RE: OpenSSL/FIPS Object Module and FIPS compliance - testing some assertions

2012-11-15 Thread Erik Tkal
The term 'FIPS compliant' does not refer to the software capability, but to the 
implementation used to perform the cryptographic operations.  If only one end 
of your connection is in FIPS mode then the full end to end path is not 
necessarily FIPS compliant.  In fact, without some out-of-band mechanism there 
is no way to determine what implementation is being used on the other end since 
the wire protocol is the same.  Otherwise the most you can say is that your end 
of the connection is FIPS compliant.

You can still utilize FIPS approved algorithms without guaranteeing FIPS 
compliance.

....
Erik Tkal
Juniper OAC/UAC/Pulse Development


From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of mclellan, dave
Sent: Tuesday, November 13, 2012 4:26 PM
To: openssl-users@openssl.org
Subject: OpenSSL/FIPS Object Module and FIPS compliance - testing some 
assertions

We are starting our FIPS implementation soon (FIPS OM 2.0 and OpenSSL 1.0.1) 
and I'd like to test out this set of assumptions (or maybe they are 
'assertions')


-  In the context of OpenSSL, FIPS compliance is all about algorithm 
choice.   In FIPS mode (FIPS_mode_set() returns success), weaker algorithms are 
disabled and OpenSSL returns an error if use of them is attempted in FIPS mode.

-  As long as one side of the connection insists that FIPS-approved 
algorithms be used, and as long as the other side is capable and agrees, then 
the two negotiate only a FIPS-approved algorithm.

o   Both sides might be implemented with OpenSSL, but only one of them has to 
be running in FIPS mode for the negotiation to choose a FIPS algorithm.

o   If one side is not implemented with OpenSSL, the same is still true:  as 
long as it can negotiate a shared cipher with an process running in FIPS-mode, 
FIPS compliance is still achieved.

-  Technically the phrase 'FIPS compliant' refers to the software 
capability; it does not describe the quality of an end-to-end connection.   
That is, if a running program is 'FIPS-compliant' it will insure that a safe 
connection will be negotiated, where 'safe connection' means 'a connection 
using a FIPS-approved algorithm'.

Having written these, they now seem like dumb questions, but I'd rather have 
affirmation of assertions and appear dumb than do the wrong thing based on a 
wrong assumption.

Thanks for your advice (Steve...)

+-+-+-+-+-+-+
Dave McLellan, Symmetrix Software Engineering
EMC Corporation, 176 South St, Hopkinton MA
Mail Stop 176-B1 1/P-36
office 508-249-1257, fax 508-497-8027
cell 978-500-2546
+-+-+-+-+-+-+



RE: Question about EVP_get_digestbynid and ECDSA

2012-11-06 Thread Erik Tkal
Eh, I had it right all along, but when I dumped it via x509 later it showed a 
strange OID; seems the directory I was in had an old 0.0.8e OpenSSL.exe...  
*face palm*


Erik Tkal
Juniper OAC/UAC/Pulse Development



-Original Message-
From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of Dr. Stephen Henson
Sent: Monday, November 05, 2012 6:57 PM
To: openssl-users@openssl.org
Subject: Re: Question about EVP_get_digestbynid and ECDSA

On Mon, Nov 05, 2012, Erik Tkal wrote:

> I have a tool that is creating a cert using X509_sign.  I noticed that 
> there are no EVP_MD structs that handle ECDSA properly and found this 
> thread from a while back.
> 

What version of OpenSSL is this for?

For OpenSSL 1.0.0 and later you just pass the correct key and digest in. So if 
you pass an EC key and EVP_sha256() it will use the correct algorithms and set 
up the ASN1 strutucture appropriately.

Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org 
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


RE: Question about EVP_get_digestbynid and ECDSA

2012-11-05 Thread Erik Tkal
I have a tool that is creating a cert using X509_sign.  I noticed that there 
are no EVP_MD structs that handle ECDSA properly and found this thread from a 
while back.

So if the digest passed to X509_sign doesn't indicate the signature algorithm 
to use, it appears that the proper value needs to be set into the X509 somehow? 
 In the sig_alg member?  How is this done (the ASN1 macro stuff makes it hard 
to decode)?  I see a X509_get_signature_type(), but no corresponding _set_ 
method.



Erik Tkal
Juniper OAC/UAC/Pulse Development



-Original Message-
From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of Dr. Stephen Henson
Sent: Thursday, January 19, 2012 7:36 AM
To: openssl-users@openssl.org
Subject: Re: Question about EVP_get_digestbynid and ECDSA

On Wed, Jan 18, 2012, Keith Welter wrote:

> If I call EVP_get_digestbynid with NID_ecdsa_with_SHA256,
> NID_ecdsa_with_SHA384 or NID_ecdsa_with_SHA512 it returns null (on 
> OpenSSL 1.0.0-fips 29 Mar 2010).  I expected it to return EVP_sha256, 
> EVP_sha384 and EVP_sha512 respectively.  Am I supplying the wrong NIDs?
> 

Versions of OpenSSL before 1.0.0 had a horrible hack that linked digests to
signature algorithms. This was removed in 1.0.0 and later and instead it uses
a table mapping signature OIDs to their repective key and digest algorithm
OIDs.

You can use the function OBJ_find_sigid_algs().

Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


RE: ECDH-RSA and TLS 1.2

2012-11-02 Thread Erik Tkal
What if the server has an ECDH certificate?  Would that then be the appropriate 
set of suites?


Erik Tkal
Juniper OAC/UAC/Pulse Development


-Original Message-
From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of Dr. Stephen Henson
Sent: Thursday, November 01, 2012 10:38 PM
To: openssl-users@openssl.org
Subject: Re: ECDH-RSA and TLS 1.2

On Fri, Nov 02, 2012, Abhiram Shandilya wrote:

> Hi Steve, Thanks for your response. I'm just trying to figure out what 
> it takes to get this working - are you of the opinion that an SSL 
> server should not support TLS 1.2 ECDH-RSA cipher suites? Could you also 
> mention why?
> 

Well one reason is that the fixed ECDH cipher suites do not support forward 
secrecy because they always use the same ECDH key.

Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org 
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


RE: id-aes256-GCM command line encrypt+decrypt fail

2012-10-11 Thread Erik Tkal
I think Steve posted a while back that those ciphers require special handling 
and do not work with the enc command yet.


Erik Tkal
Juniper OAC/UAC/Pulse Development


From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of e...@mit.edu
Sent: Thursday, October 11, 2012 12:19 PM
To: openssl-users@openssl.org
Subject: id-aes256-GCM command line encrypt+decrypt fail

Hello,
I am trying to encrypt and decrypt a string using command-line openssl (1.0.1c) 
with the id-aes256-GCM algorithm, but every time it fails

echo -n "bla" | openssl enc -e -id-aes256-GCM -nosalt -a -out t.out
openssl enc -d -id-aes256-GCM -nosalt -a -in t.out

bad decrypt

This is true whether I use manually specified key/IV or password, with or 
without salt. The same commands work with other algorithms. What am I missing?

Thanks
Mark


RE: libs version are 1.0.0 after compiling openssl 1.0.1c

2012-09-26 Thread Erik Tkal
Wouldn't the binary compatibility only work the other way?  I.e. if you have an 
app written against 1.0.0 and then later drop in 1.0.1 binaries (since maybe 
some other app needs that), then that should work and your app should not break.

If you compile against 1.0.1 headers wouldn't the assumption be that you are 
now on the leading edge of the compatibility issue and are using a 1.0.1 
binary?  

....
Erik Tkal
Juniper OAC/UAC/Pulse Development



-Original Message-
From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of sa...@zxid.org
Sent: Wednesday, September 26, 2012 10:13 AM
To: st...@openssl.org; r...@openssl.org
Cc: openssl-users@openssl.org; sa...@zxid.org
Subject: Re: libs version are 1.0.0 after compiling openssl 1.0.1c

"Dr. Stephen Henson"  said:
> On Tue, Sep 25, 2012, Thakur, Praveen Kumar wrote:
> 
> > I don't see any issue if .so files extension is 1.0.0. However, I wanted to 
> > confirm that is this a defect with 1.0.1 release? Or am I missing something.
> 
> The 1.0.1 release should be binary compatible with 1.0.0, any 
> discrepancies should be fixed as they are bugs. For a brief 
> explanation of the versioning scheme see:

When using software compiled against 1.0.1c headers with 1.0.0 libraries from 
debian, I get following core dump

ssl_sess_cert_free, bad reference count

(gdb) bt
#0  0x0053e416 in ?? ()
#1  0x002e1c8f in raise () from /lib/i386-linux-gnu/libc.so.6
#2  0x002e52b5 in abort () from /lib/i386-linux-gnu/libc.so.6
#3  0x00624986 in ssl_sess_cert_free (sc=0x90c6510) at ssl_cert.c:275
#4  0x00626888 in SSL_SESSION_free (ss=0x90b44c8) at ssl_sess.c:280
#5  0x0061f58e in SSL_free (s=0x90a3d00) at ssl_lib.c:219
#6  0x0805018f in hi_close_final (hit=0xbfbd4e78, io=0x90a1458, 
lk=0x81361de "hi_read") at hiios.c:76
#7  0x0804fa2c in hi_close (hit=0xbfbd4e78, io=0x90a1458, 
lk=0x81361de "hi_read") at hiios.c:76
#8  0x08061e67 in hi_read (hit=0xbfbd4e78, io=0x90a1458) at hiread.c:47
#9  0x0805236c in hi_in_out (hit=0xbfbd4e78, io=0x90a1458) at hiios.c:76
#10 0x080540cd in hi_shuffle (hit=0xbfbd4e78, shf=0x90a0d28) at hiios.c:76
#11 0x0804e96b in main (argc=0, argv=0xbfbd4fc4, env=0xbfbd4fc8)
at zxbusd.c:170
(gdb) 

The core dump does not happen if I statically link against 1.0.1c libraries.

The usage is multithreaded server with ClientTLS connection. Nonblocking io 
with epoll loop and delayed accept.

The bug reproduces about 25% of the time. It requires at least 3 threads and 
two TLS clients to reproduce.

Cheers,
--Sampo

> http://www.openssl.org/support/faq.html#MISC8
> 
> Steve.

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


RE: certificate validation issues with openssl 1.0.0 and expired certificates in cafile

2012-09-13 Thread Erik Tkal
I suppose that's a workaround, but doesn't address the root cause.  Windows can 
quite happily handle expired certificates still hanging out in trusted stores; 
I see this all the time as root updates occur and renewed certificates are 
installed.  It seems that a change in OpenSSL broke the previous behaviour that 
allowed this as well, though we can't tell if it's the s_client app or the 
OpenSSL cert store functionality that changed this.

....
Erik Tkal
Juniper OAC/UAC/Pulse Development


From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of Charles Mills
Sent: Thursday, September 13, 2012 9:42 AM
To: openssl-users@openssl.org
Subject: RE: certificate validation issues with openssl 1.0.0 and expired 
certificates in cafile

Would it make sense to delete the expired certificate from the Windows store? 
Duplicate expired/non expired CA certificates sounds to me like a problem 
waiting to happen.

Charles
From: owner-openssl-us...@openssl.org<mailto:owner-openssl-us...@openssl.org> 
[mailto:owner-openssl-us...@openssl.org] On Behalf Of Ashok C
Sent: Thursday, September 13, 2012 12:49 AM
To: openssl-users@openssl.org<mailto:openssl-users@openssl.org>
Subject: Re: certificate validation issues with openssl 1.0.0 and expired 
certificates in cafile

Sending again as the previous email did not appear in list.
Is there some problem with the mailing list?

--
Ashok
On Wed, Sep 12, 2012 at 2:59 PM, Ashok C 
mailto:ash@gmail.com>> wrote:
Hi,

I don't think this question was answered. Could you please reply?

--
Ashok

On Tue, Jul 31, 2012 at 11:13 PM, Klaus Darilion 
mailto:klaus.mailingli...@pernau.at>> wrote:
Hi!

I wrote a small program which dumps all root certificates from Windows 
certificate store into a file. Then I use openssl to connect to Google and 
validate its certificate:

openssl s_client -connect www.google.com:443<http://www.google.com:443> -CAfile 
dump.crt

When using openssl0.9.8k or openssl0.9.8x everything works as expected.

When using openssl1.0.0g or openssl 1.0.1c the certificate validation fails 
with:
  Verify return code: 10 (certificate has expired)

CONNECTED(016C)
depth=2 C = US, O = "VeriSign, Inc.", OU = Class 3 Public Primary Certification 
Authority
verify error:num=10:certificate has expired
notAfter=Jan  7 23:59:59 2004 GMT
verify return:0
---
Certificate chain
 0 s:/C=US/ST=California/L=Mountain View/O=Google 
Inc/CN=www.google.com<http://www.google.com>
   i:/C=ZA/O=Thawte Consulting (Pty) Ltd./CN=Thawte SGC CA
 1 s:/C=ZA/O=Thawte Consulting (Pty) Ltd./CN=Thawte SGC CA
   i:/C=US/O=VeriSign, Inc./OU=Class 3 Public Primary Certification Authority

When analyzing the cafile with the dumped certificates from Windows certificate 
store, I found out that there are two certificates for Verisign with identical 
subject, whereas one is expired, the other not.

X.509 Certificate Information:
Version: 1
Serial Number (hex): 00e49efdf33ae80ecfa5113e19a4240232
Issuer: C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification 
Authority
Validity:
Not Before: Mon Jan 29 00:00:00 UTC 1996
Not After: Wed Jan 07 23:59:59 UTC 2004
Subject: C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification 
Authority
Subject Public Key Algorithm: RSA

X.509 Certificate Information:
Version: 1
Serial Number (hex): 70bae41d10d92934b638ca7b03ccbabf
Issuer: C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification 
Authority
Validity:
Not Before: Mon Jan 29 00:00:00 UTC 1996
Not After: Tue Aug 01 23:59:59 UTC 2028
Subject: C=US,O=VeriSign\, Inc.,OU=Class 3 Public Primary Certification 
Authority
Subject Public Key Algorithm: RSA


Thus, it seems that openssl 0.9.8 just ignores the expired certificate and 
searches if there is another valid one whereas openssl 1.0.0 stop with the 
first expired certificate.

Is the new behavior the intended behavior? Is it possible to have the old 
behavior also in new openssl versions?

