RE: Maximum size of RSA message, was: Re: RSA Encrypt/Decrypt fails

2001-02-25 Thread Harry Whitehouse



-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of Reddie, Steven
Sent: Sunday, February 25, 2001 4:26 PM
To: [EMAIL PROTECTED]
Subject: RE: Maximum size of RSA message, was: Re: RSA Encrypt/Decrypt
fails


The message being encrypted/decrypted MUST be smaller than the modulus of
the key.  Think about the operation that takes place during encryption:
c = m^e mod n
where:
m is the message to be encrypted,
(n,e) is the public key (modulus and exponent)
c is the ciphertext (encrypted output)

The "mod n" results in the output value, c, being limited to a value in the
range 0 to n-1 inclusive.  If m is bigger than n then too much data will be
thrown away by the modulo operation and it will not be possible to recover
the original message.

It is not just a matter of clearing the top bit of the message.  The message
must be a smaller value than the modulus.

Steven
--
Steven Reddie [EMAIL PROTECTED]
Senior Software Engineer
Computer Associates Pty Ltd (Australia)


 -Original Message-
 From: Guus Sliepen [SMTP:[EMAIL PROTECTED]]
 Sent: Monday, February 26, 2001 3:55 AM
 To:   [EMAIL PROTECTED]
 Subject:  Maximum size of RSA message, was: Re: RSA Encrypt/Decrypt
 fails

On Wed, Feb 14, 2001 at 02:44:02PM -0800, Joseph Ashwood wrote:

 Just a guess, but a fairly educated one, try setting flen to 1 byte (or
even
 1 bit) smaller than the key. What I suspect is happening is you are
 sometimes trying to encrypt values that are larger than the modulus so
 you're getting a modular reduction of the value encrypted.
 Joe

I'm having a similar problem. For authentication and key exchange purposes,
I
generate a random string which is exactly as long as my RSA key is. Then I
encrypt it without padding (since the message it is totally random noise and
just used once). However, the message is not decrypted properly on the other
end when the first bit of the plaintext was set.

Why is this? Nowhere in documentation or literature can I find that the
first
bit should not be set. Is this a bug in OpenSSL? Or is this a known fact?

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



IE vs Netscape Based SSL clients

2000-12-28 Thread Harry Whitehouse

We have had success using the MS Internet Explorer core (WININET.DLL) to
create a WIN32 SSL client.  There are a number of exposed API calls in
WININET which make this job pretty easy (some of which call other MS DLL's
which perform the cypto

I'm wondering if the Netscape environment has similar API resources.  Has
anyone had experiences with Netscape in this regard?

TIA

Harry


__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



RE: Looking for an HTTPS client for NT C/C++

2000-11-20 Thread Harry Whitehouse

John -- Take a look at the WININET.DLL resources on the MS site.  This DLL
is the core of Internet Explorer and the API set is exposed to developers.
The user must have IE installed on their machine (although it needn't be
their default browser) for this to work.

HTH

Harry

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of John Townsend
Sent: Sunday, November 19, 2000 5:25 PM
To: [EMAIL PROTECTED]
Subject: Looking for an HTTPS client for NT C/C++


I'm looking for a basic HTTPS client program that will compile and run under
NT
(preferably with VC++).  If it can just GET a page from a named HTTPS server
with authentication and echo it to standard output, that would be perfect.
I've
looked at several examples already (including the ssl/cli.cpp and
bio/sconnect.c
examples in the OpenSSL distribution and the SSL gadget at Darkspell), but
haven't quite found what I'm looking for.  The biggest problem is probably
that
I'm a UNIX programmer, not an NT programmer, and am having various problems
getting some of these to port.  If someone could send or direct me to a
better
example, I'd be most grateful.  Thanks!

--
John E. Townsend
Sr. Software Engineer  "Machines should work;
LEXIS-NEXIS people should think."
Dayton OH, USA-- IBM Pollyanna Principle
[EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



RE: string - file

2000-06-27 Thread Harry Whitehouse

Albert

How about using an HTTPS PUT operation?

Best

Harry
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of Albert Serra
Sent: Tuesday, June 27, 2000 2:51 AM
To: [EMAIL PROTECTED]
Subject: string - file


Hello again,

another question,

if I want to transmit a file between the client and the server, do I
have to convert the file to a string and then send byte by byte.

I am doing the client and the server in C code and I know the SSL_read
and SSL_write, but in their declaration the paramater to pass is a
string. So is there a function that sends a file using SSL or I have to
program it.

thanks

albert

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



RE: Proxy or Firewall

2000-05-01 Thread Harry Whitehouse

PMFJI...

