Re: Wasn't someone joking about the virus being posted by an autoresponder

2001-08-23 Thread Caliban Tiresias Darklock

On Thu, 23 Aug 2001 10:03:10 -0500 (EST), "Mark H. Wood"
<[EMAIL PROTECTED]> wrote:

>On Wed, 22 Aug 2001, Caliban Tiresias Darklock wrote:
>> Just out of curiosity, why are attachments allowed on the list in the
>> first place? Is there any legitimate reason for it?
>
>Well, why not?  Is there any legitimate reason *not* to?

Well, there exist common mail clients with buggy scriptable interfaces
that allow malicious programs to send other malicious programs to
everyone in the address book and/or everyone the user emails. That seems
like a pretty legitimate reason not to allow attachments on a list. 

The submission of patches is a good point, but to date I have not seen a
single patch submitted on the list as an attachment -- and I've been
here several months. It seems to me that any patch large enough to need
an attachment would be more properly placed on an FTP site somewhere,
anyway.

Just a thought. I'm not really bothered by any of the message-bouncing
and virus-detection spam, myself, and tend to think it's funny instead
of getting mad over it.

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: Wasn't someone joking about the virus being posted by an autoresponder

2001-08-22 Thread Caliban Tiresias Darklock

On Wed, 22 Aug 2001 08:05:24 -0600, Nathan Bell
<[EMAIL PROTECTED]> wrote:

>I still think this would all stop if the openssl mail server rejected (and
>deleted) the virus before sending the message to everyone on the list.

Just out of curiosity, why are attachments allowed on the list in the
first place? Is there any legitimate reason for it? 

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: Please reconfigure majordomo to not set Reply-To (was: Failed to clean virus file Emanuel.exe)

2001-08-20 Thread Caliban Tiresias Darklock

On Mon, 20 Aug 2001 13:33:18 +0200, Michael Ströder
<[EMAIL PROTECTED]> wrote:

>Because the mailing list processor is configured to set the Reply-To
>address to the list address. IMHO this should be changed to reduce
>such problems with automatic replies (vacation e-mails, virus-scans
>etc.).

But that would make *regular* replies a pain in the ass for list
members. 

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: Memory leaks!

2001-08-03 Thread Caliban Tiresias Darklock

On Thu, 2 Aug 2001 20:17:52 +0100, "Mike Scriven" <[EMAIL PROTECTED]>
wrote:

>I've written a Windows app. using OpenSSL and I'm getting memory 
>leaks when I close it, even if I haven't connected a socket. 

I'm no expert, but I've been reading the man pages a lot... so here are
my thoughts.

>At startup I do the following:
>
>SSLeay_add_ssl_algorithms();

I think you should be using OpenSSL_add_all_algorithms() here.

>SSL_load_error_strings();
>m_pSSLctx = SSL_CTX_new(SSLv23_client_method());
>
>and at shutdown I do this:
>
>SSL_CTX_free(m_pSSLctx);
>ERR_free_strings();

Looks like you missed EVP_cleanup(). From the
OpenSSL_add_all_algorithms(3) man page:

-

OpenSSL keeps an internal table of digest algorithms and ciphers. It
uses this table to lookup ciphers via functions such as
EVP_get_cipher_byname(). 

OpenSSL_add_all_digests() adds all digest algorithms to the table. 

OpenSSL_add_all_algorithms() adds all algorithms to the table (digests
and ciphers). 

OpenSSL_add_all_ciphers() adds all encryption algorithms to the table
including password based encryption algorithms. 

EVP_cleanup() removes all ciphers and digests from the table. 

-

This may solve your problem.

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: DH and key space question

2001-07-31 Thread Caliban Tiresias Darklock

On 31 Jul 2001 02:43:12 -0400, Haig C Didizian <[EMAIL PROTECTED]>
wrote:

>I was just wondering if using DH for key negociation (say, to generate a
>128 bit blowfish key) reduces the number of potential keys in a way that
>significantly affects security. 