Thanks
Klaus

__
OpenSSL Project http://www.openssl.org
User Support Mailing List
openssl-users@openssl.org<mailto:openssl-users@openssl.org>
Automated List Manager   
majord...@openssl.org<mailto:majord...@openssl.org>




RE: openssl on a home LAN

2012-09-11 Thread Erik Tkal
You don't "use OpenSSL" on a home LAN, you use applications or OS layers that 
might use OpenSSL in their implementation.  In general OpenSSL is a toolkit 
that provides cryptography and SSL/TLS implementations.

I think you have to be more specific about what you mean by phrases like 
"connect Windows with Linux".  Do you mean file sharing?  Remote desktop?  
Backup solutions?  Remote command prompts?  Each usage will use some sort of 
enabling technology that you would have to research to determine its security, 
and many of these solutions might just as well already be using OpenSSL.

....
Erik Tkal
Juniper OAC/UAC/Pulse Development


From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of John A. Wallace
Sent: Tuesday, September 11, 2012 12:36 PM
To: openssl-users@openssl.org
Subject: openssl on a home LAN


I am trying to figure out whether there is any point in using openssl on a home 
LAN between two computers. Would that improve on security in any way?  Would I 
be limited in the types of OS connections? I mean, could I connect Windows with 
Linux? Also, if I want to make such a connection between two OS running in 
virtual machines, could that be done too? Thanks.


RE: SSL_CTX_set_options not working for SSL_OP_NO_TLSv1_1

2012-08-31 Thread Erik Tkal
Hi Gerhard,

I have been playing with those options myself and your scenario should work.  
Try using s_server -no_ssl2 -no_ssl3 -no_tls1 -no_tls1_1 in conjunction with 
s_client -tls1_1.  This sets exactly the options you indicate and it fails to 
connect.

It's not clear from your code, but make sure you are setting those options on 
the SSL_CTX before you create an SSL session from that context.

  Erik


Erik Tkal
Juniper OAC/UAC/Pulse Development


From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of Jahn, Gerhard
Sent: Friday, August 31, 2012 5:33 AM
To: 'openssl-users@openssl.org'
Subject: SSL_CTX_set_options not working for SSL_OP_NO_TLSv1_1


Hello,

I'm usinng OpenSSL 1.0.1c in my Server application.
This application can be configured to disallow accepting certain SSL/TLS 
protocols.

If only TLS1.2 shall be allowed, the application calls

meth=(SSL_METHOD*) SSLv23_server_method();
OpenSSLctx=SSL_CTX_new(meth);

.

SSL_CTX_set_options(OpenSSLctx, SSL_OP_NO_SSLv2);  // never use SSL2

if (!allowed_ssl3)
   SSL_CTX_set_options(OpenSSLctx, SSL_OP_NO_SSLv3);

if (!allowed_tls1)
   SSL_CTX_set_options(OpenSSLctx, SSL_OP_NO_TLSv1);

if (!allowed_tls11)
   SSL_CTX_set_options(OpenSSLctx, SSL_OP_NO_TLSv1_1);

if (!allowed_tls12)
   SSL_CTX_set_options(OpenSSLctx, SSL_OP_NO_TLSv1_2);



In the case where:

 allowed_ssl3 = allowed_tls1 = allowed_tls11 = FALSE   and  allowed_tls12 = 
TRUE

I'd expect that I cannot establish a TLS11  connection, but it does

Same is true if only SSLv3  or TLSv10 is allowed.

Am I doing something wrong?


Mit freundlichen Grüßen/Regards

[cid:image001.jpg@01CD8791.C41153D0]
Gerhard Jahn
Tel.: +49 (89) 636-44657
Tel.: +49 (211) 399 22891
Fax: +49 (89) 636-45860
mailto:gerhard.j...@atos.net
Otto-Hahn-Ring 6
81739 München, Deutschland
Germany
atos.net
[cid:image002.jpg@01CD8791.C41153D0]


Atos IT Solutions and Services GmbH
Geschäftsführung: Winfried Holz, Udo Littke;  Vorsitzender des Aufsichtsrats: 
Charles Dehelly;
Sitz der Gesellschaft: München, Deutschland; Registergericht: München, HRB 
184933.

Atos IT Solutions and Services GmbH, Legal Form: Limited Liability Company 
[GmbH];
Managing Directors: Winfried Holz, Udo Littke; Chairman of the Supervisory 
Board: Charles Dehelly;
Registered Office: Munich, Germany; District Court: Munich, HRB 184933.



<><>

RE: Negotiating TLS 1.0 from 1.2

2012-08-29 Thread Erik Tkal
TLS 1.1 would be acceptable, but the server is 1.0 (we don't have any 
implementing 1.1).  The server sends a TLS 1.0 ServerHello, which per the RFC 
should work:

   A TLS 1.2 client who wishes to negotiate with such older servers will
   send a normal TLS 1.2 ClientHello, containing { 3, 3 } (TLS 1.2) in
   ClientHello.client_version.  If the server does not support this
   version, it will respond with a ServerHello containing an older
   version number.  If the client agrees to use this version, the
   negotiation will proceed as appropriate for the negotiated protocol.

What I'm trying to figure out is how to tell OpenSSL that the client agrees to 
use this version, whereas now it generates a fatal alert.  I cannot use an 
SSLv2 handshake, as this is inside EAP-TLS.


....
Erik Tkal
Juniper OAC/UAC/Pulse Development



-Original Message-
From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of Abhiram Shandilya
Sent: Wednesday, August 29, 2012 2:38 PM
To: openssl-users@openssl.org
Subject: RE: Negotiating TLS 1.0 from 1.2

Hi Erik:
If you only want to allow TLSv1.2 and TLSv1.0 handshakes you will need to try a 
connection with the TLSv1_2_client_method and then by TLSv1_client_method. You 
can also use SSLv23_client_method to negotiate only TLSv1.2 and TLSv1.0 using 
an SSLv2 handshake by explicitly disabling SSLv2, SSLv3 and TLSv1.1 using 
SSL_CTX_set_options(ctx, SSL_OP_NO_SSLv2|SSL_OP_NO_SSLv3|SSL_OP_NO_TLSv1_1). At 
least that's my understanding.
Regards
Abhi

-Original Message-
From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of Erik Tkal
Sent: Wednesday, August 29, 2012 10:47 AM
To: openssl-users@openssl.org
Subject: Negotiating TLS 1.0 from 1.2

I have a client that I want to attempt to negotiate TLS 1.2 but will accept TLS 
1.0.  What is the magic incantation (e.g. TLSv1_client_method() vs 
TLSv1_2_client_method() in conjunction with what options)?

Specifying TLSv1_client_method() seems to only offer TLS 1.0 {3,1}.  Specifying 
TLSv1_2_client_method() offers TLS 1.2 {3,3}, but then when the server returns 
a TLS 1.0 {3,1} ServerHello, the client generates a Protocol Version alert.

How do I tell the client that this is acceptable?  Appendix E of RFC 5246 
indicates this should be possible.

I am using OpenSSL 1.0.1c.


....
Erik Tkal
Juniper OAC/UAC/Pulse Development

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Negotiating TLS 1.0 from 1.2

2012-08-29 Thread Erik Tkal
I have a client that I want to attempt to negotiate TLS 1.2 but will accept TLS 
1.0.  What is the magic incantation (e.g. TLSv1_client_method() vs 
TLSv1_2_client_method() in conjunction with what options)?

Specifying TLSv1_client_method() seems to only offer TLS 1.0 {3,1}.  Specifying 
TLSv1_2_client_method() offers TLS 1.2 {3,3}, but then when the server returns 
a TLS 1.0 {3,1} ServerHello, the client generates a Protocol Version alert.

How do I tell the client that this is acceptable?  Appendix E of RFC 5246 
indicates this should be possible.

I am using OpenSSL 1.0.1c.



Erik Tkal
Juniper OAC/UAC/Pulse Development

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


RE: p2q RSA key augmentation

2012-08-09 Thread Erik Tkal
I don't believe OpenSSL has any mechanism to directly calculate P and Q; this 
requires an iterative process.  Once you have those, however, calculating the 
rest are simple calculations using the BN library.



Erik Tkal
Juniper OAC/UAC/Pulse Development



-Original Message-
From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of David Madden
Sent: Thursday, August 09, 2012 5:11 PM
To: openssl-users@openssl.org
Subject: p2q RSA key augmentation

Hi, I have an RSA key { D, E, N } generated by another library.  I can use 
OpenSSL to encrypt & decrypt interoperably, but I would like to extend the key 
with the other factors OpenSSL uses to work faster (factors P, Q, DMP1, DMQ1, 
IQMP).  Is there a library function that computes these other factors?

Thanks,
--
Mersenne Law LLC  *  www.mersenne.com  *  +1-503-679-1671
- Small Business, Startup and Intellectual Property Law -
1500 SW First Ave. * Suite 1170 * Portland, Oregon  97201 
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


RE: ECDSA testing with s_client/s_server

2012-08-06 Thread Erik Tkal
Hi Steve,

Thanks, that certainly corrected it.  I guess I'm perplexed as to why using

ecgroup = EC_GROUP_new_by_curve_name(NID_X9_62_prime256v1);

would not automatically set that flag since I'm explicitly giving the curve 
name already?

  Thanks,
  Erik

....
Erik Tkal
Juniper OAC/UAC/Pulse Development


On Fri, Aug 03, 2012, Steve wrote:

OK, you've got the parameters explicitly encoded instead of using a named 
curved. When you generate the key try calling:

EC_GROUP_set_asn1_flag(group, OPENSSL_EC_NAMED_CURVE);

Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org 
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


RE: ECDSA testing with s_client/s_server

2012-08-03 Thread Erik Tkal
Hi Steve, here's the cert:

Certificate:
Data:
Version: 3 (0x2)
Serial Number: 34474 (0x86aa)
Signature Algorithm: ecdsa-with-SHA256
Issuer: CN=eRoot1, OU=Engineering, O=Juniper Networks, Inc., 
L=Westford, ST=MA, C=US
Validity
Not Before: Aug  1 19:04:20 2012 GMT
Not After : Jul 30 19:04:20 2022 GMT
Subject: CN=eServer1, OU=Engineering, O=Juniper Networks, Inc., 
L=Westford, ST=MA, C=US
Subject Public Key Info:
Public Key Algorithm: id-ecPublicKey
Public-Key: (256 bit)
pub:
04:e9:7e:4c:b3:44:eb:21:a4:15:9d:9a:2e:5e:e3:
3c:09:19:22:36:cf:01:ee:dc:b8:67:1b:78:30:e0:
dd:4c:7f:95:38:24:f1:0c:7d:1c:2b:ab:b8:67:b7:
ef:42:9c:b6:df:fd:49:fb:1a:85:57:c1:e4:5a:e4:
b6:7c:4b:40:3b
Field Type: prime-field
Prime:
00:ff:ff:ff:ff:00:00:00:01:00:00:00:00:00:00:
00:00:00:00:00:00:ff:ff:ff:ff:ff:ff:ff:ff:ff:
ff:ff:ff
A:
00:ff:ff:ff:ff:00:00:00:01:00:00:00:00:00:00:
00:00:00:00:00:00:ff:ff:ff:ff:ff:ff:ff:ff:ff:
ff:ff:fc
B:
5a:c6:35:d8:aa:3a:93:e7:b3:eb:bd:55:76:98:86:
bc:65:1d:06:b0:cc:53:b0:f6:3b:ce:3c:3e:27:d2:
60:4b
Generator (uncompressed):
04:6b:17:d1:f2:e1:2c:42:47:f8:bc:e6:e5:63:a4:
40:f2:77:03:7d:81:2d:eb:33:a0:f4:a1:39:45:d8:
98:c2:96:4f:e3:42:e2:fe:1a:7f:9b:8e:e7:eb:4a:
7c:0f:9e:16:2b:ce:33:57:6b:31:5e:ce:cb:b6:40:
68:37:bf:51:f5
Order:
00:ff:ff:ff:ff:00:00:00:00:ff:ff:ff:ff:ff:ff:
ff:ff:bc:e6:fa:ad:a7:17:9e:84:f3:b9:ca:c2:fc:
63:25:51
Cofactor:  1 (0x1)
Seed:
c4:9d:36:08:86:e7:04:93:6a:66:78:e1:13:9d:26:
b7:81:9f:7e:90
X509v3 extensions:
X509v3 Subject Key Identifier:
E5:15:BA:0A:AB:56:A3:4C:47:4E:54:6D:21:93:0E:98:3B:CB:E9:3B
X509v3 Subject Alternative Name:
DNS:eserver1.juniper.net
X509v3 Authority Key Identifier:

keyid:F8:87:1E:2B:4D:8D:F1:96:B9:9A:D8:BA:15:D0:75:FF:F4:1A:A4:9C
DirName:/CN=eRoot1/OU=Engineering/O=Juniper Networks, 
Inc./L=Westford/ST=MA/C=US
serial:D3:27

X509v3 Key Usage:
Digital Signature
X509v3 Extended Key Usage:
TLS Web Server Authentication
X509v3 CRL Distribution Points:

Full Name:
  URI:http://localhost/pkitool/eroot1/eroot1.crl

Signature Algorithm: ecdsa-with-SHA256
 30:45:02:21:00:d2:30:0d:5f:5c:61:45:ef:23:a5:ae:04:3a:
 ca:50:d0:a0:54:ca:ce:93:1c:b7:8a:04:19:b3:9f:ed:b4:1b:
 f0:02:20:33:7b:55:bd:b8:df:ca:e5:42:db:49:e3:23:8a:f9:
 5d:6b:09:d2:b1:13:c8:60:46:0b:99:57:80:4d:ef:19:42
-BEGIN CERTIFICATE-
MIIEGjCCA8CgAwIBAgIDAIaqMAoGCCqGSM49BAMCMHUxDzANBgNVBAMTBmVSb290
MTEUMBIGA1UECxMLRW5naW5lZXJpbmcxHzAdBgNVBAoTFkp1bmlwZXIgTmV0d29y
a3MsIEluYy4xETAPBgNVBAcTCFdlc3Rmb3JkMQswCQYDVQQIEwJNQTELMAkGA1UE
BhMCVVMwHhcNMTIwODAxMTkwNDIwWhcNMjIwNzMwMTkwNDIwWjB3MREwDwYDVQQD
EwhlU2VydmVyMTEUMBIGA1UECxMLRW5naW5lZXJpbmcxHzAdBgNVBAoTFkp1bmlw
ZXIgTmV0d29ya3MsIEluYy4xETAPBgNVBAcTCFdlc3Rmb3JkMQswCQYDVQQIEwJN
QTELMAkGA1UEBhMCVVMwggFLMIIBAwYHKoZIzj0CATCB9wIBATAsBgcqhkjOPQEB
AiEA/wEAAAD///8wWwQg/wEA
AAD///wEIFrGNdiqOpPns+u9VXaYhrxlHQawzFOw
9jvOPD4n0mBLAxUAxJ02CIbnBJNqZnjhE50mt4GffpAEQQRrF9Hy4SxCR/i85uVj
pEDydwN9gS3rM6D0oTlF2JjClk/jQuL+Gn+bjufrSnwPnhYrzjNXazFezsu2QGg3
v1H1AiEA/wD//7zm+q2nF56E87nKwvxjJVECAQEDQgAE6X5M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==
-END CERTIFICATE-



Erik Tkal
Juniper OAC/UAC/Pulse Development



-Original Message-
From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of Dr. Stephen Henson
Sent: Friday, August 03, 2012 5:57 PM
To: op

RE: ECDSA testing with s_client/s_server

2012-08-03 Thread Erik Tkal
I debugged this to see what is happening, and it seems that the server is 
looking at the configured certificate and key and deciding that the client 
needs to be sending 0xFF01 (it is finding NID_X9_62_prime_field as the field 
type).  However, the client is sending the full list of standard named curves.