How does one utilize something like a Cisco PIX firewall in an SSL
environment?  On option the firewall seems to offer is translation of
network addresses, so a message that might be routed to vvv.xxx.yyy.zzz (a
web-registered address) could rerouted to a private network address by the
firewall.  But wouldn't that cause some grief at the SSL server when it's
fielding a message destined for some private network address, but it's
certificate is registered for vvv.xxx.yyy.zzz and an associated domain name?
Or is it only the client that is concerned with this match?

TIA

Harry



-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of Tony Nelson
Sent: Monday, May 01, 2000 9:35 AM
To: [EMAIL PROTECTED]
Subject: Re: Proxy or Firewall


On Mon, May 01, 2000 at 08:44:17AM -0600, Mike Nigbor wrote:
 OK, so how does this differ from a "man-in-the-middle" attack?

 Since there are two SSL sessions, there must be two session encryption
keys
 and the proxy must be decrypting and re-encrypting everything it sees.

 If I'm a client, shouldn't I reject such a connection?


It doesn't .. it actually is a man-in-the-middle attack.. however, the
"attack"
is being done by the corporation that writes your paycheck.. and there are
very valid reasons for a company to be doing such things..  as a client,
(or server) you really have no way of detecting that this is happening..

Basically, you end up w/ this picutre..

   ---   --
| user | --- session 1 --- | f/w | --- session 2 --- | server |
   ---   --

Hope this helps,
Tony Nelson
TIS Worldwide, Firewall Admin


 -Original Message-
 From: [EMAIL PROTECTED]
 [mailto:[EMAIL PROTECTED]]On Behalf Of James Dabbs
 Sent: Saturday, April 29, 2000 6:41 AM
 To: [EMAIL PROTECTED]
 Subject: RE: Proxy or Firewall


 I believe that many enterprises that do not allow an unbroken SSL
connection
 directly from the client throught the proxy/firewall to the remote server.
 This is because security policy may allows/disallow certain MIME types in
 the entity of the HTTP response.  For this reason, SSL is "broken" at the
 proxy, and reestablished with a seperate SSL session between the proxy and
 the remote server.  This is not quite as tansparent to the client, but
still
 fairly so.  The proxy is much more complicated.

 It is my understanding that this scheme is becoming the prevailing
security
 strategy in large corporations, gaining favor over transparent SSL pass
 through.  Am I wrong on this?

 James Dabbs

 James Dabbs
 [EMAIL PROTECTED]

 Director of Engineering
 TGA Technologies, Inc.
 Suite 140, 100 Pinnacle Way
 Norcross, GA 30071

 770-441-2100 ext 126

  -Original Message-
  From:   Hansknecht, Deborah A [SMTP:[EMAIL PROTECTED]]
  Sent:   Friday, April 28, 2000 2:57 PM
  To: '[EMAIL PROTECTED]'
  Subject:RE: Proxy or Firewall
 
  A few comments included within...
 
   -Original Message-
   From: James Dabbs [mailto:[EMAIL PROTECTED]]
   Sent: April 28, 2000 5:37 AM
   To: [EMAIL PROTECTED]
   Subject: RE: Proxy or Firewall
 
  ..deleted stuff
 
   HTTP over SSL, though, works transparently through almost any
   proxy.  This
   is because the HTTP client knows that the proxy exists.  It
   sets an SSL
   session up with the proxy, and tells the proxy to set up a
   seperate SSL
   session with the actual server.  As long as requests are
   initiated by the
   client, everything is OK.
 
  Perhaps I missed some context in other messages that makes the above
  statements correct (and I am probably veering off-topic), but as written
  this is not true. HTTP works over SSL thru a proxy transparently because
  the
  client knows that a proxy exists, (that much is true) but it DOES NOT
set
  up
  an SSL session. The client sends HTTPS via CONNECT which the proxy just
  passes on to the end server. Your standard HTTP proxy does not negotiate
  any
  SSL session with either client or server. (that is obvious if you
remember
  that you do not need an SSL aware
  proxy - i.e. Apache with mod-ssl or Apache-SSL - if all you want to do
is
  proxy HTTP or HTTPS requests.) If you are "reverse-proxying" then the
  proxy
  DOES negotiate separate SSL sessions with client and server, but that is
  an
  entirely different bucket of worms and the client browser doesn't even
  know
  that you are using a proxy.
 
 __
 OpenSSL Project http://www.openssl.org
 User Support Mailing List[EMAIL PROTECTED]
 Automated List Manager   [EMAIL PROTECTED]

 __
 OpenSSL Project http://www.openssl.org
 User Support Mailing List[EMAIL PROTECTED]
 Automated List 

RE: Question about Browser Authenticity

1999-11-16 Thread Harry Whitehouse

Rene, Nicholas, Ben, Terrell and Goetz -- 

Thanks to your all for your comments!  Most helpful!

