Re: trying to get valid SSL cert working with uw-imap server.

2007-05-23 Thread Rabellino Sergio

[EMAIL PROTECTED] wrote:

hey list,
I have a uw-imap server installed on a solaris box. We currently have a working SSL certificate thats 
about to expire on our server. On top of that, our internal team that issues the certificates is changing 
their root certs, so we need to update that as well. 
so I have a new cert for my server and Im trying to get pine and mutt to connnect to it, but pine 
complains that its a self signed cert..


as does the openssl client

SSL-Session:
Protocol  : TLSv1
Cipher: AES256-SHA
Session-ID: 9878A3F0C550C7124A6FD64FC809E10971EFA324230151955A4CD64C5CEDFF52
Session-ID-ctx: 
Master-Key: 
2E11F61B9BA160292DD85683983AFB20BAEFB9430E8ABDBE6819CBD7AC877BD1503C82D170DEFC2FFC7FA759F64728AF

Key-Arg   : None
Start Time: 1179932976
Timeout   : 300 (sec)
Verify return code: 19 (self signed certificate in certificate chain)


What should I do to troubleshoot this?

regards,
Jason

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]

Maybe this isn't the correct list to ask for uw-imap...

But you must add your new root certs to the CA certs databases where pine and 
mutt are searching for.
For pine, the default path is embedded in the code (for mutt I don't know), 
during the build phase you can tell him

./build SSLCERTS=/path/to/CA root certs directory (hashed!!)

With openssl s_client, you must tell him to point out the same dir with the option -CApath /path/to/CA root certs 
directory (hashed!!)


Good luck!
--
Ing. Sergio Rabellino

 Head of ICT Services
 Department of Computer Science
 University of Torino (Italy)

http://www.di.unito.it/~rabser
Tel. +39-0116706701
Fax. +39-011751603
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: PKCS#7

2006-01-17 Thread Rabellino Sergio

Bernhard Froehlich wrote:


[EMAIL PROTECTED] wrote:



Hi!

I need to convert PKCS#7 attached signatures to PKCS#7 detached 
signatures.


Is it possibly? Is there any example?

Thanks anyway! 



Since noone else answered I'll thay the little I believe to know about 
the subject... ;)


I don't think doing this is possible using the openssl utilitoies, but 
it might be done using the ASN1 APIs. Maybe you should have a look at 
the asn1parse utility (apps/asn1pars.c) as a staring point.


And tell me if you find out more.
Ted
;)


You can give a chance to openssl, viewing around the smime option.
You must convert your pkcs#7 back to smime, then take a look at the 
-nodetach implementation in the smime, maybe you can find the exact way 
to do the detach

conversion.

Hope this helps.

--
Dott. Mag. Sergio Rabellino 


Technical Staff
Department of Computer Science
University of Torino (Italy)

http://www.di.unito.it/~rabser
Tel. +39-0116706701
Fax. +39-011751603

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: Having problem compillin in solaris 10.

2005-09-02 Thread Rabellino Sergio

Lisandro Grullon wrote:


Andrea, can you point me in the right direction where to find the compiler to 
supportamd64. thanks.
 

I can give you a download for a tar of my gcc 4.0.1 installation... 
(/opt/gnu as installpath).


Try on http://www.di.unito.it/~rabser/gcc_401_Solaris10_amd64.tar.gz (36Mb)

Bye.

--
Dott. Mag. Sergio Rabellino 


Technical Staff
Department of Computer Science
University of Torino (Italy)

http://www.di.unito.it/~rabser
Tel. +39-0116706701
Fax. +39-011751603

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: For those of you using Solaris 10.

2005-08-31 Thread Rabellino Sergio

Lisandro Grullon wrote:


Hi all,

After struggling with the installation in two different production servers of 
openssl 0.9.8 I decided to give it a shot in a new clean server just install. I 
install the usual stuff (make,gcc, libconv,perl(is already include in Solaris 
10) ) After you install those things you will need to define your PATH to find 
the compiler and make ,etc. After that you can gunzip and tar -xvf openssl.

If everything goes ok, you can cd into the openssl directory and do a ./config 
this will create the tree structure for the source.  After doing your configure 
do the make, after doing make you will see warning all over the place, just 
disregard the warning for a minute. After make is done, try doing make clean 
again at the end you will see maybe 1 or 2 warnings, finally do a make again 
and you should not see warning, that is what happen on my case, don't know what 
will happen in yours. Well, if everything goes well, you should be ready to do 
a make install now. Go ahead and install it.

This method works for me using Solaris 10 x86 opteron, it seems that the 
release still have a few bugs that need to be fix for now, I will just keep 
compiling it this way since it is working. Good look to those of you compiling 
this in Solaris 10 x86.