I create the key using NID_X9_62_prime256v1 as follows (abbreviated):

EVP_PKEY*   key = NULL;
EC_KEY* eck = NULL;
BIGNUM* e = NULL;
EC_GROUP*   ecgroup = NULL;

eck = EC_KEY_new();
if ( !eck )
goto err;
ecgroup = EC_GROUP_new_by_curve_name(NID_X9_62_prime256v1);
if ( !ecgroup )
goto err;
if ( !EC_KEY_set_group(eck, ecgroup) )
goto err;
if( !EC_KEY_generate_key( eck ) )
goto err;
if( !EVP_PKEY_assign_EC_KEY( key, eck ) )
goto err;
EC_GROUP_free(ecgroup);

Is there something I am doing incorrectly to generate the EC key?


Erik Tkal
Juniper OAC/UAC/Pulse Development



-Original Message-
From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of Erik Tkal
Sent: Wednesday, August 01, 2012 4:33 PM
To: openssl-users@openssl.org
Subject: ECDSA testing with s_client/s_server

I'm playing around to see if I can observe client and server under various 
conditions when negotiating TLS 1.2 with newer certs.  I created a root and 
server cert as ecdsa-with-SHA256.

openssl s_server -CAfile eroot1.pem -cert eserver1.pem -key eserver1.key -debug

openssl s_client -CAfile eroot1.pem -debug

However, the server issues a handshake alert and says no shared cipher.  I see 
the client is sending a large set of suites but apparently none that the server 
wants.  How do I do this properly?

ACCEPT
read from 0x147cb28 [0x1489e60] (11 bytes => 11 (0xB))
 - 16 03 01 01 3c 01 00 01-38 03 03  <...8..
read from 0x147cb28 [0x1489e6e] (310 bytes => 310 (0x136))
 - 50 19 91 ea 00 45 14 d9-c4 bc 4d 15 a1 e5 0a a3   PEM.
0010 - f4 89 1d a5 98 37 2d 28-14 a2 19 47 b4 92 e8 dd   .7-(...G
0020 - 00 00 a0 c0 30 c0 2c c0-28 c0 24 c0 14 c0 0a c0   0.,.(.$.
0030 - 22 c0 21 00 a3 00 9f 00-6b 00 6a 00 39 00 38 00   ".!.k.j.9.8.
0040 - 88 00 87 c0 32 c0 2e c0-2a c0 26 c0 0f c0 05 00   2...*.&.
0050 - 9d 00 3d 00 35 00 84 c0-12 c0 08 c0 1c c0 1b 00   ..=.5...
0060 - 16 00 13 c0 0d c0 03 00-0a c0 2f c0 2b c0 27 c0   ../.+.'.
0070 - 23 c0 13 c0 09 c0 1f c0-1e 00 a2 00 9e 00 67 00   #.g.
0080 - 40 00 33 00 32 00 9a 00-99 00 45 00 44 c0 31 c0   @.3.2.E.D.1.
0090 - 2d c0 29 c0 25 c0 0e c0-04 00 9c 00 3c 00 2f 00   -.).%...<./.
00a0 - 96 00 41 00 07 c0 11 c0-07 c0 0c c0 02 00 05 00   ..A.
00b0 - 04 00 15 00 12 00 09 00-14 00 11 00 08 00 06 00   
00c0 - 03 00 ff 01 00 00 6f 00-0b 00 04 03 00 01 02 00   ..o.
00d0 - 0a 00 34 00 32 00 0e 00-0d 00 19 00 0b 00 0c 00   ..4.2...
00e0 - 18 00 09 00 0a 00 16 00-17 00 08 00 06 00 07 00   
00f0 - 14 00 15 00 04 00 05 00-12 00 13 00 01 00 02 00   
0100 - 03 00 0f 00 10 00 11 00-23 00 00 00 0d 00 22 00   #.".
0110 - 20 06 01 06 02 06 03 05-01 05 02 05 03 04 01 04...
0120 - 02 04 03 03 01 03 02 03-03 02 01 02 02 02 03 01   
0130 - 01 00 0f 00 01 01 ..
write to 0x147cb28 [0x1493870] (7 bytes => 7 (0x7))
 - 15 03 03 00 02 02 28  ..(
ERROR
5368:error:1408A0C1:SSL routines:SSL3_GET_CLIENT_HELLO:no shared 
cipher:.\ssl\s3_srvr.c:1353:
shutting down SSL
CONNECTION CLOSED

....
Erik Tkal
Juniper OAC/UAC/Pulse Development

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


ECDSA testing with s_client/s_server

2012-08-01 Thread Erik Tkal
I'm playing around to see if I can observe client and server under various 
conditions when negotiating TLS 1.2 with newer certs.  I created a root and 
server cert as ecdsa-with-SHA256.

openssl s_server -CAfile eroot1.pem -cert eserver1.pem -key eserver1.key -debug

openssl s_client -CAfile eroot1.pem -debug

However, the server issues a handshake alert and says no shared cipher.  I see 
the client is sending a large set of suites but apparently none that the server 
wants.  How do I do this properly?

ACCEPT
read from 0x147cb28 [0x1489e60] (11 bytes => 11 (0xB))
 - 16 03 01 01 3c 01 00 01-38 03 03  <...8..
read from 0x147cb28 [0x1489e6e] (310 bytes => 310 (0x136))
 - 50 19 91 ea 00 45 14 d9-c4 bc 4d 15 a1 e5 0a a3   PEM.
0010 - f4 89 1d a5 98 37 2d 28-14 a2 19 47 b4 92 e8 dd   .7-(...G
0020 - 00 00 a0 c0 30 c0 2c c0-28 c0 24 c0 14 c0 0a c0   0.,.(.$.
0030 - 22 c0 21 00 a3 00 9f 00-6b 00 6a 00 39 00 38 00   ".!.k.j.9.8.
0040 - 88 00 87 c0 32 c0 2e c0-2a c0 26 c0 0f c0 05 00   2...*.&.
0050 - 9d 00 3d 00 35 00 84 c0-12 c0 08 c0 1c c0 1b 00   ..=.5...
0060 - 16 00 13 c0 0d c0 03 00-0a c0 2f c0 2b c0 27 c0   ../.+.'.
0070 - 23 c0 13 c0 09 c0 1f c0-1e 00 a2 00 9e 00 67 00   #.g.
0080 - 40 00 33 00 32 00 9a 00-99 00 45 00 44 c0 31 c0   @.3.2.E.D.1.
0090 - 2d c0 29 c0 25 c0 0e c0-04 00 9c 00 3c 00 2f 00   -.).%...<./.
00a0 - 96 00 41 00 07 c0 11 c0-07 c0 0c c0 02 00 05 00   ..A.
00b0 - 04 00 15 00 12 00 09 00-14 00 11 00 08 00 06 00   
00c0 - 03 00 ff 01 00 00 6f 00-0b 00 04 03 00 01 02 00   ..o.
00d0 - 0a 00 34 00 32 00 0e 00-0d 00 19 00 0b 00 0c 00   ..4.2...
00e0 - 18 00 09 00 0a 00 16 00-17 00 08 00 06 00 07 00   
00f0 - 14 00 15 00 04 00 05 00-12 00 13 00 01 00 02 00   
0100 - 03 00 0f 00 10 00 11 00-23 00 00 00 0d 00 22 00   #.".
0110 - 20 06 01 06 02 06 03 05-01 05 02 05 03 04 01 04...
0120 - 02 04 03 03 01 03 02 03-03 02 01 02 02 02 03 01   
0130 - 01 00 0f 00 01 01 ..
write to 0x147cb28 [0x1493870] (7 bytes => 7 (0x7))
 - 15 03 03 00 02 02 28  ..(
ERROR
5368:error:1408A0C1:SSL routines:SSL3_GET_CLIENT_HELLO:no shared 
cipher:.\ssl\s3_srvr.c:1353:
shutting down SSL
CONNECTION CLOSED

....
Erik Tkal
Juniper OAC/UAC/Pulse Development

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


RE: SSL compression

2012-07-31 Thread Erik Tkal
In your client app are you setting the options on the SSL_CTX *before* you call 
SSL_new()?


Erik Tkal
Juniper OAC/UAC/Pulse Development


From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of Sebastian Raymond
Sent: Tuesday, July 31, 2012 4:18 PM
To: openssl-users@openssl.org
Subject: Re: SSL compression

Its not yet clear for me.

What should be done to disable the compression? Since, the server is not going 
to be the openssl s_server.
On Tue, Jul 31, 2012 at 7:35 PM, Sebastian Raymond 
mailto:ray.s...@gmail.com>> wrote:
Hello,

I have tried following:
1.
$openssl s_server -accept 443 -cert server.crt -key server.key
Result-> Client offered deflate compression and server selected compression 
method.

2.
$openssl s_server -accept 443 -cert server.crt -key server.key -no_comp
Result-> Client offered deflate compression and this time, server selected null 
method.

On Tue, Jul 31, 2012 at 7:16 PM, Dr. Stephen Henson 
mailto:st...@openssl.org>> wrote:
On Tue, Jul 31, 2012, Sebastian Raymond wrote:

> Hello,
>
> I have written a SSL client program to talk with SSL server.
>
> I have a linux machine and Openssl 1.0.0e is installed with zlib enabled.
> That means, deflate compression method is supported.
>
> I want to transfer the data without compression. Therefore, I used
> following to disable the compression.
>
> SSL_CTX_set_options(ctx, SSL_OP_NO_COMPRESSION);
>
> Where ctx is SSL_CTX object.
>
> When I inspect the traffic in Wireshark, I still see that my client program
> is offering deflate compression method and server is replying with server
> hello that chooses deflate as compression.
>
What happens if you try this with the s_server utility and the -no_comp
command line option?

Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org
__
OpenSSL Project http://www.openssl.org
User Support Mailing List
openssl-users@openssl.org<mailto:openssl-users@openssl.org>
Automated List Manager   
majord...@openssl.org<mailto:majord...@openssl.org>


--
Regards,
Sebastian



--
Regards,
Sebastian


RE: OpenSSL Library: Only BIGNUM functions

2012-06-22 Thread Erik Tkal
If you build the OpenSSL crypto as a static library you should be able to 
utilize it without including everything else in your app, depending on your 
compiler/linker options.



Erik Tkal
Juniper OAC/UAC/Pulse Development


-Original Message-
From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of chip...@gmx.de
Sent: Friday, June 22, 2012 9:08 AM
To: openssl-users@openssl.org
Subject: Re: OpenSSL Library: Only BIGNUM functions

Thank you, that sounds interesting. I'll look at it.
But is there really no possibilty to get OpenSSL library smaller, only with 
BIGNUMs. I ask that because I did very much with these functions.

Thank you.


 Original-Nachricht 
> Datum: Fri, 22 Jun 2012 13:04:02 +0100
> Von: "Matt Caswell (fr...@baggins.org)" 
> An: openssl-users@openssl.org
> Betreff: Re: OpenSSL Library: Only BIGNUM functions

> As an alternative have you considered using the GMP library? That 
> library is much more focussed on providing multi-precision arithmetic 
> as opposed to crypto , so I would expect it to be a lot smaller.
> 
> http://gmplib.org/
> 
> Matt
> 
> On 22 June 2012 12:57,   wrote:
> > Hi,
> >
> > I have to create a program, which has to be as small as possible, 
> > but it
> should use the BIGNUM functions from the OpenSSL library, because it 
> has to work with large numbers. Is there a possibilty to compile a 
> library, which just contains the BIGNUMs functions. I don't need any 
> special features like rsa or dsa.
> > At the moment I build the OpenSSL library with as little ciphers as
> possible. Unfortunately I cannot deactivate all of them, because then 
> the library doesn't compile. The library is now about 1,59Mb and I 
> think this is just a little bit too much for only the BIGNUM functions.
> > Another possibilty could be to just copy the source code which is in 
> > the
> bn-directory. But it doesn't compile because there are many 
> dependencies from other parts around this directory.
> > Has anyone a version which just contains the BIGNUM functions?
> >
> > Thank you for your help.
> > --
> > Empfehlen Sie GMX DSL Ihren Freunden und Bekannten und wir belohnen 
> > Sie mit bis zu 50,- Euro! https://freundschaftswerbung.gmx.de
> > 
> > __ OpenSSL Project
> http://www.openssl.org
> > User Support Mailing List
>  openssl-users@openssl.org
> > Automated List Manager
> majord...@openssl.org
> __
> OpenSSL Project http://www.openssl.org
> User Support Mailing Listopenssl-users@openssl.org
> Automated List Manager   majord...@openssl.org

--
Empfehlen Sie GMX DSL Ihren Freunden und Bekannten und wir belohnen Sie mit bis 
zu 50,- Euro! https://freundschaftswerbung.gmx.de
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


RE: Error: can't resolve symbol 'X509_sign_ctx'

2012-06-12 Thread Erik Tkal
In fact a quick compare of x509.h shows that the X509_sign_ctx entry point is 
new in OpenSSL 1.0.1.



Erik Tkal
Juniper OAC/UAC/Pulse Development



-Original Message-
From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of Erik Tkal
Sent: Tuesday, June 12, 2012 8:02 AM
To: openssl-users@openssl.org
Subject: RE: Error: can't resolve symbol 'X509_sign_ctx'

Hi Eric,

So it looks like your /usr/bin/openssl binary is built from OpenSSL 1.0.1, but 
the shared libraries in /usr/lib are from 1.0.0?  I'm not too familiar with how 
linux library resolution works, but don't you need the 1.0.1 libs copied to the 
/usr/lib folder?  I don't think 1.0.1 and 1.0.0 are binary compatible (only the 
sub-releases that are lettered).