Harry


__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Question about Browser Authenticity

1999-11-15 Thread Harry Whitehouse

This may be slightly off-topic, so let me apologize in advance.

The SSL protocol requires that the client side (say a browser) use
appropriate crypto to read the server's certificate and verify the signature
on the transmitted public key (using the public key of a trusted 3rd party
such as Verisign).

How can the user be certain that their browser (or other SSL3 client) hasn't
been compromised -- or that they have a roque version of the client -- which
will go through the motions of authenticating the server but really not do a
proper job.  The result being that the user *thinks* he/she has established
a secure connection to the desired party, but in fact are connected to
another site.

Basically, the issue is how does one ensure (if possible!) that an internet
client is using valid methods to verify server certificates?

TIA

Harry

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



RE: OT: Hardware proxy?

1999-07-22 Thread Harry Whitehouse

Leland -- I scanned your site and Watchguard's.  Both look very interesting
and relevant to my needs.

We are in the early design phases of a super secure, rather high volume
(perhaps 1M hits/8 hr day) environment.

The transactions are quite simple.  An incoming HTTPS query of about 150
bytes.   The response from the secure service is also about 150 bytes long.
The HTTPS query will be handled by a farm of NT servers running IIS.  We are
using ISAPI DLL's (which run under IIS) to handle the HTTPS request.

This is the ONLY type of traffic which will traverse the firewall.  There
will be no need for PC's inside this secure network to browse or access the
Internet.  The network will be ENTIRELY dedicated to these secure
transactions.

So what I need Firewall II to do is

a).  Permit these HTTPS transactions.
b).  Exclude all other port traffic.
c).  Provide absolutely no access to the internal NT farm except via the
aforementioned HTTPS transactions.
d).  Perhaps provide protection against denial of service attacks (if that's
possible with such a device).
e).  Be certain that Firewall II can not be hacked or administered by
outside parties.

Are we are the right track with FireWall II?  How do I provide system
reduncancy -- with two units running in parallel?

TIA

Harry
(yet other Ph.D.! Mechanical Engineering)


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of Leland V. Lammert
Sent: Thursday, July 22, 1999 9:07 AM
To: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: Re: OT: Hardware proxy?


At 02:47 PM 7/21/99 -0700, Harry Whitehouse wrote:

Is there an industrial-strength proxy available commerically which only
permits 443 traffic?  I know I could get something like MS Proxy Server
software and run it on an NT, but the stream of security patches I get from
MS regarding NT isn't particularly calming to me -- suppose someone hacks
my
proxy NT?

So is there something more basic -- perhaps a dedicated hardware device --
which would do this job?

Harry,

It *sounds* like you are describing a 'network appliance firewall'. We sell
and
have had excellent experience with the Firebox II, from WatchGuard
(www.watchguard.com). Moderate cost ($5K), stand-along bright red box - no
OS
troubles (though it is Linux based), no separate hardware, *really*
straightforward management from your admin console, realtime security
updates
(daily).

Lee

   Leland V. Lammert[EMAIL PROTECTED]
  Chief Scientist Omnitec Corporation
  Network/Internet Consultants  www.omnitec.net

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



RE: Storing information on the server -- NEWBIE ?

1999-07-10 Thread Harry Whitehouse

PMFJI --

I'm curious as to what folks have used to separate the SSL server from the
"isolated back end".  SCSI, RS232, other techniques?  Are there commerical
solutions available?

TIA

Harry

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED]]On Behalf Of Craig Southeren
Sent: Saturday, July 10, 1999 5:20 PM
To: [EMAIL PROTECTED]
Subject: RE: Storing information on the server -- NEWBIE ?


 Michael wrote:
 
  Credit card information should not be kept on the server.
 Send it on a
  one-way only trip to a second machine which is no accessible via the
  internet.

 How do you do that, then? (FWIW, I agree with the "one way trip" bit,
 but it seems to me that "not accessible via the Internet" is a
 contradiction - "accessible in only a very restricted way" would make
 more sense).

We have taken the approach described by Michael on our network.

The SSL server that accepts the information must obviously by connected to
the Internet. However, the information is immediately transferred to another
machine that, although it is connected to the SSL server, does not have any
direct connection to the Internet.

Storing the information on the SSL server is a Very Bad Idea (tm), as it
makes it available to anyone who can hack into SSL server. Putting it at
arms length, whilst not necessarily more secure in an absolute sense,
extends the time it will take for someone to crack the connection, which
increases the likelihood that you will catch them before they succeed.

   Regards,

  Craig Southeren

 ---
 Equivalence - home of FireDoor, MibMaster  PhonePatch

 Email: [EMAIL PROTECTED]
 Web:   http://www.equival.com.au
 Fax:   +61 2 4368 1395Voice: +61 2 4368 2118
-

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]