 

I've compiled on the same architecture, same S.O., with the latest gcc 
from sunfreeware.com without any problem at all.
Some problem appear during the apache2, ssl module compilarion caused by 
a different constant defined in the new 0.9.8 (PEM_something)


bye.

--
Dott. Mag. Sergio Rabellino 


Technical Staff
Department of Computer Science
University of Torino (Italy)

http://www.di.unito.it/~rabser
Tel. +39-0116706701
Fax. +39-011751603

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: DES_ede3_cbc_encrypt and padding

2005-08-30 Thread Rabellino Sergio

Alicia da Conceicao wrote:


Greetings:

The DES_ede3_cbc_encrypt() routine does not appear to properly pad
data to fill out the last block.

Consider, if the last block contains 4 bytes for the unencrypted
text test, DES_ede3_cbc_encrypt() is only padding the remaining
characters with NULL characters:

74:65:73:74:00:00:00:00

But shouldn't it be padded as follow:

74:65:73:74:00:00:00:04

with the last byte containing the number of padded bytes.  Note that
if the last block is full, then an additional block of padding is
added with 00:00:00:00:00:00:00:08.

Is CBC padding in OpenSSL handled by a separate routine?  Shouldn't
CBC padding be handled by the CBC routine?

Thanks in advance.
Alicia.

 

I noticed also a make test persistent failure if DES is enabled in 
Sparc/Solaris9/gcc342 hosts (4host tested) in 0.9.8.
In my journey around 0.9.8 to solve the problem, a segmentation fault is 
done calling des cbc encrypt/decrypt.


Note also that i'd no problems at all to compiletest openssl until this 
last release.


--
Dott. Mag. Sergio Rabellino 


Technical Staff
Department of Computer Science
University of Torino (Italy)

http://www.di.unito.it/~rabser
Tel. +39-0116706701
Fax. +39-011751603

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: How can i convert p12/pfx to java key store (JKS) format

2005-08-22 Thread Rabellino Sergio

Jaleel P.A wrote:

Hi,

How can i convert p12/pfx to java key store (JKS) format

Please let me know.

This is bit urgent.

thanks
Jaleel


Take a  look at http://www.lazgosoftware.com/kse
The KeyStore Explorer could be the simplest way to do that, or you can do this by hands, using the java KeyTool bundled 
with the JDK, in the documentation you can find

everything, but you must unpack first your p12 with openssl pkcs12 command to 
get key and certs readable by the keytool.

Bye.
--
Dott. Mag. Sergio Rabellino

 Technical Staff
 Department of Computer Science
 University of Torino (Italy)

http://www.di.unito.it/~rabser
Tel. +39-0116706701
Fax. +39-011751603
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: Documentation on Sendmail TLS

2005-08-17 Thread Rabellino Sergio

Stephen T Albright wrote:


Hello to all.

First let me apologize for this message if it is not
the correct list, but I need to start somewhere.

Now my question.
I have recently been tasked with recompiling Sendmail
on a Sunfire 120 to include TLS support.  I understand
I need OpenSSL, and I have found some sites with
information, but not enough to answer all of my
questions.  Does anyone know of a site, or recommend a
book about OpenSSL configuration for this.  Thanks to
all for your time.



I'm running sendmail with TLS enabled since Y2K, but no particular openssl 
configuration is requested.
You must compile it and configure sendmail to use openssl API to achieve TLS 
channels for your MTA/MSA.

If you have any question, send to me in private mail, this is not the right 
list.
--
Dott. Mag. Sergio Rabellino

 Technical Staff
 Department of Computer Science
 University of Torino (Italy)

http://www.di.unito.it/~rabser
Tel. +39-0116706701
Fax. +39-011751603
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Openssl 0.9.8 make test failed - addendum

2005-07-06 Thread Rabellino Sergio

This is the segmentation-fault line inside destest.c


DES_ede3_cbcm_encrypt(cbc_data,cbc_out,16L,ks,ks2,ks3,iv3,iv2,DES_ENCRYPT);

I'm using gcc as stated below:


Reading specs from 
/usr/local/gnu_r342_solaris9/bin/../lib/gcc/sparc-sun-solaris2.9/3.4.2/specs
Configured with: ../gcc-3.4.2//configure --prefix=/opt/gnu --disable-nls 
--enable-languages=c,c++ --enable-threads=posix 
--enable-version-specific-runtime-libs --enable-shared 
--with-as=/usr/ccs/bin/as --with-ld=/usr/ccs/bin/ld --disable-libgcj 
sparc-sun-solaris2.9
Thread model: posix
gcc version 3.4.2


Thanks to Developers for Openssl Stuffs!
--
Dott. Mag. Sergio Rabellino

 Technical Staff
 Department of Computer Science
 University of Torino (Italy)

http://www.di.unito.it/~rabser
Tel. +39-0116706701
Fax. +39-011751603

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: Any issues with WinXP SP2?

