABDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0O

BBYEFFF6eyh++VR2O41NFn610FcKO2RIMIIBBAYDVR0fBIH8MIH5MIH2oIHzoIHw

hoG0bGRhcDovLy9DTj1TYW5kYm94JTIwQ0EsQ049bjEtd3JhdGgsQ049Q0RQLENO

PVB1YmxpYyUyMEtleSUyMFNlcnZpY2VzLENOPVNlcnZpY2VzLENOPUNvbmZpZ3Vy

YXRpb24sREM9c2FuZGJveCxEQz1jb20/Y2VydGlmaWNhdGVSZXZvY2F0aW9uTGlz

dD9iYXNlP29iamVjdENsYXNzPWNSTERpc3RyaWJ1dGlvblBvaW50hjdodHRwOi8v

bjEtd3JhdGguc2FuZGJveC5jb20vQ2VydEVucm9sbC9TYW5kYm94JTIwQ0EuY3Js

MBAGCSsGAQQBgjcVAQQDAgEAMA0GCSqGSIb3DQEBBQUAA4IBAQCpf6vt20PD17bi

/GJFzIbR+fnjbmYtM6dCcjJoxquxMhBG6YDh29kNIoztDXShEOVPxhFYeaDvONEk

v39WBYpyCqwQogQkNAQGOP0j+hzVJqxJtwZW0GE2QW+5pmdYJkzcD7R7ckZvHU9t

ngYBqbCZQTVPFCxit0nHiwNLe0P+aFb4cc7xq+l4Sd/9GyDAnQLsJ8NL8seqWbVZ

NPA70dgYj1qJR08yuJlB48yXkOyOG0GJQvsZpmwMV5r7feKjQCQnRV7fYHSTpsh6

RYx+zA1okfkaqBQ75RAoidiGyYkeBKwp+I+SzHf7011dUajRMik2ZD7u7APa6sZB

zVlJ7wPM

-END CERTIFICAT

OpenSSL 0.9.8a Crashes Apache--and a Fix

2006-01-17 Thread Aaron Greenspan
ers 
where appropriate) with OpenSSL 0.9.7i. It worked like a charm--no 
failed tests, no errors, and no segmentation faults. I noticed only one 
key difference: the 0.9.7i configuration program automatically detected 
the system as "linux-pentium," instead of "linux-elf." I tried 
configuring and compiling 0.9.8a with "linux-pentium" as the system 
type, but I was given an error implying that no such system type existed 
for that configuration program.


Eventually, I forced the system type as "linux-generic32" with 0.9.8a 
and everything finally worked, thanks to the following command:


/Configure linux-generic32 zlib shared no-threads --prefix=/usr/local 
--openssldir=/usr/local/openssl


However, the small difference in terminology between "generic32" and 
"pentium" and "elf" was enough to take up twenty hours of my time. Is 
there a page somewhere that I missed blatantly outlining this issue? (Is 
this the "compatibility issue" alluded to on the OpenSSL home page?) 
Though I'm not sure what the technical difference is between the system 
types, all of which sound generic to me, I think someone should probably 
look into it if no one has already.


Hope this helps someone...

Aaron

Aaron Greenspan
President & CEO
Think Computer Corporation

http://www.thinkcomputer.com
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


How to disable id and password check

2006-01-10 Thread Chuck Aaron

Can anyone tell me how to disable id and pw checking
when entering a specific web site. I'd like to turn
it completely off.

Thanks,
Chuck


Mark wrote:
my last mail seem to be lost somewhere.. 



I got it!
 

Hi all, 

Im testing an SSL server with s_client. I  want to implement  
client authentication. 

The problem is even if I include the certificate and key file 
in my client call, SSL_get_peer_certificate() 
returns NULL 

I tried the following calls, 

a) S_client -connect ip:port   
b) s_client -connect ip:port -cert clientcert.pem -key 
clientPrivkey.pem 



I would think you would need to specify the root certificate
using the -CAfile option.

Cheers, Mark
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]



__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


RE: validifying RSA key fingerprint

2005-05-04 Thread Aaron P. Martinez
On Wed, 2005-05-04 at 14:18 -0700, Miles Bradford wrote:
> User a class A or B IP
> If you're offsite - your 192.X.X.X probably won't work.