....
Erik Tkal
Juniper OAC/UAC/Pulse Development



-Original Message-
From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of exvance
Sent: Monday, June 11, 2012 3:40 PM
To: openssl-users@openssl.org
Subject: RE: Error: can't resolve symbol 'X509_sign_ctx'


Hi Erik,

Here is the output:

~~# which openssl
/usr/bin/openssl

root@ph:~# openssl version
OpenSSL 1.0.1c 10 May 2012 (Library: OpenSSL 1.0.0e 6 Sep 2011)

Thanks for any info you can provide!

Eric


Erik Tkal wrote:
> 
> What's the output of 'which openssl' and 'openssl version'?
> 
> 
> 
> Erik Tkal
> Juniper OAC/UAC/Pulse Development
> 
> 
> 
> -Original Message-
> From: owner-openssl-us...@openssl.org
> [mailto:owner-openssl-us...@openssl.org] On Behalf Of exvance
> Sent: Saturday, June 09, 2012 12:50 PM
> To: openssl-users@openssl.org
> Subject: Re: Error: can't resolve symbol 'X509_sign_ctx'
> 
> 
> Hi Alexander,
> 
> Thanks for the reply!!  Here is my output:
> 
> ldd `which openssl`
> libssl.so.1.0.0 => /usr/lib/libssl.so.1.0.0 (0x2b384000)
> libcrypto.so.1.0.0 => /usr/lib/libcrypto.so.1.0.0 (0x2b3d4000)
> libdl.so.0 => /lib/libdl.so.0 (0x2b4f4000)
> libgcc_s.so.1 => /lib/libgcc_s.so.1 (0x2b507000)
> libc.so.0 => /lib/libc.so.0 (0x2b52a000)
> ld-uClibc.so.0 => /lib/ld-uClibc.so.0 (0x2b36c000)
> 
> Is that what you are looking for?
> 
> Thanks,
> 
> Eric
> 
> 
> Alexander Komyagin-3 wrote:
>> 
>> Hi! Can you post the output for
>> 
>> $ldd `which openssl`
>> 
>> command (run it without leading $)?
>> 
>> --
>> Best wishes,
>> Alexander Komyagin
>> 
>> __
>> OpenSSL Project http://www.openssl.org
>> User Support Mailing Listopenssl-users@openssl.org
>> Automated List Manager   majord...@openssl.org
>> 
>> 
> --
> View this message in context:
> http://old.nabble.com/Error%3A-can%27t-resolve-symbol-%27X509_sign_ctx
> %27-tp33984978p33986612.html Sent from the OpenSSL - User mailing list 
> archive at Nabble.com.
> __
> OpenSSL Project http://www.openssl.org
> User Support Mailing Listopenssl-users@openssl.org
> Automated List Manager   majord...@openssl.org
> __
> OpenSSL Project http://www.openssl.org
> User Support Mailing Listopenssl-users@openssl.org
> Automated List Manager   majord...@openssl.org
> 
> 

--
View this message in context: 
http://old.nabble.com/Error%3A-can%27t-resolve-symbol-%27X509_sign_ctx%27-tp33984978p33995851.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


RE: Error: can't resolve symbol 'X509_sign_ctx'

2012-06-12 Thread Erik Tkal
Hi Eric,

So it looks like your /usr/bin/openssl binary is built from OpenSSL 1.0.1, but 
the shared libraries in /usr/lib are from 1.0.0?  I'm not too familiar with how 
linux library resolution works, but don't you need the 1.0.1 libs copied to the 
/usr/lib folder?  I don't think 1.0.1 and 1.0.0 are binary compatible (only the 
sub-releases that are lettered).


....
Erik Tkal
Juniper OAC/UAC/Pulse Development



-Original Message-
From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of exvance
Sent: Monday, June 11, 2012 3:40 PM
To: openssl-users@openssl.org
Subject: RE: Error: can't resolve symbol 'X509_sign_ctx'


Hi Erik,

Here is the output:

~~# which openssl
/usr/bin/openssl

root@ph:~# openssl version
OpenSSL 1.0.1c 10 May 2012 (Library: OpenSSL 1.0.0e 6 Sep 2011)

Thanks for any info you can provide!

Eric


Erik Tkal wrote:
> 
> What's the output of 'which openssl' and 'openssl version'?
> 
> 
> 
> Erik Tkal
> Juniper OAC/UAC/Pulse Development
> 
> 
> 
> -Original Message-
> From: owner-openssl-us...@openssl.org
> [mailto:owner-openssl-us...@openssl.org] On Behalf Of exvance
> Sent: Saturday, June 09, 2012 12:50 PM
> To: openssl-users@openssl.org
> Subject: Re: Error: can't resolve symbol 'X509_sign_ctx'
> 
> 
> Hi Alexander,
> 
> Thanks for the reply!!  Here is my output:
> 
> ldd `which openssl`
> libssl.so.1.0.0 => /usr/lib/libssl.so.1.0.0 (0x2b384000)
> libcrypto.so.1.0.0 => /usr/lib/libcrypto.so.1.0.0 (0x2b3d4000)
> libdl.so.0 => /lib/libdl.so.0 (0x2b4f4000)
> libgcc_s.so.1 => /lib/libgcc_s.so.1 (0x2b507000)
> libc.so.0 => /lib/libc.so.0 (0x2b52a000)
> ld-uClibc.so.0 => /lib/ld-uClibc.so.0 (0x2b36c000)
> 
> Is that what you are looking for?
> 
> Thanks,
> 
> Eric
> 
> 
> Alexander Komyagin-3 wrote:
>> 
>> Hi! Can you post the output for
>> 
>> $ldd `which openssl`
>> 
>> command (run it without leading $)?
>> 
>> --
>> Best wishes,
>> Alexander Komyagin
>> 
>> __
>> OpenSSL Project http://www.openssl.org
>> User Support Mailing Listopenssl-users@openssl.org
>> Automated List Manager   majord...@openssl.org
>> 
>> 
> --
> View this message in context:
> http://old.nabble.com/Error%3A-can%27t-resolve-symbol-%27X509_sign_ctx
> %27-tp33984978p33986612.html Sent from the OpenSSL - User mailing list 
> archive at Nabble.com.
> __
> OpenSSL Project http://www.openssl.org
> User Support Mailing Listopenssl-users@openssl.org
> Automated List Manager   majord...@openssl.org
> __
> OpenSSL Project http://www.openssl.org
> User Support Mailing Listopenssl-users@openssl.org
> Automated List Manager   majord...@openssl.org
> 
> 

--
View this message in context: 
http://old.nabble.com/Error%3A-can%27t-resolve-symbol-%27X509_sign_ctx%27-tp33984978p33995851.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


RE: Error: can't resolve symbol 'X509_sign_ctx'

2012-06-11 Thread Erik Tkal
What's the output of 'which openssl' and 'openssl version'?


....
Erik Tkal
Juniper OAC/UAC/Pulse Development



-Original Message-
From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of exvance
Sent: Saturday, June 09, 2012 12:50 PM
To: openssl-users@openssl.org
Subject: Re: Error: can't resolve symbol 'X509_sign_ctx'


Hi Alexander,

Thanks for the reply!!  Here is my output:

ldd `which openssl`
libssl.so.1.0.0 => /usr/lib/libssl.so.1.0.0 (0x2b384000)
libcrypto.so.1.0.0 => /usr/lib/libcrypto.so.1.0.0 (0x2b3d4000)
libdl.so.0 => /lib/libdl.so.0 (0x2b4f4000)
libgcc_s.so.1 => /lib/libgcc_s.so.1 (0x2b507000)
libc.so.0 => /lib/libc.so.0 (0x2b52a000)
ld-uClibc.so.0 => /lib/ld-uClibc.so.0 (0x2b36c000)

Is that what you are looking for?

Thanks,

Eric


Alexander Komyagin-3 wrote:
> 
> Hi! Can you post the output for
> 
> $ldd `which openssl`
> 
> command (run it without leading $)?
> 
> -- 
> Best wishes,
> Alexander Komyagin
> 
> __
> OpenSSL Project http://www.openssl.org
> User Support Mailing Listopenssl-users@openssl.org
> Automated List Manager   majord...@openssl.org
> 
> 
-- 
View this message in context: 
http://old.nabble.com/Error%3A-can%27t-resolve-symbol-%27X509_sign_ctx%27-tp33984978p33986612.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


RE: A Question on Cipher Format.

2012-05-11 Thread Erik Tkal
I'm not sure that answers the question as to significance as opposed to 
defining the acronyms.

TLS_DHE_RSA_WITH_AES_128_CBC_SHA is a cipher suite defined for use with TLS 
that uses 128-bit AES in CBC mode for the data encryption and SHA-1 for message 
authentication.  The encryption keys are generated using Ephemeral 
Diffie-Hellman, signed using RSA (since DH is subject to MitM attacks).



Erik Tkal
Juniper OAC/UAC/Pulse Development



-Original Message-
From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of Matt Caswell (fr...@baggins.org)
Sent: Friday, May 11, 2012 5:01 AM
To: openssl-users@openssl.org
Subject: Re: A Question on Cipher Format.

TLS = Transport Layer Security
DHE = Diffie Hellman Ephemeral
RSA = Public Key Cryptography algorithm named after inventors, Rivest, Shamir & 
Adleman
AES_128 = Advanced Encryption Standard using 128bit key CBC = Cipher Block 
Chaining (a block cipher mode of operation) SHA = Secure Hash Algorithm

Matt

On 11 May 2012 09:51, Mr.Rout  wrote:
>
> Dear All,
>
> What is the significance of each phrase in the below cipher suite ?
>
> Cipher Suite: TLS_DHE_RSA_WITH_AES_128_CBC_SHA
>
>
> May be this is a dump question. But i am interested to know each phrase.
>
> Best Regards,
> Siba Shankar Rout
> --
> View this message in context: 
> http://old.nabble.com/A-Question-on-Cipher-Format.-tp33772869p33772869
> .html Sent from the OpenSSL - User mailing list archive at Nabble.com.
>
> __
> OpenSSL Project                                 http://www.openssl.org 
> User Support Mailing List                    openssl-users@openssl.org 
> Automated List Manager                           majord...@openssl.org
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


RE: P-256 curve not supported in openssl 1.0.1?

2012-03-05 Thread Erik Tkal
Hi Bin,

The OpenSSL names for P-256 and P-384 are prime256v1 and secp384r1.

  Erik


Erik Tkal
Juniper OAC/UAC/Pulse Development


From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of Bin Lu
Sent: Monday, March 05, 2012 3:26 PM
To: openssl-users@openssl.org
Subject: P-256 curve not supported in openssl 1.0.1?

When I run the following command:

% openssl ecparam -list_curves

It lists
...
  secp192k1 : SECG curve over a 192 bit prime field
  secp224k1 : SECG curve over a 224 bit prime field
  secp224r1 : NIST/SECG curve over a 224 bit prime field
  secp256k1 : SECG curve over a 256 bit prime field
  secp384r1 : NIST/SECG curve over a 384 bit prime field
secp521r1 : NIST/SECG curve over a 521 bit prime field
...

"secp256k1" is supported but not "secp256r1".  The later is  standardized
and  required by Suite B. Is it not supported in openssl-1.0.1? Why "secp256k1"
instead of "secp256r1"?

Thanks,
-binlu




RE: cert chain out of order breaks openssl

2012-02-14 Thread Erik Tkal
The SSL specification indicates that the ServerCertificate message should 
contain:

   certificate_list:  This is a sequence (chain) of X.509.v3
  certificates, ordered with the sender's certificate first followed
  by any certificate authority certificates proceeding sequentially
  upward.

The TLS RFC has:

   certificate_list
   This is a sequence (chain) of X.509v3 certificates. The sender's
   certificate must come first in the list. Each following
   certificate must directly certify the one preceding it. Because
   certificate validation requires that root keys be distributed
   independently, the self-signed certificate which specifies the
   root certificate authority may optionally be omitted from the
   chain, under the assumption that the remote end must already
   possess it in order to validate it in any case.

So the web server is sending the list incorrectly.  I once used a product that 
just sent the certs in the order contained in the configured .PFX file, so the 
easiest workaround was to repackage the .PFX.

  Erik

....
Erik Tkal
Juniper OAC/UAC/Pulse Development


From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of Timothy Kay
Sent: Tuesday, February 14, 2012 12:46 PM
To: openssl-users@openssl.org
Subject: cert chain out of order breaks openssl


We have been baffled for a long time that curl cannot access websites that work 
just fine in the browser (unless we use --insecure, of course). The curl 
documentation points you to http://curl.haxx.se/docs/sslcerts.html, which 
explains that your server has out of date certificates. It's not true! The 
problem is that the troublesome websites send the certificate chain that is out 
of order, and openssl fails to validate these chains, even though 
/etc/ssl/certs contains appropriate root certificates.

$ curl -v https://catalog.cincinnatilibrary.org
* About to connect() to 
catalog.cincinnatilibrary.org<http://catalog.cincinnatilibrary.org> port 443 
(#0)
*   Trying 66.213.10.111... connected
* Connected to 
catalog.cincinnatilibrary.org<http://catalog.cincinnatilibrary.org> 
(66.213.10.111) port 443 (#0)
* successfully set certificate verify locations:
*   CAfile: none
  CApath: /etc/ssl/certs
* SSLv3, TLS handshake, Client hello (1):
* SSLv3, TLS handshake, Server hello (2):
* SSLv3, TLS handshake, CERT (11):
* SSLv3, TLS alert, Server hello (2):
* SSL certificate problem, verify that the CA cert is OK. Details:
error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify 
failed
* Closing connection #0
curl: (60) SSL certificate problem, verify that the CA cert is OK. Details:
error:14090086:SSL routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify 
failed
More details here: http://curl.haxx.se/docs/sslcerts.html

curl performs SSL certificate verification by default, using a "bundle"
 of Certificate Authority (CA) public keys (CA certs). If the default
 bundle file isn't adequate, you can specify an alternate file
 using the --cacert option.
If this HTTPS server uses a certificate signed by a CA represented in
 the bundle, the certificate verification probably failed due to a
 problem with the certificate (it might be expired, or the name might
 not match the domain name in the URL).
If you'd like to turn off curl's verification of the certificate, use
 the -k (or --insecure) option.