Okay, this is a VERY BRIEF explanation of DH negotiation. 

The system has two public values A and B. Value A is prime. 

Value B is a little more complex. Specifically, B < A, and for every
positive integer N such that N < A, there exists some number C such that
B to the power of C modulo A = N. 

So, provided value A is sufficiently large, DH does *not* reduce the
number of potential keys. If the bit length of A exceeds the desired
encryption key's bit length, the number of potential encryption keys by
definition exceeds the number of potential *acceptable* encryption keys
because value B will provide at least A-1 keys.

Now, Bob and Joe want to talk. 

Bob selects a positive integer W such that W < (A - 1). He holds onto W,
and computes B to the power of W modulo A to result in a number X. He
sends X to Joe.

Joe also selects a positive integer Y such that Y < (A - 1). He holds
onto Y, and computes B to the power of Y modulo A to result in a number
Z. He sends Z to Bob.

Bob raises Z to the power of W, and Joe raises X to the power of Y.
These two values are identical. (Do the math if you feel so inclined.)
Bob and Joe now have the same value K, and can use it as a symmetric
encryption key.

However, anyone *eavesdropping* can only see parameters X and Z. In
order to obtain K, he must solve for both W and Y -- and this is
computationally infeasible. Even if he knows what A and B are, this is
of no help in solving the problem.

>How much less safe is using a DH key as
>a blowfish key than using a random string, for example?

How do you get that random string from one person to the other? Anyone
eavesdropping will see it and be able to use it for decryption of
traffic. That's the problem DH solves, and it doesn't sacrifice any
existing security to do so. It would, of course, be more secure (and not
subject to man-in-the-middle attacks) to use an asymmetric public-key
algorithm on both ends -- but it would also be significantly slower.

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: problem with certificates

2001-07-30 Thread Caliban Tiresias Darklock

On 30 Jul 2001 19:38:04 -, "ganesh kumar godavari"
<[EMAIL PROTECTED]> wrote:

>*** on the server *
>1906:error:1408A0C1:SSL routines:SSL3_GET_CLIENT_HELLO:no shared cipher:s3_srvr.c:769:
>Error: error in SSL_accept()
>***
>and on the client the connection is being disconnected
>(as there are no common cipheres)

It appears that you have forgotten to call OpenSSL_add_all_algorithms()
before attempting to make the connection. Don't forget to call
EVP_cleanup() to remove them before exiting.

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: TCP/IP with SSL: close TCP/IP socket first?

2001-07-30 Thread Caliban Tiresias Darklock

On Mon, 30 Jul 2001 18:15:04 -0400, Joseph Su <[EMAIL PROTECTED]>
wrote:

>Please excuze me for a simple question. For all intents and purposes, please
>refer to the sample server program included in the OpenSSL package. My
>questions is: why do we need to *CLOSE* the TCP/IP listening socket, i.e.,
>closesocket (listen_sd), before initiating a SSL handshaking process

You don't. Normally, you would keep the listening socket around and
continue listening on it. But the server provided accepts one and only
one connection during the run, so rather than hold onto the listening
socket for no good purpose, it closes it. That's the *conclusion* of the
"accepting connections" phase, and should not be considered part of the
SSL initiation process. The server's one and only reason for accepting
connections is to get a single socket it can do the SSL connection over.

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re:

2001-07-30 Thread Caliban Tiresias Darklock

On Mon, 30 Jul 2001 12:40:37 +0100, "O'SULLIVAN JOHN"
<[EMAIL PROTECTED]> wrote:

>
>Hi everyone,
>I am running Red-Hat Linux Release 7.1 and I am trying to 
>learn how to use OpenSSL from scratch(I have version .9.6.b installed)
>.Could anyone please direct me to some simple, working code to get me
>started .

The distribution archive contains a sample client and server in the
demos/ssl directory. It's reasonably straightforward. The process of
generating certificates is a little convoluted, but there's a HOWTO on
it at http://www.openssl.org/docs/HOWTO/certificates.txt which can be
helpful.

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]