The IP addresses provided were for problem explanation purposes only.
if you like, use x.x.x.x.  
> 
> -Original Message-
> From: Aaron P. Martinez [mailto:[EMAIL PROTECTED]
> Sent: Wednesday, May 04, 2005 12:13 PM
> To: openssl-users@openssl.org
> Subject: validifying RSA key fingerprint
> 
> 
> I am trying to figure out how to veryify a RSA key fingerprint against
> the hash that i have already in my known_hosts file.
> 
> When i connect to a machine for the first time after i move it offsite,
> i get a message like:
> 
> The authenticity of host 'www.example.com (192.168.x.x)' can't be
> established.
> RSA key fingerprint is 36:97:27:70:e2:1b:80:32:34:e1:7p:99:89:93:45:92.
> 
> in my known hosts i have something like:
> 
> 192.168.x.x ssh-rsa
> B3NzaC1yc2EBIwAAAIEAmPwYG833PifTQ501dsi6JSB/H7HtT0rZ678oSht9I6nWwtaV
> Z6KH/fToPZlrtExAIvIj9W901MsUYMTCT9LlPN7RNzVBtIJEBt+P59vZn6xPKbzEk3DDU92u5jBG
> ukR7qGaF9oz+h3Q06mqZauu+BeLt147ChuqHXT0hO08TLfM=
> 
> 
> so how can i convert the ssh-rsa into a fingerprint to compare the two.
> Or maybe there's even an easier way?
> 
> 
> TIA,
> 
> Aaron Martinez
> 
> ps, i know the above fingerprint and the following ssh-rsa don't match.
> 
Aaron Martinez

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


validifying RSA key fingerprint

2005-05-04 Thread Aaron P. Martinez
I am trying to figure out how to veryify a RSA key fingerprint against
the hash that i have already in my known_hosts file.

When i connect to a machine for the first time after i move it offsite,
i get a message like:

The authenticity of host 'www.example.com (192.168.x.x)' can't be
established.
RSA key fingerprint is 36:97:27:70:e2:1b:80:32:34:e1:7p:99:89:93:45:92.

in my known hosts i have something like:

192.168.x.x ssh-rsa
B3NzaC1yc2EBIwAAAIEAmPwYG833PifTQ501dsi6JSB/H7HtT0rZ678oSht9I6nWwtaVZ6KH/fToPZlrtExAIvIj9W901MsUYMTCT9LlPN7RNzVBtIJEBt+P59vZn6xPKbzEk3DDU92u5jBGukR7qGaF9oz+h3Q06mqZauu+BeLt147ChuqHXT0hO08TLfM=


so how can i convert the ssh-rsa into a fingerprint to compare the two.
Or maybe there's even an easier way?


TIA,

Aaron Martinez

ps, i know the above fingerprint and the following ssh-rsa don't match.

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


description of error numbers?

2005-02-26 Thread Aaron Voisine
Where can I find a description of the various error numbers? Here's
what I'm getting in my apache logs:

OpenSSL: error:14094418:lib(20):func(148):reason(1048)

l8r
Aaron

-- 
There's no trick to being a humorist when you have the whole
government working for you -- Will Rodgers
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


SSL and OSU

2005-02-24 Thread Chuck Aaron




SSL Group,

I am running the 3.10a osu web server with openvms SSL. Our users
access our server based on two different
ip addresses, which corrulate to two different applications. Do you
know if there is a way to make users
who are accessing only one of the applications on the web to force them
to ssl (https) and leave
the other application http or will I have to make it all https if I
chose that route?

Thanks in advance,
Chuck Aaron





Re: Question about generating keys, certificate requests

2005-01-04 Thread Aaron Smith
Well, with the various SSL certificates I create with our in-house CA, I
create them all on one machine and then copy the certificates over to
the machines that will actually use them.  No problem at all.  So I'd
guess that nothing about the machine you're creating the request on is
put into the certificate...

On Tue, 2005-01-04 at 16:22, Stewart Dean wrote:
> When you do this using either the req or gen rsa command, does the 
> generated output have *anything* in it that acts as a fingerprint of the 
> machine where the command was invoked?
> That is, as part of running these commands, does the output end up withe 
> some section that ties it to that very machine and no other?
> 
> I am bringing up secure IMAP using openssl on our imap mail server.  I 
> currently have it working just fine using a self-signed certificate.
> Now I want to get a Class 1 Digital Certificate from Verisign and so 
> have to submit a certificate request
> I'm pretty clear on what I have to do, but I have a problem.
> 
> The mail server in question has a hostname (mercury.bard.edu).  It also 
> has 3 NICs that answer to 6 numeric addresses...three of them primary 
> addresses and the other three secondary 'network aliases' (as defined, I 
> think, by Sun, IBM and Red Hat, a network alias is a numeric address 
> that is recognized and responded to BY THE NIC HARDWARE...as such, it is 
> externally indistinguishable from the primary address...the machine 
> responds the same to either, and it's only internally that you can find 
> out which is which).  ALL six of the corresponding symbolic host names 
> have A records (NOT CNAME) in DNS and resolve forward and back uniquely.
> 
> Now if this were a machine with one hostname and one numeric address, I 
> would have no question about how to generate keys and certificate 
> requests...I would just do it.
> 
> But.
> 
> This machine has 6 numeric IP addresses it answers, one internal 
> hostname (mercury) and 5 more hostnames in DNS: mercury2, mercmailport, 
> smtp, imap & mail
> 
> When I run the openssl req/genrsa command, am I going to get some 
> fingerprint of the machine embedded that won't match the DNS symbolic 
> name I want to use (imap.bard.edu) and put in the CN?  Which I would 
> think would make the certificate usage fail because the host name it got 
> for that fingerprint might be mercury or anyone of the other 4?
> 
> Or does the generation process take no fingerprint and could be run on 
> any machine that answers to the numeric IP address corresponding to the 
> CN specified and entered when the command was run?
> 
> My head hurts.
> 
> I wouldn't make such a big deal out of this, except that the certificate 
> isn't cheap, and Verisign gives you 3 days of support to get things up, 
> then you're on your own.  And my attempt to ask this question of the 
> pre-purchase email tech support returned a 'dartboard' answerit had 
> absolutely nothing to do with my question..must have been picked out 
> by throwing a dart at a list of canned answers
> 
> Thanks in advance for your help
-- 
-
Aaron Smith vox: 269.226.9550 ext.26
http://www.nexcerpt.com fax: 269.349.9076   