Note that the CA path is set to /etc/ssl/certs. The certificate verification 
fails. I will now show that the system is configured correctly, and that the 
problem is with openssl.

Searching the web, we find several mentions of out of order certificate chains, 
but I have found no mention that openssl is at fault for not handling it 
properly regardless.

I am looking to this group to confirm my findings, then we can work to fix 
openssl.



RE: creating Master-Key for encryption/decryption

2011-08-24 Thread Erik Tkal
Hmmm, but he said he was writing both the client and server components and 
assuming both are using OpenSSL (I know, when you *assume*...) the mechanism 
would be the same...


Erik Tkal
Juniper OAC/UAC/Pulse Development


From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of Gayathri Sundar
Sent: Wednesday, August 24, 2011 2:59 PM
To: openssl-users@openssl.org
Subject: Re: creating Master-Key for encryption/decryption

I think the problem this person seem to have is not finding a way to extract 
the master secret on the client side, which is why I suggested he can send it 
as a payload from  the server as part of the app data, since its the exactly 
the same. Also, krishna, pls understand that the master secret is not used for 
eny/dec, its used to derive the actualy auth and enc keys using specific 
methods as mentioned in the RFC. These keys are unique per connection  basis, 
mixed by some randoms. The master secret is unique for a session. A session can 
contain many connections each represented by a SSL OBJ, and the enc/dec keys 
are different for every connection, which can be obtained from the SSL OBJ.

Please understand TLS as such from the RFC.

Thanks
--Gayathri
On Wed, Aug 24, 2011 at 9:43 AM, Erik Tkal 
mailto:et...@juniper.net>> wrote:
I'm not sure you are understanding this.  Both sides derive the same master 
key, so there is no need to send it.  After the handshake the SSL code will use 
that key to generate specific encryption keys and perform encryption of further 
traffic through the tunnel.  If you are only using the handshake to generate 
the master key to be used elsewhere (e.g. for proprietary encryption), then you 
can get it from the SSL_SESSION object (not sure if there's a get method).

....
Erik Tkal
Juniper OAC/UAC/Pulse Development

From: owner-openssl-us...@openssl.org<mailto:owner-openssl-us...@openssl.org> 
[mailto:owner-openssl-us...@openssl.org<mailto:owner-openssl-us...@openssl.org>]
 On Behalf Of krishnamurthy santhanam
Sent: Wednesday, August 24, 2011 12:51 AM
To: openssl-users@openssl.org<mailto:openssl-users@openssl.org>
Subject: Re: creating Master-Key for encryption/decryption

Thanks. As per my understanding,Before sending master key to client , server 
has to maintain the master key. How i can get this in server side? is there any 
code sample or snippet to get this key?

Krishna
On Tue, Aug 23, 2011 at 11:54 PM, Gayathri Sundar 
mailto:suraj...@gmail.com>> wrote:

Master key is unique per session, and its same for both client and server, 
thats the concept behind the SSL handshake. The RFC would state the information 
accurately.  Perhaps you can send the master secret as part of ur application 
data, to  the client, which can decrypt and use.
Thanks
--Gayathri

On Tue, Aug 23, 2011 at 12:41 PM, krishnamurthy santhanam 
mailto:krishnamurth...@gmail.com>> wrote:
Thanks. I gone through the RFC 2246 and understood the Master key generation 
part. The Master key is generated and able to print the client side(test C 
program) using ssl strucure.

printf("session A\n");
SSL_SESSION *session = SSL_get_session(ssl);
SSL_SESSION_print(out, session);
for (i=0; i<(unsigned int)session->master_key_length; i++)
{
BIO_printf(bp,"%02X",session->master_key[i]) );
}
How i can get the same Master key in server side?
in my scenario, server side program is running in C. JDBC clients will 
establish the connection to the server. will the same Mester key generated in 
the cross platforms(JDBC client side)?
Any help will be great.
Thanks for your time,
Krishnamurthy

On Mon, Aug 22, 2011 at 9:03 PM, Gayathri Sundar 
mailto:suraj...@gmail.com>> wrote:
Please read the RFC, it would clearly explain how the master secret is dervied, 
and from that how the read and write keys are derived. With that you can get to 
know how to extract the read n write keys. Meanwhile the read and wirte keys 
are available as part of the ssl object.
Check that structure out.

Thanks
--Gayathri
On Mon, Aug 22, 2011 at 10:24 AM, krishnamurthy santhanam 
mailto:krishnamurth...@gmail.com>> wrote:
I have more than 100 clients that will connect to my server and communicate the 
data. I am implementing SSL on server side to authenticate the client 
certificate(X.509) and also client will authenticate the servers certificate. 
Once the mutual authentication has completed I have to generate master key for 
encryption and decryption.  I am going to use AES for encryption and decryption.
 I had generated the client and server certificates using the bellow commands 
and signed by the root,
1. CLIENT CERTIFICATE:
openssl req -newkey rsa:1024 -sha1 -keyout clientkey.pem -out clientreq.pem
openssl x509 -req -in clientreq.pem -sha1 -extfile openssl.cnf  -extensions 
usr_cert -CA rootcert.pem  -CAk

RE: creating Master-Key for encryption/decryption

2011-08-24 Thread Erik Tkal
I'm not sure you are understanding this.  Both sides derive the same master 
key, so there is no need to send it.  After the handshake the SSL code will use 
that key to generate specific encryption keys and perform encryption of further 
traffic through the tunnel.  If you are only using the handshake to generate 
the master key to be used elsewhere (e.g. for proprietary encryption), then you 
can get it from the SSL_SESSION object (not sure if there's a get method).

....
Erik Tkal
Juniper OAC/UAC/Pulse Development

From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of krishnamurthy santhanam
Sent: Wednesday, August 24, 2011 12:51 AM
To: openssl-users@openssl.org
Subject: Re: creating Master-Key for encryption/decryption

Thanks. As per my understanding,Before sending master key to client , server 
has to maintain the master key. How i can get this in server side? is there any 
code sample or snippet to get this key?

Krishna
On Tue, Aug 23, 2011 at 11:54 PM, Gayathri Sundar 
mailto:suraj...@gmail.com>> wrote:

Master key is unique per session, and its same for both client and server, 
thats the concept behind the SSL handshake. The RFC would state the information 
accurately.  Perhaps you can send the master secret as part of ur application 
data, to  the client, which can decrypt and use.
Thanks
--Gayathri

On Tue, Aug 23, 2011 at 12:41 PM, krishnamurthy santhanam 
mailto:krishnamurth...@gmail.com>> wrote:
Thanks. I gone through the RFC 2246 and understood the Master key generation 
part. The Master key is generated and able to print the client side(test C 
program) using ssl strucure.

printf("session A\n");
SSL_SESSION *session = SSL_get_session(ssl);
SSL_SESSION_print(out, session);
for (i=0; i<(unsigned int)session->master_key_length; i++)
{
BIO_printf(bp,"%02X",session->master_key[i]) );
}
How i can get the same Master key in server side?
in my scenario, server side program is running in C. JDBC clients will 
establish the connection to the server. will the same Mester key generated in 
the cross platforms(JDBC client side)?
Any help will be great.
Thanks for your time,
Krishnamurthy

On Mon, Aug 22, 2011 at 9:03 PM, Gayathri Sundar 
mailto:suraj...@gmail.com>> wrote:
Please read the RFC, it would clearly explain how the master secret is dervied, 
and from that how the read and write keys are derived. With that you can get to 
know how to extract the read n write keys. Meanwhile the read and wirte keys 
are available as part of the ssl object.
Check that structure out.

Thanks
--Gayathri
On Mon, Aug 22, 2011 at 10:24 AM, krishnamurthy santhanam 
mailto:krishnamurth...@gmail.com>> wrote:
I have more than 100 clients that will connect to my server and communicate the 
data. I am implementing SSL on server side to authenticate the client 
certificate(X.509) and also client will authenticate the servers certificate. 
Once the mutual authentication has completed I have to generate master key for 
encryption and decryption.  I am going to use AES for encryption and decryption.
 I had generated the client and server certificates using the bellow commands 
and signed by the root,
1. CLIENT CERTIFICATE:
openssl req -newkey rsa:1024 -sha1 -keyout clientkey.pem -out clientreq.pem
openssl x509 -req -in clientreq.pem -sha1 -extfile openssl.cnf  -extensions 
usr_cert -CA rootcert.pem  -CAkey rootkey.pem -CAcreateserial   -out 
clientcert.pem
cat clientkey.pem  clientcert.pem rootcert.pem > client.pem
openssl x509  -subject -issuer -noout -in client.pem
2. SERVER CERTIFICATE:
openssl req -newkey rsa:1024 -sha1 -keyout serverkey.pem -out serverreq.pem
openssl x509 -req -in serverreq.pem -sha1 -extfile openssl.cnf  -extensions usr_
cert -CA rootcert.pem  -CAkey rootkey.pem -CAcreateserial   -out servercert.pem
cat serverkey.pem  servercert.pem rootcert.pem > server.pem
openssl x509  -subject -issuer -noout -in server.pem
3. ROOT CERTIFICATE:
openssl req -newkey rsa:1024 -sha1 -keyout rootkey.pem -out rootreq.pem
openssl x509 -req -in rootreq.pem -sha1 -extfile root.cnf -extensions v3_ca -sig
nkey rootkey.pem -out rootcert.pem
cat rootcert.pem rootkey.pem  > root.pem
openssl x509  -subject -issuer -noout -in root.pem

Initially I  am writing ssl/tls programming for server and client. In this I am 
able to communicate the data between client and server.
I was struck on master key generation, I have added the below LOC to programs 
to get MASTER KEY,
printf("session A\n");
SSL_SESSION *session = SSL_get_session(ssl);
SSL_SESSION_print(out, session);
It is printing like this ,
 session A
SSL-Session:
Protocol  : TLSv1
Cipher: AES256-SHA
Session-ID: 9FCE46513DD74882D3FF0E0E84CC4A6BE12192B65C426E0B27D0FA15F81D7D5E
Session-ID-ctx:
Master-Key: 56F90B0D90DEB3430207A74793C9B6565744E06ECA191D9DFA04C29B1EE2B782
6B602878597465

RE: creating Master-Key for encryption/decryption

2011-08-24 Thread Erik Tkal
I'm not sure you are understanding this.  Both sides derive the same master 
key, so there is no need to send it.  After the handshake the SSL code will use 
that key to generate specific encryption keys and perform encryption of further 
traffic through the tunnel.  If you are only using the handshake to generate 
the master key to be used elsewhere (e.g. for proprietary encryption), then you 
can get it from the SSL_SESSION object (not sure if there's a get method).

....
Erik Tkal
Juniper OAC/UAC/Pulse Development


From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of krishnamurthy santhanam
Sent: Wednesday, August 24, 2011 12:51 AM
To: openssl-users@openssl.org
Subject: Re: creating Master-Key for encryption/decryption

Thanks. As per my understanding,Before sending master key to client , server 
has to maintain the master key. How i can get this in server side? is there any 
code sample or snippet to get this key?

Krishna
On Tue, Aug 23, 2011 at 11:54 PM, Gayathri Sundar 
mailto:suraj...@gmail.com>> wrote:

Master key is unique per session, and its same for both client and server, 
thats the concept behind the SSL handshake. The RFC would state the information 
accurately.  Perhaps you can send the master secret as part of ur application 
data, to  the client, which can decrypt and use.
Thanks
--Gayathri

On Tue, Aug 23, 2011 at 12:41 PM, krishnamurthy santhanam 
mailto:krishnamurth...@gmail.com>> wrote:
Thanks. I gone through the RFC 2246 and understood the Master key generation 
part. The Master key is generated and able to print the client side(test C 
program) using ssl strucure.

printf("session A\n");
SSL_SESSION *session = SSL_get_session(ssl);
SSL_SESSION_print(out, session);
for (i=0; i<(unsigned int)session->master_key_length; i++)
{
BIO_printf(bp,"%02X",session->master_key[i]) );
}
How i can get the same Master key in server side?
in my scenario, server side program is running in C. JDBC clients will 
establish the connection to the server. will the same Mester key generated in 
the cross platforms(JDBC client side)?
Any help will be great.
Thanks for your time,
Krishnamurthy

On Mon, Aug 22, 2011 at 9:03 PM, Gayathri Sundar 
mailto:suraj...@gmail.com>> wrote:
Please read the RFC, it would clearly explain how the master secret is dervied, 
and from that how the read and write keys are derived. With that you can get to 
know how to extract the read n write keys. Meanwhile the read and wirte keys 
are available as part of the ssl object.
Check that structure out.

Thanks
--Gayathri
On Mon, Aug 22, 2011 at 10:24 AM, krishnamurthy santhanam 
mailto:krishnamurth...@gmail.com>> wrote:
I have more than 100 clients that will connect to my server and communicate the 
data. I am implementing SSL on server side to authenticate the client 
certificate(X.509) and also client will authenticate the servers certificate. 
Once the mutual authentication has completed I have to generate master key for 
encryption and decryption.  I am going to use AES for encryption and decryption.
 I had generated the client and server certificates using the bellow commands 
and signed by the root,
1. CLIENT CERTIFICATE:
openssl req -newkey rsa:1024 -sha1 -keyout clientkey.pem -out clientreq.pem
openssl x509 -req -in clientreq.pem -sha1 -extfile openssl.cnf  -extensions 
usr_cert -CA rootcert.pem  -CAkey rootkey.pem -CAcreateserial   -out 
clientcert.pem
cat clientkey.pem  clientcert.pem rootcert.pem > client.pem
openssl x509  -subject -issuer -noout -in client.pem
2. SERVER CERTIFICATE:
openssl req -newkey rsa:1024 -sha1 -keyout serverkey.pem -out serverreq.pem
openssl x509 -req -in serverreq.pem -sha1 -extfile openssl.cnf  -extensions usr_
cert -CA rootcert.pem  -CAkey rootkey.pem -CAcreateserial   -out servercert.pem
cat serverkey.pem  servercert.pem rootcert.pem > server.pem
openssl x509  -subject -issuer -noout -in server.pem
3. ROOT CERTIFICATE:
openssl req -newkey rsa:1024 -sha1 -keyout rootkey.pem -out rootreq.pem
openssl x509 -req -in rootreq.pem -sha1 -extfile root.cnf -extensions v3_ca -sig
nkey rootkey.pem -out rootcert.pem
cat rootcert.pem rootkey.pem  > root.pem
openssl x509  -subject -issuer -noout -in root.pem

Initially I  am writing ssl/tls programming for server and client. In this I am 
able to communicate the data between client and server.
I was struck on master key generation, I have added the below LOC to programs 
to get MASTER KEY,
printf("session A\n");
SSL_SESSION *session = SSL_get_session(ssl);
SSL_SESSION_print(out, session);
It is printing like this ,
 session A
SSL-Session:
Protocol  : TLSv1
Cipher: AES256-SHA
Session-ID: 9FCE46513DD74882D3FF0E0E84CC4A6BE12192B65C426E0B27D0FA15F81D7D5E
Session-ID-ctx:
Master-Key: 56F90B0D90DEB3430207A74793C9B6565744E06ECA191D9DFA04C29B1EE2B782
6B602878597465

RE: revoking crt

2011-07-18 Thread Erik Tkal
Self-signed certs cannot be revoked, because if the private key were 
compromised then CRLs could be forged. Trusted roots by definition are 
explicitly trusted, and are usually placed in a secure location (e.g. local 
system trusted root store), and this set is usually updated as part of the OS.