...Nexcerpt... Extend Your Expertise


signature.asc
Description: This is a digitally signed message part


Re: Certificate Revocation

2004-05-17 Thread Aaron Smith
That did the trick.  Thanks a lot!

On Fri, 2004-05-14 at 12:52, Olaf Gellert wrote:
> Aaron Smith wrote:
> > We have been using OpenSSL to generate certificates for various
> > applications here with a home grown CA (created using openssl ca).  We
> > recently started upgrading our servers from Redhat 7.3 to RHEL 3.0.  The
> > machine that used to house the CA directories used openssl version
> > 0.9.6b (RedHat RPM) and the new machine uses openssl version 0.9.7b
> > (again, RedHat RPM).  I tar'ed up the CA directories from the old
> > machine and plopped them onto the new machine.  When I attempted to
> > revoke a certificate (by "openssl ca -revoke certfile.pem"), I received
> > the following error:
> > 
> > ERROR:name does not match 
> 
> Maybe it's something to do with Email-Addresses in
> the DN? From 0.9.6 to 0.9.7 the entry output of
> openssl changed from "Email" to "emailAddress"
> so it could be that you have to change this in
> the "index.txt" file of OpenSSL.
> 
> Just a guess...
> Cheers, Olaf
-- 
-
Aaron Smith vox: 269.226.9550 ext.26
Network Directorfax: 269.349.9076   
Nexcerpt, Inc.  http://www.nexcerpt.com

...Nexcerpt... Extend Your Expertise



signature.asc
Description: This is a digitally signed message part


Certificate Revocation

2004-05-14 Thread Aaron Smith
We have been using OpenSSL to generate certificates for various
applications here with a home grown CA (created using openssl ca).  We
recently started upgrading our servers from Redhat 7.3 to RHEL 3.0.  The
machine that used to house the CA directories used openssl version
0.9.6b (RedHat RPM) and the new machine uses openssl version 0.9.7b
(again, RedHat RPM).  I tar'ed up the CA directories from the old
machine and plopped them onto the new machine.  When I attempted to
revoke a certificate (by "openssl ca -revoke certfile.pem"), I received
the following error:

ERROR:name does not match 

The same command worked fine on the old server.  The only different in
execution that I see is that, when run on the new server, I get a line
that says 
"Using configuration from /usr/share/ssl/openssl.cnf"
which I don't get on the old server.  I have an openssl.cnf file in the
CA directory that was just copied from /usr/share/ssl when the CA was
originally created (along with CA.pl).
Is this a compatibility problem between the openssl versions?  If so,
is there a way around it or do I need to recreate all of my CA's and
regenerate all of my certificates?  
-- 
-----
Aaron Smith vox: 269.226.9550 ext.26
Network Directorfax: 269.349.9076   
Nexcerpt, Inc.  http://www.nexcerpt.com

...Nexcerpt... Extend Your Expertise



signature.asc
Description: This is a digitally signed message part


RE: Where are the reason codes?

2004-04-27 Thread Miller,Aaron

Did you call ERR_load_crypto_strings ()?

Without it, you won't get the descriptive text. 

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Dennis Putnam
Sent: Tuesday, April 27, 2004 10:27 AM
To: [EMAIL PROTECTED]
Subject: Where are the reason codes?

I am having a problem with Apache's mod_ssl. It is getting an error from
OpenSSL but the message is useless without an error code reference. I
cannot find any error codes at the OpenSSL web site or anywhere else for
that matter. Can someone point me to a place to find what these error
messages mean? TIA.

[Tue Apr 27 08:22:34 2004] [error] OpenSSL: 
error:0D0680A8:lib(13):func(104):reason(168)
[Tue Apr 27 08:22:34 2004] [error] OpenSSL: 
error:0D07803A:lib(13):func(120):reason(58)


Dennis Putnam
Information Technology
AIM Systems, Inc.
11675 Rainwater Dr.
Alpharetta, GA  30004
678-297-0700

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]


CONFIDENTIALITY NOTICE

This message and any included attachments
are from Cerner Corporation and are intended
only for the addressee. The information
contained in this message is confidential and
may constitute inside or non-public information
under international, federal, or state
securities laws. Unauthorized forwarding,
printing, copying, distribution, or use of such
information is strictly prohibited and may be
unlawful. If you are not the addressee, please
promptly delete this message and notify the
sender of the delivery error by e-mail or you
may call Cerner's corporate offices in Kansas
City, Missouri, U.S.A at (+1) (816)221-1024.
 --
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]


Re: Test

2003-09-11 Thread Chuck Aaron
yes, it made it.

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]


RE: 0.9.6j vs 0.9.7b

2003-06-04 Thread Aaron Axelsen
 
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Is there a major difference between the two?  My guess would be that
eventually everthing will move to the 0.9.7 series.  If that’s the
case, I would think it makes more sense to upgrade to the 0.9.7
series

- ---
Aaron Axelsen
AIM: AAAK2
Email: [EMAIL PROTECTED]

Want reliable web hosting at affordable prices?
www.modevia.com
 
Web Dev/Design Community/Zine
www.developercube.com



- -Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Richard Levitte
- - VMS Whacker
Sent: Tuesday, June 03, 2003 1:22 AM
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: Re: 0.9.6j vs 0.9.7b


In message <[EMAIL PROTECTED]> on Mon, 2 Jun 2003
21:27:10 -0500, "Aaron Axelsen" <[EMAIL PROTECTED]> said:

axelseaa> Currently I am running OpenSSL 0.9.6g, and I am looking to 
axelseaa> upgrade. My question is what is the different between
0.9.6i 
axelseaa> and 0.9.7b?? Which one will be easiest to upgrade from
0.9.6g? 
axelseaa> Or is there no difference?  Thanks is advance your your 
axelseaa> assistance, it is much appreciated.

It's easier to upgrade to 0.9.6i.  A change to the 0.9.7 series often
requires changes in the applications.

- -- 
Richard Levitte   \ Tunnlandsvägen 3  \ [EMAIL PROTECTED]
[EMAIL PROTECTED]  \ S-168 36  BROMMA  \ T: +46-8-26 52 47
\  SWEDEN   \ or +46-708-26 53 44
Procurator Odiosus Ex Infernis-- [EMAIL PROTECTED]
Member of the OpenSSL development team: http://www.openssl.org/

Unsolicited commercial email is subject to an archival fee of $400.
See <http://www.stacken.kth.se/~levitte/mail/> for more info.
__
OpenSSL Project
http://www.openssl.org
User Support Mailing List   
[EMAIL PROTECTED]
Automated List Manager  
[EMAIL PROTECTED]

-BEGIN PGP SIGNATURE-
Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com>

iQA/AwUBPtz3VbrnDjSLw9ADEQIzfACggvUxJVeQMtZ7cpBqoASZbQUOl0YAn2Fz
a0c59cyc/bTbsoD+uTI2EUFx
=4f20
-END PGP SIGNATURE-


__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]


0.9.6j vs 0.9.7b

2003-06-03 Thread Aaron Axelsen
Title: 0.9.6j vs 0.9.7b






-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hello,

Currently I am running OpenSSL 0.9.6g, and I am looking to upgrade.
My question is what is the different between 0.9.6i and 0.9.7b??
Which one will be easiest to upgrade from 0.9.6g? Or is there no
difference?  Thanks is advance your your assistance, it is much
appreciated.


- ---
Aaron Axelsen
AIM: AAAK2
Email: [EMAIL PROTECTED]

Want reliable web hosting at affordable prices?
www.modevia.com

Web Dev/Design Community/Zine
www.developercube.com



-BEGIN PGP SIGNATURE-
Version: PGPfreeware 7.0.3 for non-commercial use <http://www.pgp.com>

iQA/AwUBPtwHfrrnDjSLw9ADEQIGAQCg9GriW4utuDmAopW5q/Vy7WflZZ4AoJ73
M9SvAt1gr8NF7CHsi+w9DXH+
=D3OB
-END PGP SIGNATURE-






PGPexch.rtf.asc
Description: Binary data


0.9.6j vs 0.9.7b

2003-06-03 Thread Aaron Axelsen
Title: Message



Hello,

Currently I am running OpenSSL 0.9.6g, and I am looking to 
upgrade. My question is what is the different between 0.9.6i and 0.9.7b?? 
Which one will be easiest to upgrade from 0.9.6g? Or is there no 
difference?  Thanks is advance your 
your assistance, it is much appreciated.
 
---Aaron AxelsenAIM: AAAK2Email: 
[EMAIL PROTECTED]Want reliable web hosting at affordable 
prices?www.modevia.com
 
Web Dev/Design 
Community/Zine
www.developercube.com
 


Re: OpenSSL: Support, Mailing Lists

2002-06-06 Thread Aaron Smith

I just installed mod_ssl on my Mac OS X server and when I try to access 
it for testing I get the following error message:

SSL_connect:error in SSLv2/v3 read server hello A
404:error:140770FC:SSL routines:SSL23_GET_SERVER_HELLO:unknown 
protocol:s23_clnt.c:460:

Any suggestions?