Erik Tkal
Juniper OAC/UAC/Pulse Development


From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of y...@inbox.lv
Sent: Monday, July 18, 2011 2:10 PM
To: openssl-users@openssl.org
Subject: Re: revoking crt

is that really a self signed certificate? For self signed certificates names of 
issuer
are the same as names of subject. In your example OU and CN are not the same.
Also, according to wikipedia,  self signed certificates (root certificates) 
cannot be revoked,
although I do not understand why. (CRL could be signed by certificates own key).


Citējot Daniel Spannbauer <mailto:d...@marco.de>:
Hello,

I use self-signed certificates for my VPN. Now, I try to revoke a crt.
I called: openssl ca -revoke edge.crt -config vpn.conf
But I get the error:
"ERROR:name does not match /C=DE/ST=BY/O=xxx/OU=edge am/CN=edge
am/emailAddress=xxx"

The header of the crt:
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 8 (0x8)
Signature Algorithm: md5WithRSAEncryption
Issuer: C=DE, ST=BY, L=yyy, O=xxx, OU=gate tun1, CN=gate
tun1/Email=xxx
Validity
Not Before: May 14 11:12:27 2010 GMT
Not After : May 11 11:12:27 2020 GMT
Subject: C=DE, ST=BY, O=xxx, OU=edge am, CN=edge am/Email=xxx
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
RSA Public Key: (1024 bit)


The entry in index.txt:
V 20051227Z 08 unknown
/C=DE/ST=BY/O=xxx/OU=edge am/CN=edge am/Email=xxx


In my opinion, there is no error in crt or index.txt. Can anybody help
me to find the error?

Regards

Daniel


--
Daniel Spannbauer Software Entwicklung
marco Systemanalyse und Entwicklung GmbH Tel +49 8333 9233-27 Fax -11
Rechbergstr. 4 - 6, D 87727 Babenhausen Mobil +49 171 4033220
http://www.marco.de/ Email d...@marco.de
Geschäftsführer Martin Reuter HRB 171775 Amtsgericht München
__
OpenSSL Project http://www.openssl.org
User Support Mailing List openssl-users@openssl.org
Automated List Manager majord...@openssl.org



RE: OpenSSL - Great Project

2011-05-17 Thread Erik Tkal
Umm, what else would you like it to do?  :-D

I guess the obvious answer is primarily to provide secure communications 
between any two parties, whether that be web-server-like or anything else.  It 
can protect credentials being passed for remote authentication, such as in 
EAP-TLS/TTLS/PEAP/FAST.  It provides general purpose cryptographic 
capabilities, with the ability to replace the implementation with anything you 
like, including dedicated hardware.  It provides general purpose certificate 
processing capabilities.  I'm sure I missed a bunch of stuff...



Erik Tkal
Juniper OAC/UAC/Pulse Development



-Original Message-
From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of andre505
Sent: Monday, May 16, 2011 9:29 PM
To: openssl-users@openssl.org
Subject: OpenSSL - Great Project


Hello
I think Open SSL is a great project. I would however like to know what it is
capable of, apart from creating applications that can communicate using
SSL/TSL. 

Thanks and keep up the good work.
-- 
View this message in context: 
http://old.nabble.com/OpenSSL---Great-Project-tp31634272p31634272.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


RE: Application is failing with cipher or hash unavailable

2011-05-11 Thread Erik Tkal
I think that means you have not enabled the cipher or hash that is required at 
that point.  Did you forget to call something like OpenSSL_add_all_algorithms() 
in your app?


Erik Tkal
Juniper OAC/UAC/Pulse Development


-Original Message-
From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of pradeepreddy
Sent: Wednesday, May 11, 2011 3:55 PM
To: openssl-users@openssl.org
Subject: Application is failing with cipher or hash unavailable


Hi ,

My application is running with OpenSSL 0.9.8h 28 May 2008 in gentoo linux:
>uname -a
Linux localhost 2.6.32.9 #1 SMP Thu Jul 8 14:30:23 Local time zone must be
set--see zic m i686 Intel(R) Pentium(R) D CPU 2.80GHz GenuineIntel GNU/Linux

But ssl hand shake is failing with below error:
SSL_ERROR_SSL error:140D308A:SSL routines:TLS1_SETUP_KEY_BLOCK:cipher or
hash unavailable

But on same linux, "openssl s_client -connect "server:8443" -cert client.pem
-CAfile ca-win.pem", is wokring

CONNECTED(0003)
---
Certificate chain
 0 s:/C=/ST=/L=/O=/OU=DGM/DC=CN=A1
 1 s:/DC=/DC=/DC=/DC=/CN=A1
   i:/DC=/DC=/DC=/DC=/CN=A1
---
Server certificate
-BEGIN CERTIFICATE-
MAoGCCsGAQUFBwMBMA0GCSqGSIb3DQEBBQUAA4IBAQBd4LfcDl5d3ODPjBBDy7bL
YX6uDP6yG+RdbwR9ul4WRhOUXqb0jkHbaGy/Qlz70TGqfSme81yvLsYmChKTFloU
3NDIRAqagGntPXyaR6WjbV652SYtENTL7RONZhxGyeqDF0ns5fLUAdE2eGYN9f3Y
X/k/vFrFnKEmEBEWlciwQjr7vag21YGBtIEeopqnRqN64HCGUVKWqap0sQXAJD/4
-END CERTIFICATE-
subject=/C=/ST=/L=/O=/OU=/CN=XY2
issuer=/DC=/DC=/DC=dev/DC=/CN=A1
---
Acceptable client certificate CA names
/DC=/DC=/DC=/DC=/CN=A1
---
SSL handshake has read 3241 bytes and written 3148 bytes
---
New, TLSv1/SSLv3, Cipher is DHE-RSA-AES256-SHA
Server public key is 2048 bit
Compression: NONE
Expansion: NONE
SSL-Session:
Protocol  : TLSv1
Cipher: DHE-RSA-AES256-SHA
Session-ID: 
Session-ID-ctx: 
Master-Key: C47BF1691AB846E449B5FA9E29EC4E25312D4C501
Key-Arg   : None
Start Time: 1305122070
Timeout   : 300 (sec)
Verify return code: 0 (ok)
---

-- 
View this message in context: 
http://old.nabble.com/Application-is-failing-with-cipher-or-hash-unavailable-tp31597508p31597508.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


RE: Replace renewed intermediate certificate in the keystore chain

2011-05-11 Thread Erik Tkal
No, that should not be true - as long as the subject name of the issuer does 
not change and the key pair is reused, then any previously issued certificates 
should still verify against the issuer.  Note that the thumbprint will be 
different, in case that is used anywhere to track the cert.



Erik Tkal
Juniper OAC/UAC/Pulse Development


-Original Message-
From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of John R Pierce
Sent: Wednesday, May 11, 2011 12:47 PM
To: openssl-users@openssl.org
Subject: Re: Replace renewed intermediate certificate in the keystore chain

On 05/10/11 11:03 PM, Mohan Radhakrishnan wrote:
>
> Hi,
>
> I have checked my keystore and truststore and the intermediate 
> certificate alone is going to expire.
>

as I understand it (vaguely at best), if the intermediate certfiicate 
expires, that invalidates any certificates it generated, so you will 
need to regenerate and replace all child certificates too.

...


__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


RE: Can openssl support EAP-TLS?

2011-05-11 Thread Erik Tkal
OpensSSL supports TLS; you need to parse the EAP packets in your own 
application and feed the TLS bits into OpenSSL.


Erik Tkal
Juniper OAC/UAC/Pulse Development


From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of Neo Liu
Sent: Wednesday, May 11, 2011 12:59 AM
To: openssl-users@openssl.org
Subject: Can openssl support EAP-TLS?

Hi, everyone:
   I wanna know that if openssl support EAP-TLS protocol?


RE: Date format for X.509 certificate

2011-04-19 Thread Erik Tkal
110419141516Z = 2011 04(April) 19th 14:15:16Z(UTC)


Erik Tkal
Juniper OAC/UAC/Pulse Development


From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of Matt C
Sent: Tuesday, April 19, 2011 5:19 PM
To: openssl-users@openssl.org
Subject: Date format for X.509 certificate

I've extracted a date from a public certificate using the PHP command 
openssl_x509_parse.

The date looks like this: 110419141516Z

Can someone tell me how to make sense of this date (in PHP if possible).

Thank you!

Matt


RE: How is MD5 fingerprint on X509 created?

2011-04-19 Thread Erik Tkal
The thumbprint is the hash of the certificate data in DER format.  For example, 
the following commands would work for both forms:

openssl x509 -in user.pem -fingerprint -md5 -noout

openssl x509 -in user.cer -inform der -fingerprint -md5 -noout

But I f you want to use a raw hash then only the second of the following would 
work:

openssl md5 < user.pem   (wrong format input)

openssl md5 < user.cer

....
Erik Tkal
Juniper OAC/UAC/Pulse Development

From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of Matt C
Sent: Tuesday, April 19, 2011 1:56 PM
To: openssl-users@openssl.org
Subject: How is MD5 fingerprint on X509 created?

Hello,

I am able to generate an MD5 fingerprint with the following command.

openssl x509 -in user.pem -fingerprint -md5 -noout

This fingerprint matches the fingerprint displayed by Thunderbird/Firefox.

I am trying to generate an MD5 using a hash function in PHP, 
http://nl2.php.net/manual/en/function.openssl-digest.php

The results I am getting from the PHP function are not the same as using the 
other methods.  I'm sure I'm not putting the right data into the hash function.

Should I be hashing the entire contents of the PEM file, only part, or is there 
additional data I need to add?

Thank you,

Matt


RE: openssl-SNAP-20110412.tar.gz corrupted?

2011-04-12 Thread Erik Tkal
WinZip handles it just fine...


Erik Tkal
Juniper OAC/UAC/Pulse Development


From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of Paul Suhler
Sent: Tuesday, April 12, 2011 11:53 AM
To: openssl-users@openssl.org
Subject: openssl-SNAP-20110412.tar.gz corrupted?


Is anyone else having trouble opening 
openssl-SNAP-20110411.tar.gz<ftp://ftp.openssl.org/snapshot/openssl-SNAP-20110411.tar.gz>
 and 
openssl-SNAP-20110412.tar.gz<ftp://ftp.openssl.org/snapshot/openssl-SNAP-20110412.tar.gz>?
  I can extract the .tar file, but then 7Zip says that it can't be opened as an 
archive.

Thanks,

Paul

_
Paul A. Suhler | Firmware Engineer | Quantum Corporation | Office: 949.856.7748 
| paul.suh...@quantum.com<mailto:paul.suh...@quantum.com>
Preserving the World's Most Important Data. Yours.(tm)



RE: DH_generate_key issue

2011-03-02 Thread Erik Tkal
Hi Viktor,

If you perform BN_mod_exp you will find that mathematically the public key is 
correct.  I suppose there is a 1 in 256 chance that the high order byte would 
be 0, so that explains your result of it happening when you do large numbers of 
such operations.

BTW, you can also use BN_rand instead of RAND_bytes to avoid the conversion...

  Regards,
  Erik


Erik Tkal
Juniper OAC/UAC/Pulse Development


-Original Message-
From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of Viktor Krikun
Sent: Wednesday, March 02, 2011 6:53 AM
To: openssl-users@openssl.org
Subject: DH_generate_key issue

Hello, guys! I'm new to OpenSSL so sorry in advance if I get something wrong.

I'm using OpenSSL Diffie-Hellman key exchange in my project. In 'normal' mode
it works just perfect, but during stress-testing I have discovered "strange"
behavior: I sequentially start X00 DH calculations and it randomly fails to
generate public key correctly. This is my test-case:

START_TEST(openssl_dh_stress) {   
BIGNUM*g_p3072 = NULL;   
unsigned i;
   
g_p3072 = BN_bin2bn(g_p3072data, sizeof(g_p3072data), NULL);
   
for (i=0; i<400; i++) {
int ssl_res;
unsigned char random_bytes[64];
DH *tmp_ctx = NULL;
   
tmp_ctx = DH_new();
ck_assert(NULL != tmp_ctx);   
   
tmp_ctx->p = BN_dup(g_p3072);
tmp_ctx->g = BN_new();
BN_set_word(tmp_ctx->g, DH_GENERATOR_2);
   
RAND_bytes(random_bytes, 256/8);
tmp_ctx->priv_key = BN_bin2bn(random_bytes, 256/8, NULL);
   
ssl_res = DH_generate_key(tmp_ctx);
ck_assert_int_eq(1, ssl_res);
   
unsigned pub_key_size = BN_num_bytes(tmp_ctx->pub_key);   
if (pub_key_size != 3072/8) {
printf("FAILURE. DH 3K, %i-s iteration failed to compute
correct PV length.\n", i);
}
ck_assert_int_eq(pub_key_size, 3072/8);

DH_free(tmp_ctx);
}
}
END_TEST

Openssl randomly produces pub_key_size == 383 bytes, (it affect the rest
the calculations later in the sources). It's not reproducible with 1, 10
or 50 iterations, but when i >= 200 it's 100% reproducible.

I have briefly reviewed openssl dh key generation sources and couldn't
find anything what looks strange.  Empirically I discovered that the
problem disappears when I comment out "RAND_bytes(random_bytes,
256/8);", but still assign private key manually to prevent OpenSSL from
generating it automatically.

I'm using single-thread environment.
I tried different versions of OpenSSL on OSX, Linux and OpenBSD - the same 
behavior.

Have you ever experienced with similar problem in your projects? Am I
doing something wrong?