Thanks,
Aaron Smith
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: Attempting to use EVP Context initialisation functions under 0.9.6d

2002-05-29 Thread Chuck Aaron

REMOVE

> Tim Gillott wrote:
> 
> Greetings.
> 
> I am having trouble initialising both Digest Contexts and Digests
> using the EVP wrappers. I am using 0.9.6d under Windows XP Pro. I
> can't seem to find the functions EVP_MD_CTX_init, EVP_MD_CTX_create
> or  EVP_DigestInit_ex in any of the includes or libraries I have,
> although the documentation mentions them and describes their
> function in detail. I built the libraries from scratch using the
> Perl utilities and all built fine. I can compile and link
> successfully. The problem is, if you want to use the EVP wrappers,
> initialising the context and digest is sort of vital…otherwise you
> can't perform any operations at all. Am I missing something here? Is
> the OpenSSL documentation (gasp) *ahead* of the code…? I could go
> back to using explicit message digest calls but I really don't want
> to do that having upgraded to using the EVP wrappers…can anyone
> help???
> 
> Cheers
> 
> Tim Gillott
> [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



new version applying:

2002-05-21 Thread Chuck Aaron

Hello,

I am currently running 9.6A. how do I go about downloading the newest
9.6d version and applying it to my alphas?

CJA
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



bad decrypt error

2002-04-24 Thread Morris, Aaron W.



I am trying to 
decrypt a file that has been decrypted in the des3 format.  The guy says 
that is was decrypted by some kind of hardware device that they use internally 
to their company.  It is coming from a mainframe then we are trying to 
decrypt it on  a hp box.  We have tried to convert it to ascii before 
he encrypts and we still get the bad decrypt error.  Here is the 
comnmand+error:  /opt/openssl/bin/openssl des3 -d -in ascrypt.txt -out 
decrypted.txt -K 12345678bad decrypt21296:error:06065064:digital 
envelope routines:EVP_DecryptFinal:bad 
decrypt:evp_enc.c:277:
 
Any help would be 
appreciated.
 
Aaron


OpenSSL problem with SSH

2002-03-14 Thread Aaron M. Hirsch

Hello all!  I have recently downloaded and compiled successfully
openssl-0.9.6c for Solaris 2.6.  Or at least that is what the messages
tell me.  However, when attempting to compile openssh-3.1p1.tar.gz I get
the following error:

cofnigure:7868  error:  Could not find working OpenSSL library, please
install or check the config.log

I have tried using the sysconfdir=/opt/ssl  but came up with the same results.

I also downloaded the openssl-0.9.6c binary for Solaris 2.6 and still
get the same error when compiling ssh.  

Has anyone experienced this before?  Where do I start?

Thanks in advance for the help! 
-- 
Aaron M. Hirsch
Systems Administrator
SchlumbergerSema
11146 Thompson Ave.
Lenexa, KS 66219
Phone:  (913) 312-4717
Mobile: (913) 284-9094
Fax:(913) 312-4701
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



ssh install problems

2002-03-14 Thread Aaron M. Hirsch

Hello all!  I have recently downloaded and compiled successfully
openssl-0.9.6c for Solaris 2.6.  Or at least that is what the messages
tell me.  However, when attempting to compile openssh-3.1p1.tar.gz I get
the following error:

cofnigure:7868  error:  Could not find working OpenSSL library, please
install or check the config.log

I have tried using the sysconfdir=/opt/ssl  but came up with the same results.

I also downloaded the openssl-0.9.6c binary for Solaris 2.6 and still
get the same error when compiling ssh.  

Has anyone experienced this before?  Where do I start?

Thanks in advance for the help! 

-- 
Aaron M. Hirsch
Systems Administrator
SchlumbergerSema
11146 Thompson Ave.
Lenexa, KS 66219
Phone:  (913) 312-4717
Mobile: (913) 284-9094
Fax:(913) 312-4701
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Mac OS X 10.0.4

2001-10-10 Thread Aaron Guy Davies

Will OpenSSL compile for OS X 10.0.4? When I try ./config, it says

Operating system: Power Macintosh-whatever-Darwin
This system (Darwin) is not supported. See file INSTALL for details.

When I try ./Configure, I don't see anything about Darwin. There's a
Rhapsody option, but that fails during make.

-- 
____
   /  )  /  )
  /--/ __.  __  /  / __. , __o  _  _
 /  (_(_/|_/ (_(_) / / <_  /__/_(_/|_\/ <__http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



RE: DES - 3DES (novice)

2001-10-04 Thread Aaron Kronis

Thanks Robert.
I think it worked, does this look correct to you?(or anyone) 
-output
Connection from 17f, port e904
SSL connection using RC4-MD5
Client does not have certificate.
Got 23 chars:'Hello World! Encrypt me'
-end---

(is it in fact 3des now? I've been at
http://www.openssl.org/docs/apps/ciphers.html
to see if it looks right. but I can't tell. it reports RC4-MD5
but not DES-CBC3-SHA...I don't understand the syntax in the call.
(can you please explain how RC4-MD5 is on the left of the colon':' and
how it is used with the DES-CBC3-SHA on the right?

If this IS right, then will I need to create a working certificate for
the client next?

SSL_CTX_set_cipher_list(yourCTX, "RC4-MD5:DES-CBC3-SHA");

Thanks very much, I'm sure this is simple and I just need to get these
few answers to move forward.

Aaron

-Original Message-
Here's an example:
  SSL_CTX_set_cipher_list(yourCTX, "RC4-MD5:DES-CBC3-SHA");

HTH,
Rob
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Need to use 3des not des

2001-10-03 Thread Aaron Kronis

Hello,

I have compiled and run a demo program that encrypts a string of text
and sends it across a socket connection where it is encrypted. This is
obviously using the ssl.h library. 

What I need to do is change the encryption from DES to 3DES.
I cannot yet figure out where to do this. Is there a chance that this
information may be stored in the certificate on the server? I noticed
that it has a field for AU which would have to be ENC to allow for 3des,
but then would I have to generate a new certificate(if so where do I
begin) or is it simply somewhere in the code?
here's some of the code:
  SSL_CTX* ctx; //defined above

...main body...

  SSL_load_error_strings();
  SSLeay_add_ssl_algorithms();

  meth = SSLv23_server_method();

  ctx = SSL_CTX_new (meth);
if (!ctx) {
ERR_print_errors_fp(stderr);
exit(2);
  }
  
  if (SSL_CTX_use_certificate_file(ctx, CERTF, SSL_FILETYPE_PEM) <= 0) {
ERR_print_errors_fp(stderr);
exit(3);
  }
  if (SSL_CTX_use_PrivateKey_file(ctx, KEYF, SSL_FILETYPE_PEM) <= 0) {
ERR_print_errors_fp(stderr);
exit(4);
  }

  if (!SSL_CTX_check_private_key(ctx)) {
fprintf(stderr,"Private key does not match the certificate public
key\n");
exit(5);
  }

/* --- */

  /* TCP connection is ready. Do server side SSL. */

  ssl = SSL_new (ctx);   CHK_NULL(ssl);
  SSL_set_fd (ssl, sd);
  err = SSL_accept (ssl);CHK_SSL(err);

/* Get the cipher - opt */
  
  printf ("SSL connection using %s\n", SSL_get_cipher (ssl));

 
  /* Get client's certificate (note: beware of dynamic allocation) - opt
*/


  client_cert = SSL_get_peer_certificate (ssl);
  if (client_cert != NULL) {
printf ("Client certificate:\n");

str = X509_NAME_oneline (X509_get_subject_name (client_cert), 0, 0);
CHK_NULL(str);
printf ("\t subject: %s\n", str);
Free (str);

str = X509_NAME_oneline (X509_get_issuer_name  (client_cert), 0, 0);
CHK_NULL(str);
printf ("\t issuer: %s\n", str);
Free (str);

/* We could do all sorts of certificate verification stuff here
before
   deallocating the certificate. */

X509_free (client_cert);
  } else
printf ("Client does not have certificate.\n");

..ETC.
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: Installation over Linux Slackware

2001-04-23 Thread Aaron Nye

I am running the most current release on that very operating system, any 
reason you are not running OpenSSL 0.9.X instead of SSLeay?

On Monday 23 April 2001 03:32, you wrote:
> I'm trying to install SSLeay-0.8.1 on Linux-Slackware.
>   Compiling is not right because file standards.h is missing.
>
>   Perhaps a previous package must be installed before ssl ?
>
>
>   Thanks in advance.
>
>
> Narciso Guillen
> [EMAIL PROTECTED]
> [EMAIL PROTECTED]
> __
> OpenSSL Project http://www.openssl.org
> User Support Mailing List[EMAIL PROTECTED]
> Automated List Manager   [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Resolved. Was: Need a certificate verification help

2001-03-14 Thread Aaron Stromas




Dr S N Henson wrote:

> http://www.openssl.org/support/faq.html#PROG7
>
> for what I suspect is the cause of the error.
>

Yes, it was. OpenSSL_add_all_algorithms() solved it. Thank you.

--
Aaron Stromas| "Tick-tick-tick!!!... ja, Pantani is weg..."
Oracle Corp  | BRTN commentator
+1 703.708.68.21 |  L'Alpe d'Huez
1995 Tour de France


__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: Need a certificate verification help

2001-03-13 Thread Aaron Stromas



Dr S N Henson wrote:

> Aaron Stromas wrote:
> >
> > Sorry, it's a typo, of course. I'm using X509_verify_cert(&ctx). Was it
> > supposed to work, i.e., successfully verify?
> >
>
> See what error you get and see if:
>
> openssl verify -CAfile cacert.pem cert.pem
>
> works.

It does. Returns OK. Is it the code in apps/verify.c that implements "openssl
veryfy ..." above?