Thanks in advance for for your help!

-- 
Kind Regards,
Viktor

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


RE: using openssl without config file

2010-12-17 Thread Erik Tkal
You can use the -config option to specify a desired config file.

...
Erik Tkal
Juniper OAC/UAC/Pulse Development


-Original Message-
From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of felix farcas
Sent: Friday, December 17, 2010 5:29 AM
To: openssl-users@openssl.org
Subject: Re: using openssl without config file

Hello Patrick

thank you for the answer

Is it possible to use a special openssl.cnf file in the same commnad, 
without using the initial *.cnf file from openssl?

Thank you
Felix

On 16.12.2010 20:32, Patrick Patterson wrote:
> Hi Felix:
>
> What you want is the -subj command line option.
>
> Have fun.
>
> Patrick.
>
> On 2010-12-16, at 8:13 AM, felix farcas wrote:
>
>> Hello
>>
>> I want to make a form with a submit button.
>>
>> For this I would like to creat a req_user.pem over a secure Internet.
>>
>>   Than I want this file to be send to an e-ail addres.
>>
>> I need to introduce per command line the following variables
>>
>>  � Domain Component:
>>  � Domain Component:
>>  � Organisation []:
>>  � Common Name (eg. YOUR name) []:
>>  � A challenge password []:
>> How may I introduce them in this commnad line?
>>
>> openssl req -new -key key_user.pem -out req_user.pem
>>
>> Thank you
>> Felix
> ---
> Patrick Patterson
> Chief PKI Architect
> Carillon Information Security Inc.
> http://www.carillon.ca
>
>
>
>
>
> __
> OpenSSL Project http://www.openssl.org
> User Support Mailing Listopenssl-users@openssl.org
> Automated List Manager   majord...@openssl.org
>
> __ NOD32 5709 (20101216) Information __
>
> This message was checked by NOD32 antivirus system.
> http://www.eset.com
>
>
>


__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org
:��I"Ϯ��r�m
(Z+�K�+1���x��h[�z�(Z+���f�y���f���h��)z{,���

RE: Using DH parameters from OpenSSL

2010-12-14 Thread Erik Tkal
DER encoding of numeric data should always be network byte order MSB...LSB.  
Note that if the high order bit is set then an additional 0 byte is prepended.


Erik Tkal
Juniper OAC/UAC/Pulse Development


-Original Message-
From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of Mike Mohr
Sent: Tuesday, December 14, 2010 3:42 PM
To: openssl-users@openssl.org
Subject: Using DH parameters from OpenSSL

Good afternoon,

I'm trying to understand the data format that OpenSSL writes out its
DH parameters in.  I am aware that the actual data is encoded using
ASN.1 DER and have a way to parse the container.  My question really
amounts to byte ordering when DH parameters are generated like this:

openssl dhparam -outform DER -5 -out parameters.dh 4096

Take, for example, the safe prime 'p' in parameters.dh.  Are its bytes
stored in MSB...LSB form, such that the number is interpreted
similarly to a human reading base 10 numbers on paper?  That is to
say, left to right 1 byte at a time?

Thanks for any clarification,
Mike
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


RE: Remove me please

2010-12-03 Thread Erik Tkal
Go to http://www.openssl.org/support/community.html



Erik Tkal
Juniper OAC/UAC/Pulse Development



-Original Message-
From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of Richard Buskirk
Sent: Friday, December 03, 2010 2:39 PM
To: openssl-users@openssl.org
Subject: Remove me please

Sorry to use this list for this.
But I have tried every way I know to get off the list suggestions??


-Original Message-
From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of Mounir IDRASSI
Sent: Friday, December 03, 2010 1:04 PM
To: openssl-users@openssl.org
Subject: Re: Private Key from Windows Cert Store

Hi,

In order to enable the CAPI engine, you have to use the enable-capieng switch : 
this will compile the CAPI engine statically inside OpenSSL.
Here is a example of configure command line for this : perl Configure
VC-WIN32 --prefix=c:/openssl enable-capieng

I hope this will help.
Cheers,
--
Mounir IDRASSI
IDRIX
http://www.idrix.fr

On 12/3/2010 6:21 PM, Fili, Tom wrote:
> Ok, so I realized if I run Configure with no-static-engine I'll get 
> the separate dlls. These are the commands I run
>
> C:\Documents and Settings\tfili\Desktop\openssl-0.9.8k>perl Configure
> VC-WIN32 --prefix=c:\temp\openssl no-static-engine
>
> ms\do_ms.bat
>
> nmake -f ms\ntdll.mak
>
> Unfortunately I now get the following errors:
>
>
>  link /debug /nologo /subsystem:console /opt:ref /debug /dll 
> /out:out32dl l.dbg\4758cca.dll  
> @C:\DOCUME~1\tfili\LOCALS~1\Temp\nm2E34.tmp
> Creating library out32dll.dbg\4758cca.lib and object 
> out32dll.dbg\4758cca.exp
>
> e_4758cca.obj : error LNK2019: unresolved external symbol 
> _RSA_get_ex_data referenced in function _cca_rsa_pub_enc e_4758cca.obj 
> : error LNK2019: unresolved external symbol _RSA_size referenced in 
> function _cca_rsa_pub_enc e_4758cca.obj : error LNK2019: unresolved 
> external symbol _CRYPTO_free referenced in function _cca_rsa_verify 
> e_4758cca.obj : error LNK2019: unresolved external symbol 
> _OPENSSL_cleanse referenced in function _cca_rsa_verify e_4758cca.obj 
> : error LNK2019: unresolved external symbol _CRYPTO_malloc referenced 
> in function _cca_rsa_verify e_4758cca.obj : error LNK2019: unresolved 
> external symbol _i2d_X509_SIG referenced in function _cca_rsa_verify 
> e_4758cca.obj : error LNK2019: unresolved external symbol _OBJ_nid2obj 
> referenced in function _cca_rsa_verify e_4758cca.obj : error LNK2019: 
> unresolved external symbol _ERR_put_error referenced in function 
> _ERR_CCA4758_error e_4758cca.obj : error LNK2019: unresolved external 
> symbol _ERR_get_next_error_library referenced in function 
> _ERR_CCA4758_error e_4758cca.obj : error LNK2019: unresolved external 
> symbol _ERR_set_implementation referenced in function _bind_engine 
> e_4758cca.obj : error LNK2019: unresolved external symbol 
> _CRYPTO_set_ex_data_implementation referenced in function _bind_engine 
> e_4758cca.obj : error LNK2019: unresolved external symbol 
> _CRYPTO_set_dynlock_destroy_callback referenced in function 
> _bind_engine e_4758cca.obj : error LNK2019: unresolved external symbol 
> _CRYPTO_set_dynlock_lock_callback referenced in function _bind_engine 
> e_4758cca.obj : error LNK2019: unresolved external symbol 
> _CRYPTO_set_dynlock_create_callback referenced in function 
> _bind_engine e_4758cca.obj : error LNK2019: unresolved external symbol 
> _CRYPTO_set_add_lock_callback referenced in function _bind_engine 
> e_4758cca.obj : error LNK2019: unresolved external symbol 
> _CRYPTO_set_locking_callback referenced in function _bind_engine 
> e_4758cca.obj : error LNK2019: unresolved external symbol 
> _CRYPTO_set_mem_functions referenced in function _bind_engine 
> e_4758cca.obj : error LNK2019: unresolved external symbol 
> _ENGINE_get_static_state referenced in function _bind_engine 
> e_4758cca.obj : error LNK2019: unresolved external symbol 
> _ENGINE_set_cmd_defns referenced in function _bind_helper 
> e_4758cca.obj : error LNK2019: unresolved external symbol 
> _ENGINE_set_load_pubkey_function referenced in function _bind_helper 
> e_4758cca.obj : error LNK2019: unresolved external symbol 
> _ENGINE_set_load_privkey_function referenced in function _bind_helper 
> e_4758cca.obj : error LNK2019: unresolved external symbol 
> _ENGINE_set_ctrl_function referenced in function _bind_helper 
> e_4758cca.obj : error LNK2019: unresolved external symbol 
> _ENGINE_set_finish_function referenced in function _bind_helper 
> e_4758cca.obj : error LNK2019: unresolved external symbol 
> _ENGINE_set_init_function referenced in function _bind_helper 
> e_4758cca.obj : error LNK2019: unresolved external symbol 
> _ENGINE_set_destroy_

RE: OpenSSL 1.0.0c released

2010-12-03 Thread Erik Tkal
That's a pretty bold statement and doesn't always apply in a product 
environment.

I have not deployed 1.0.0b (because of the pending issues); I'm still at 1.0.0a 
and have to decide whether to patch the vulnerabilities, or risk updating 
OpenSSL completely and retesting all of its consumers.

  Erik



-Original Message-
From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of Victor Duchovni
Sent: Thursday, December 02, 2010 6:09 PM

[...]


1.0.0c contains important non-security bug fixes for 1.0.0b, so you
should deploy 1.0.0c anyway.


[...]
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


RE: OpenSSL 1.0.0c released

2010-12-02 Thread Erik Tkal
Can someone point to details on CVE-2010-4180 and CVE-2010-4252?  CVE-2010-3864 
was the reason 1.0.0b was released, but I cannot find any references to the 
other two.



Erik Tkal
Juniper OAC/UAC/Pulse Development


-Original Message-
From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of OpenSSL
Sent: Thursday, December 02, 2010 2:17 PM
To: openssl-annou...@master.openssl.org; openssl-...@master.openssl.org; 
openssl-us...@master.openssl.org
Subject: OpenSSL 1.0.0c released

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1


   OpenSSL version 1.0.0c released
   ===

   OpenSSL - The Open Source toolkit for SSL/TLS
   http://www.openssl.org/

   The OpenSSL project team is pleased to announce the release of
   version 1.0.0c of our open source toolkit for SSL/TLS. This new
   OpenSSL version is a security and bugfix release. For a complete
   list of changes, please see

   http://www.openssl.org/source/exp/CHANGES.

   The most significant changes are:

  o Fix for security issue CVE-2010-4180
  o Fix for CVE-2010-4252
  o Fix mishandling of absent EC point format extension.
  o Fix various platform compilation issues.
  o Corrected fix for security issue CVE-2010-3864.

   We consider OpenSSL 1.0.0c to be the best version of OpenSSL
   available and we strongly recommend that users of older versions
   upgrade as soon as possible. OpenSSL 1.0.0c is available for
   download via HTTP and FTP from the following master locations (you
   can find the various FTP mirrors under
   http://www.openssl.org/source/mirror.html):

 * http://www.openssl.org/source/
 * ftp://ftp.openssl.org/source/

   The distribution file name is:

o openssl-1.0.0c.tar.gz
  Size: 4023056
  MD5 checksum: ff8fb85610aef328315a9decbb2712e4
  SHA1 checksum: 5a2d74fa7fe90c80915332404b9700044ef676a1

   The checksums were calculated using the following commands:

openssl md5 openssl-1.0.0c.tar.gz
openssl sha1 openssl-1.0.0c.tar.gz

   Yours,

   The OpenSSL Project Team...

Mark J. Cox Nils Larsch Ulf Möller
Ralf S. Engelschall Ben Laurie  Andy Polyakov
Dr. Stephen Henson  Richard Levitte Geoff Thorpe
Lutz JänickeBodo Möller



-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.10 (GNU/Linux)

iQEVAwUBTPfvOKLSm3vylcdZAQK5YQf/Tt5WULaVRNZJZiukBVsASX3qyZm7ksst
VAC59VbpQAO2dA2XdSSy21JoGlevIboneEXhDVC/33wEETIucs8S19XEcrQGPDG5
Wfyek79CKxJe2K4yTaWtw8JbSz2XDyMD5yYBdgAaHl81et2F/0Vpd3FS4UWKkFSO
6ezgELdIwC45PWq70cQ2FJDV4U3xs7cVOQdObjcKTAZ5m5uj/qpUs2Zw69tfOpOp
xf+TlOMXdIgBNBY9QN//wsUcLwplVUF0J30S4Wej1Or9tTi2npiJ7Wbpq5HH3ho0
g+IuVqXVVvyYyfUgLFka2f1ZGLvBIIFVF7T56nSaVMMdX0/+D/4QZg==
=yMGM
-END PGP SIGNATURE-
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


RE: openssl-1.0.0b - include\openssl empty headers files

2010-11-24 Thread Erik Tkal
Some zip programs do not restore the links properly.  Regardless, when you 
first build, those header files should be recreated from their actual locations 
(e.g. openssl-1.0.0b/ssl/ssl.h).



Erik Tkal
Juniper OAC/UAC/Pulse Development

-Original Message-
From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of EnigmaTrader
Sent: Tuesday, November 23, 2010 10:38 PM
To: openssl-users@openssl.org
Subject: openssl-1.0.0b - include\openssl empty headers files

openssl-1.0.0b - include\openssl header

All header files in there are zero length.

Tried 0.9.8p.tar.gz also...

Has to be something I am doing.
Never run into this before.

Using 7zip.


__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


RE: compiling openssl dev-c++

2010-11-12 Thread Erik Tkal
Are you linking with ws2_32.lib?


Erik Tkal
Juniper OAC/UAC/Pulse Development

From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of g A b R i E L
Sent: Friday, November 12, 2010 10:56 AM
To: openssl-users@openssl.org
Subject: compiling openssl dev-c++

Hi Users.

How I can compiling openssl in dev-c++ for Windows?

I tried with -lssl and -lcrypto in linker option (Project->Project 
Options->Parameters->Linker), but it not  work.

Part of Compile log is:

"
C:/Dev-Cpp/lib/libcrypto.a(bss_conn.o)(.text+0x40):bss_conn.c: undefined 
reference to `conn...@12'
C:/Dev-Cpp/lib/libcrypto.a(bss_conn.o)(.text+0xe4):bss_conn.c: undefined 
reference to `setsock...@20'
C:/Dev-Cpp/lib/libcrypto.a(bss_conn.o)(.text+0x192):bss_conn.c: undefined 
reference to `ht...@4'
C:/Dev-Cpp/lib/libcrypto.a(bss_conn.o)(.text+0x1bf):bss_conn.c: undefined 
reference to `ht...@4'
C:/Dev-Cpp/lib/libcrypto.a(bss_conn.o)(.text+0x1d5):bss_conn.c: undefined 
reference to `soc...@12'
...
"

I have installed the OpenSSL 0.9.8a package for Dev-C++

Thanks!!


gabriel


RE: openssl verify fails

2010-11-03 Thread Erik Tkal
Maybe that's a bug in OpenSSL 0.9.8o?  The docs for verify say "It is an error 
if the whole chain cannot be built up."


....
Erik Tkal
Juniper OAC/UAC/Pulse Development


-Original Message-
From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of Bruce Stephens
Sent: Wednesday, November 03, 2010 12:59 PM
To: openssl-users@openssl.org
Subject: Re: openssl verify fails

Erik Tkal  writes:

> Hi Michael,
>
> Your "rootcacert" is not a root cert, as it was issued by "C=US,
> ST=UT, L=Salt Lake City, O=The USERTRUST Network,
> OU=http://www.usertrust.com, CN=UTN-USERFirst-Client Authentication
> and Email".  You need to append that cert as well to your CAfile.

That seems to be a change in behaviour.  0.9.8o is happy:
 
brs% openssl version
OpenSSL 0.9.8o 01 Jun 2010

brs% openssl verify -verbose  -CAfile rootcacert.pem subcacert.pem
subcacert.pem: OK

brs% openssl verify -issuer_checks -CAfile rootcacert.pem subcacert.pem
subcacert.pem: /C=DE/O=SCA Deutsche Post Com GmbH/CN=Signtrust CERT Class 3 
CA 3:PN
error 29 at 0 depth lookup:subject issuer mismatch
/C=DE/O=SCA Deutsche Post Com GmbH/CN=Signtrust CERT Class 3 CA 3:PN
error 29 at 0 depth lookup:subject issuer mismatch
/C=DE/O=SCA Deutsche Post Com GmbH/CN=Signtrust CERT Class 3 CA 3:PN
error 29 at 0 depth lookup:subject issuer mismatch
/C=DE/O=SCA Deutsche Post Com GmbH/CN=Signtrust CERT Root CA 1:PN
error 29 at 0 depth lookup:subject issuer mismatch
OK

[...]

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


RE: openssl verify fails

2010-11-03 Thread Erik Tkal
Hi Michael,

Your "rootcacert" is not a root cert, as it was issued by "C=US, ST=UT, L=Salt 
Lake City, O=The USERTRUST Network, OU=http://www.usertrust.com, 
CN=UTN-USERFirst-Client Authentication and Email".  You need to append that 
cert as well to your CAfile.

  Erik


....
Erik Tkal
Juniper OAC/UAC/Pulse Development

-Original Message-
From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of Michael Ströder
Sent: Wednesday, November 03, 2010 12:23 PM
To: openssl-users@openssl.org
Subject: openssl verify fails

HI!

I'm feeling dumb since this simple command fails and I cannot see why:

$ openssl verify -CAfile rootcacert.pem subcacert.pem
subcacert.pem: C = DE, O = SCA Deutsche Post Com GmbH, CN = Signtrust CERT Root 
CA 1:PN error 2 at 1 depth lookup:unable to get issuer certificate

I've attached the certs (publicly downloadable). I've checked subject-/issuer 
names and the subject and authority key ids. Maybe I'm still overlooking 
something obvious?

Many thanks in advance.

Ciao, Michael.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


RE: How can I load a PEM key stored in a string instead from a file?

2010-10-29 Thread Erik Tkal
How about using the d2i_ functions?



Erik Tkal
Juniper OAC/UAC/Pulse Development

-Original Message-
From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of Leandro Santiago
Sent: Friday, October 29, 2010 7:26 AM
To: openssl-users@openssl.org
Subject: Re: How can I load a PEM key stored in a string instead from a file?

Thanks to all. I've resolved my first problem, load the PEM from a string.
I've used BIO_new_mem_buf() and PEM_read_bio_PrivateKey().

But now I've seen that it works well with PEM keys, and now I'm trying
to use a DER key, again from a string. Is there something like
DER_read_bio_PrivateKey()?

2010/10/27 Dr. Stephen Henson :
> On Wed, Oct 27, 2010, Leandro Santiago wrote:
>
>> Ok. I've found the implementation of that function:
>>
>> EVP_PKEY *PEM_read_PrivateKey(FILE *fp, EVP_PKEY **x, pem_password_cb
>> *cb, void *u)
>>       {
>>         BIO *b;
>>         EVP_PKEY *ret;
>>
>>         if ((b=BIO_new(BIO_s_file())) == NULL)
>>               {
>>               PEMerr(PEM_F_PEM_READ_PRIVATEKEY,ERR_R_BUF_LIB);
>>                 return(0);
>>               }
>>         BIO_set_fp(b,fp,BIO_NOCLOSE);
>>         ret=PEM_read_bio_PrivateKey(b,x,cb,u);
>>         BIO_free(b);
>>         return(ret);
>>       }
>>
>> So if I need to implement a function which opens a char string as a
>> key I need to write something as the code above, but changing the
>> functions BIO_s_file() and BIO_set_fp(b,fp,BIO_NOCLOSE) to something
>> which load from that string instead from a FILE*?
>>
>> ps: yes, I'm very noob on openssl. OpenSSL is amazing, but it's very
>> hard to beginners. thx
>>
>
> As others have indicated you can use PEM_read_bio_PrivateKey() instead as
> this can be passed a BIO which is an OpenSSL I/O abstraction. You can create a
> BIO from a character string using BIO_new_mem_buf().
>
> Steve.
> --
> Dr Stephen N. Henson. OpenSSL project core developer.
> Commercial tech support now available see: http://www.openssl.org
> __
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-us...@openssl.org
> Automated List Manager                           majord...@openssl.org
>
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


RE: Error while trying to get text output from x509 cert file

2010-09-20 Thread Erik Tkal
Hi Vivek,

There is no "x509 format" in that context; an x509 certificate encoding can be 
represented in DER (binary) or PEM (text) mode.

Try:

  openssl x509 -in TestCryptPublic.cert -inform DER -text

....
Erik Tkal
Juniper OAC/UAC/Pulse Development

From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of Panikulam Vivek
Sent: Monday, September 20, 2010 10:55 AM
To: openssl-users@openssl.org
Subject: Re: Error while trying to get text output from x509 cert file

Thanks for your response. It looks like the .cert file is not in the required 
format. It is a binary file and I assumed that it is in x509 format.

Regards
Vivek Panikulam


From: Mounir IDRASSI 
To: openssl-users@openssl.org
Sent: Sat, September 18, 2010 11:13:05 PM
Subject: Re: Error while trying to get text output from x509 cert file

Hi,

The error says that it didn't find the expected start line for a
certificate which is -BEGIN CERTIFICATE- .
So, check that your certificate is indeed BASE64 encoded and that the
first line is -BEGIN CERTIFICATE- and the last is -END
CERTIFICATE- .

Cheers,
--
Mounir IDRASSI
IDRIX
http://www.idrix.fr

> Hi
>
> I am trying to get output from this x509 certificate and am getting the
> below
> error. Please let me know how to resolve this error and generate text
> output
> from this cert file.
>
> $ openssl x509 -in TestCryptPublic.cert -pubkey
> unable to load certificate
> 557096:error:0906D06C:PEM routines:PEM_read_bio:no start
> line:pem_lib.c:647:Expecting: TRUSTED CERTIFICATE
>
>
> Regards
> Vivek Panikulam
>
>
>


__
OpenSSL Projecthttp://www.openssl.org
User Support Mailing List
openssl-users@openssl.org<mailto:openssl-users@openssl.org>
Automated List Manager  
majord...@openssl.org<mailto:majord...@openssl.org>



RE: Problem verifying a chain...

2010-09-02 Thread Erik Tkal
Hi John,

Your CAfile must contain the chain that issued your cert (i.e. the 
intermediate(s) and the root).  The error is indicating that it is unable to 
locate the issuer of the intermediate.

  Erik Tkal


-Original Message-
From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of John Doe
Sent: Thursday, September 02, 2010 12:39 PM
To: openssl-users@openssl.org
Subject: Problem verifying a chain...

Hi,

I have some issues with chained certificates.
I am trying to verify my certificate with the intermediate certificate of my 
registrar...

my.crt:
Issuer: C=FR, O=GANDI SAS, CN=Gandi Standard SSL CA
Subject: OU=Domain Control Validated, OU=Gandi Standard SSL, CN=my.site.com

gandi.crt:
Issuer: C=US, ST=UT, L=Salt Lake City, O=The USERTRUST Network, 
OU=http://www.usertrust.com, CN=UTN-USERFirst-Hardware
Subject: C=FR, O=GANDI SAS, CN=Gandi Standard SSL CA

# openssl verify -CAfile gandi.crt my.crt 
my.crt: /C=FR/O=GANDI SAS/CN=Gandi Standard SSL CA
error 2 at 1 depth lookup:unable to get issuer certificate

Is it the right command to test...?
Is the error about gandi or usertrust?

Thx,
JD


  
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


RE: RE: AES in counter mode no support in openssl

2010-09-02 Thread Erik Tkal
Hi Sagar,

No, I do not see any engine support.  That code appears to use AES_encrypt 
directly, and evp.h has hints but nothing enabled:

#if 0
const EVP_CIPHER *EVP_aes_128_ctr(void);
#endif

Also, if the hardware you have (you didn't say what it was) is not supported by 
OpenSSL then the hardware vendor (or yourself) would have to implement engine 
code to perform the operations.

  Erik


From: sagar gupta 
Subject: Re: RE: AES in counter mode no support in openssl

can that aes_ctr.c be used to connect to hardware driver. I have a hardware 
driver which can implement the encryption method for more performance.

Thanks

On Thu, 02 Sep 2010 03:30:20 +0530 wrote
>

OpenSSL 1.0.0a has aes_ctr.c in the crypto/aes directory.
 
Erik Tkal



Subject: AES in counter mode
no support in openssl

hi all,

I was working on the Openssl1.0.0 version for AES cryptographic support in
counter mode i.e; AES-CTR mode. I did not find any support added to the
openssl1.0.0 version. I wanted to ask that is there support for AES counter
mode in openssl?? if Yes which version of Openssl support AES counter mode?? if
no I wanted to know why the support for AES counter mode is not added into the
openssl?? 

Any help or answers in this regard will be really useful for me. Thanks for all
in Advance. please do give me some answers for my questions.


:��I"Ϯ��r�m
(Z+�K�+1���x��h[�z�(Z+���f�y���f���h��)z{,���

RE: AES in counter mode no support in openssl

2010-09-01 Thread Erik Tkal
OpenSSL 1.0.0a has aes_ctr.c in the crypto/aes directory.

  Erik Tkal


Subject: AES in counter mode no support in openssl

hi all,

I was working on the Openssl1.0.0 version for AES cryptographic support in 
counter mode i.e; AES-CTR mode. I did not find any support added to the 
openssl1.0.0 version. I wanted to ask that is there support for AES counter 
mode in openssl?? if Yes which version of Openssl support AES counter mode?? if 
no I wanted to know why the support for AES counter mode is not added into the 
openssl??

Any help or answers in this regard will be really useful for me. Thanks for all 
in Advance. please do give me some answers for my questions.





RE: Request on AES 512 bit encryption Configuration in Openssl.

2010-09-01 Thread Erik Tkal
AES by definition has a 128-bit block size and uses either a 128, 192 or 
256-bit key.

If you mean the Rijndael algorithm, that is more flexible and can have a block 
size up to 256 bits, with no key size limit.  I do not believe OpenSSL has the 
generic support (older versions may have from pre-AES days).

  Erik Tkal





Hi,

  Is it possible to have AES 512 bit encryption in latest release of openssl.


Regards,
Uday,


RE: Cipher selection

2010-08-12 Thread Erik Tkal
Many applications have a configuration for that, either via a range 
(high/medium/low security), or by explicitly listing the cipher suites.  The 
configuration may be in a file, Windows registry, or anywhere; it's completely 
up to the application implementation.

Remember that the client offers the cipher suite list, and the server picks one 
of these.

Also note that you cannot modify the cipher suite list in the Client Hello in 
flight, as that would be detected in the handshake processing.

  Erik Tkal


-Original Message-
From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of Tim Cloud
Sent: Wednesday, August 11, 2010 11:14 PM
To: openssl-users@openssl.org
Subject: RE: Cipher selection

Let's pretend for a moment that an out of the box application uses openssl to 
provide access not through a browser, but rather through a SOAP client like 
Eclipse.
And let's also say that you have no access to the code internal to that 
application.
Is there any other way to limit the ciphers?  Some kind of config file or a 
special way to compile the executable?


From: owner-openssl-us...@openssl.org [owner-openssl-us...@openssl.org] On 
Behalf Of Kyle Hamilton [aerow...@gmail.com]
Sent: Wednesday, August 11, 2010 9:11 PM
To: openssl-users@openssl.org
Cc: Alex Chen
Subject: Re: Cipher selection

 No, OpenSSL chooses the cipher from the argument to
SSL[_CTX]_set_cipher_list(3ssl) called on the SSL or the SSL_CTX structure.

On 8/11/10 4:57 PM, Alex Chen wrote:
> Does openssl choose the cipher from the pem file? If so, which section of the 
> following pem file sets the cipher for communication?

-
CONFIDENTIALITY NOTICE
This e-mail is intended for the sole use of the individual(s) to whom it is 
addressed, and may contain information that is privileged, confidential and 
exempt from disclosure under applicable law.  You are hereby notified that any 
dissemination, duplication, or distribution of this transmission by someone 
other than the intended addressee or its designated agent is strictly 
prohibited.  If you receive this e-mail in error, please notify me immediately 
by replying to this e-mail.

-


__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Tolerating no client Certificate message in TLS

2003-08-14 Thread Erik Tkal
RFC 2246 says:

7.4.6. Client certificate
   When this message will be sent:
   This is the first message the client can send after receiving a
   server hello done message. This message is only sent if the
   server requests a certificate. If no suitable certificate is
   available, the client should send a certificate message
   containing no certificates.

Note that the wording is that the client SHOULD send  certificate message, not MUST.

Yet, in s3_srvr.c when it gets to the ClientKeyExchange msg if no cert msg was sent,

/* If tls asked for a client cert, the client must return a 0 list */
if ((s->version > SSL3_VERSION) && s->s3->tmp.cert_request)
{
SSLerr(SSL_F_SSL3_GET_CLIENT_CERTIFICATE,
SSL_R_TLS_PEER_DID_NOT_RESPOND_WITH_CERTIFICATE_LIST);
al=SSL_AD_UNEXPECTED_MESSAGE;
goto f_err;
}

And the handshake fails. Should the code really be more tolerant and handle a client 
that does not send the certificate message at all?

  Erik Tkal
  Funk Software, inc
  replies to etkal(at)funk(dot)com


__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]