-a

>
>
> Steve.
> --
> Dr Stephen N. Henson.   http://www.drh-consultancy.demon.co.uk/
> Personal Email: [EMAIL PROTECTED]
> Senior crypto engineer, Celo Communications: http://www.celocom.com/
> Core developer of the   OpenSSL project: http://www.openssl.org/
> Business Email: [EMAIL PROTECTED] PGP key: via homepage.
> __
> OpenSSL Project http://www.openssl.org
> User Support Mailing List    [EMAIL PROTECTED]
> Automated List Manager   [EMAIL PROTECTED]

--
Aaron Stromas| "Tick-tick-tick!!!... ja, Pantani is weg..."
Oracle Corp  | BRTN commentator
+1 703.708.68.21 |  L'Alpe d'Huez
1995 Tour de France


__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: Need a certificate verification help

2001-03-13 Thread Aaron Stromas

Sorry, it's a typo, of course. I'm using X509_verify_cert(&ctx). Was it
supposed to work, i.e., successfully verify?

-a

Dr S N Henson wrote:

> Aaron Stromas wrote:
> >
> > I am probably making a silly mistake but I've been stuck on it for quite
> > a long time. Please help me to get out of my predicament. This is what
> > I'm doing:
> >
> > BIO *bstdout;
> > X509 *x, *ca;
> > X509_STORE *store;
> > X509_STORE_CTX ctx;
> >
> > bstdout = BIO_new_fp(stdout, BIO_NOCLOSE);
> > /* load & show CA cert */
> > if (ca = load_cert(bstdout, "ca.pem", str2fmt("PEM"))) {
> > X509_print(bstdout, ca);
> > if (x = load_cert(bstdout, "cart.pem", str2fmt("PEM))) {
> > X509_print(bstdout, x);
> > store = X509_STORE_new();
> > X509_STORE_set_default_paths(store);
> > X509_STORE_add_cert(store, ca);
> > X509_STORE_CTX_init(&ctx, store, x, NULL);
> > if (X509_verify(&ctx))
> > printf("OK\n");
> > else
> > printf("Nope\n");
> > }
> > }
> >
> > Although the cert loaded in x was issued by the CA whose cert is in ca
> > (openssl 0.9.5), I'm still getting "Nope". I must be misunderstanding
> > something, but what is it? TIA,
> >
>
> X509_verify()? Surprised it doesn't crash, that function is just for
> verifying a single certificate against a known public key, and it takes
> two arguments. If you are using X509_verify() (and that isn't just a
> typo) use X509_verify_cert() instead.
>
> Steve.
> --
> Dr Stephen N. Henson.   http://www.drh-consultancy.demon.co.uk/
> Personal Email: [EMAIL PROTECTED]
> Senior crypto engineer, Celo Communications: http://www.celocom.com/
> Core developer of the   OpenSSL project: http://www.openssl.org/
> Business Email: [EMAIL PROTECTED] PGP key: via homepage.
>
> __
> OpenSSL Project http://www.openssl.org
> User Support Mailing List[EMAIL PROTECTED]
> Automated List Manager   [EMAIL PROTECTED]

--
Aaron Stromas| "Tick-tick-tick!!!... ja, Pantani is weg..."
Oracle Corp  | BRTN commentator
+1 703.708.68.21 |  L'Alpe d'Huez
1995 Tour de France


__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Need a certificate verification help

2001-03-13 Thread Aaron Stromas

I am probably making a silly mistake but I've been stuck on it for quite
a long time. Please help me to get out of my predicament. This is what
I'm doing:

BIO *bstdout;
X509 *x, *ca;
X509_STORE *store;
X509_STORE_CTX ctx;

bstdout = BIO_new_fp(stdout, BIO_NOCLOSE);
/* load & show CA cert */
if (ca = load_cert(bstdout, "ca.pem", str2fmt("PEM"))) {
X509_print(bstdout, ca);
if (x = load_cert(bstdout, "cart.pem", str2fmt("PEM))) {
X509_print(bstdout, x);
store = X509_STORE_new();
X509_STORE_set_default_paths(store);
X509_STORE_add_cert(store, ca);
X509_STORE_CTX_init(&ctx, store, x, NULL);
if (X509_verify(&ctx))
printf("OK\n");
else
printf("Nope\n");
}
}

Although the cert loaded in x was issued by the CA whose cert is in ca
(openssl 0.9.5), I'm still getting "Nope". I must be misunderstanding
something, but what is it? TIA,

-a
--
Aaron Stromas| "Tick-tick-tick!!!... ja, Pantani is weg..."
Oracle Corp  | BRTN commentator
+1 703.708.68.21 |  L'Alpe d'Huez
1995 Tour de France


__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



x509

2000-12-11 Thread Aaron Galea




Hi,
 
Not sure whether this question is in its appropriate place but I have a problem when creating a certificate Payload in 
ISAKMP. In RFC2408 it mentions 3 types of X.509 certificates, 
mainly:
 

  X.509 Certificate - Signature    
                  
  4 
  X.509 Certificate - Key Exchange    
          5 
  x.509 Certificate - Attribute    
                  
  10
Does anyone know what is the difference between 
them??? or if there is any document that explain this???
 
Thanks,
Aaron


Re: Compilation Errors on Winnt

2000-11-29 Thread Aaron Galea


During Winnt compilation it gives you a number of unresolved externals. The
best way is to create a library "crypto.lib" and ensure you set up all the
correct paths in the settings. Quite a tedious task!!!

- Original Message -
From: "Louis Lam" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]>
Sent: Wednesday, November 29, 2000 1:06 PM
Subject: Compilation Errors on Winnt


> Hi,
>
> I'm quite new to the openssl, just trying to compile it on winnt, but got
> some errors due to unresolved symbols, did anyone encounter this problem?
>
> Thanks in Advance
>
> Louis Lam
>

_
> Get more from the Web.  FREE MSN Explorer download :
http://explorer.msn.com
>
> __
> OpenSSL Project http://www.openssl.org
> User Support Mailing List[EMAIL PROTECTED]
> Automated List Manager   [EMAIL PROTECTED]

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



DSA vs RSA

2000-11-28 Thread Aaron Galea



Hi,
 
I am not sure whether you require to generate two 
CAs for creating DSA and RSA certificates. The problem is that if I create the 
CA certificate and key file using RSA I would not be using the file containing 
the dsa parameters and may be it fails during signing of certificate 
requests.
 
I am not sure about this, so any help would 
definitely clarify my ambiguities.
 
Thanks,
Aaron


Re: .CRT

2000-11-27 Thread Aaron Galea

Thanks everyone for the help about .Crt

Aaron
- Original Message -
From: "Massimiliano Pala" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Monday, November 27, 2000 6:22 PM
Subject: Re: .CRT


> > Aaron Galea wrote:
> >
> > Hi,
>
>
> Hi,
>
> > Does anyone know how to read a .crt certificate? Reading .pem, .cer and
.der
> > no problem but I can't figure out how to read a .crt certificate.
>
> The file extension does not reveal the file format... a .crt file could be
> any format of the above... anyway it is usually a .pem formatted file
> (certificate).
>
> C'you,
>
> Massimiliano Pala ([EMAIL PROTECTED])

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



PEM_read_X509

2000-11-23 Thread Aaron Galea



Hi,
 
I am compiling all the openssl files under VC++ and 
creating a number of libraries that I can include to compile the programs. 
However I am having problems with PEM_read_X509 when compiling the .c files 
of the openssl. The error is "Not enough actual Parameters". Has anyone 
experienced this before? Not actually sure about the parameter that I need to 
add for it to compile successfully. Probably a NULL but I am having so much of 
these that I am wondering why there is so much of a mismatch between the headers 
and actual code.
 
Aaron


rsa to pkcs8 question

2000-11-10 Thread Aaron Jackson

Background
I administer a product that requires private keys to be in a specific
format, which is not the format given by genrsa.  After pulling teeth
with the "customer support" people I found out that there is a tool
included with the product that generates the required private keys. 
Also after doing some research it appears that they are pkcs8 keys--only
because of the -BEGIN ENCRYPTED PRIVATE KEY- containers. 
Openssl happily makes cert requests and certs using the pkcs8 keys
generated by the other app.  I want to use openssl to generate all
subsequent keys, to make administration easier for the people after me
since I have already set up a CA.  However, if I generate an rsa key and
then convert it to a pkcs8 key (using the example in the pkcs8 man
page), my app can not use them.

Questions
Can I assume that the required keys are pkcs8?
If not how can I tell what format the private key is in?
Can I tell how a key is password encrypted?
Can I directly generate a pkcs8 key using openssl?

Any info would be helpful.  Thanks.

Aaron
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Sorry... PKCS5 cert chain question

2000-11-06 Thread Aaron Jackson

Sorry about the last message it was user error on my part.  Please
disregard the previous message, as it was incomplete.  This is the
finished version...

I'm trying to get a handle on what needs to be done to get a commercial
product I just started administrating to provide ssl access to three
different services.  Below is an edited quote from the operations guide:

The name of a file containing a PKCS 5 password-encrypted, formatted
private key, followed by DER formatted certificates defining the private
key and certificate chain for the servers. The last certificate in the
file is the root certificate. "_Begin" and "_End" PEM syntax
delimits the encrypted private key and certificates.

I have already looked at the openssl man page and through the mailing
list archive and even the RSA crypto faq, but I couldn't find answers to
the following questions.  It seems that when generating a private key
pkcs#10 is used.  I don't see any mention to pkcs#5.  How would I go
about generating a pkcs#5 private key?And finally, I have only
limited experience with openssl and personal servers so my next
questions is what is meant by "certificate chain" and how does one
create the chain?  Thanks in advance for any information.

Aaron
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



  1   2   >