2004-08-17 Thread Rabellino Sergio
Lucius Millinder wrote:
Know where I can get the url:// for sp2?
Here you can find the download area for XP-SP2 (english only for now...)
http://www.microsoft.com/technet/prodtechnol/winxppro/maintain/winxpsp2.mspx
Lucius L. Millinder Jr.
Security  SAN Systems Specialist
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Scott Morgan
Sent: Tuesday, August 17, 2004 6:54 AM
To: [EMAIL PROTECTED]
Subject: Any issues with WinXP SP2?
I'm mainly thinking about the data execution prevention (DEP) feature.
As far as I can make out it's all okay.
Scott Morgan
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]

--
Dott. Sergio Rabellino
 Technical Staff
 Department of Computer Science
 University of Torino (Italy)
http://www.di.unito.it/~rabser
Tel. +39-0116706701
Fax. +39-011751603
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]


Re: 0.9.7c Vulnerability??

2003-12-30 Thread Rabellino Sergio
Fred Merritt wrote:
Michael, Andrew, Fred, and Mark,
  first of all,
thank you for your rapid response to my append to this list.  All your
comments were constructive, and helpful.
Do I have any reason to think that this is an OpenSSL bug?
No - I have my doubts.  If this was an  OpenSSL bug in the wild, I am
sure that this list would be full of  appends about it.  What makes me
think it might be, is
  1.  The quoted(might be false trail) modus operandi of the hackers -
 use an openssl scanner, get in and then do a root exploit . . .
  2. The first attack followed this MO impeccably, but I only have
 myself to blame for not being up to date.  The first attack
 downloaded files - like telnet, and some backdoors to /tmp.  All
 files were nobody nogroup.  A root exploit was downloaded, and my
 machine was theirs.
  3. The system was rebuilt, except for the Apache sub-system, and was
 not attacked .  No data files from the original incarnation of the
 system were installed on the machine. All code restored was from
 the development site, and could not possibly have been corrupted.
 The system was online for 3 days without Apache/OpenSSL.  Apache
 without OpenSSL was up and down several times.  Nothing was
 attacked.  Within two hours of  the Apache/OpenSSL service being
 restored, the system was attacked in the manner described in the
 original append.
  4. In the second attack, the kernel was protected from the root
 exploit to which it was vulnerable in the first attack.  In this
 attack, files were also downloaded to /tmp, but the crackers were
 unable to gain root access(I think!!), at least I have no evidence
 of this.  All the files down loaded were once again user/group
 nobody/nogroup.  there were some traces of the attacker trying to
 damage files, but getting rejected due to not having the
 appropriate permissions.
  5. The attackers in their publicity on their own site do not (apart
 from their claims of omnipotency) claim to be capable of attacking
 0.9.7c  it may be that their particular scanner was capable of
 attacking 9.7c, be they themselves were not aware of it (if (it
 was  if they were) { I'm sure there would have been a lot of noise})
Could be interesting know the url of this site...
Obviously a visit must be done with an anonymizer proxy in the middle... :-)
...omissis...

--
Dott. Sergio Rabellino
 Technical Staff
 Department of Computer Science
 University of Torino (Italy)
http://www.di.unito.it/~rabser
Tel. +39-0116706701
Fax. +39-011751603
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]


0.9.7a Win32-VC++ 6.0 Compilation problem

2003-02-24 Thread Rabellino Sergio
Dear developers,
 I had a little (maybe) trouble to get compile the latest release of the package:
 the compiler is telling me about a redefinition of NETSCAPE_ENCRYPTED_PKEY and NETSCAPE_PKEY

 in the file crypto/asn1/n_pkey.c at line 96 and 109 ( DECLARE_ASN1_ENCODE_FUNCTIONS_const  ).

 Commenting out the lines, the compilation job is ok, and so the test suite, but which are the implications of this 
line removal ??

Thanks a lot.
--
Dott. Sergio Rabellino
 Technical Staff
 Department of Computer Science
 University of Torino (Italy)
 Member of the Internet Society
http://www.di.unito.it/~rabser
Tel. +39-0116706701
Fax. +39-011751603
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]


Re: 0.9.7a Win32-VC++ 6.0 Compilation problem

2003-02-24 Thread Rabellino Sergio
Dr. Stephen Henson wrote:
On Mon, Feb 24, 2003, Rabellino Sergio wrote:


Dear developers,
I had a little (maybe) trouble to get compile the latest release of the 
package:

the compiler is telling me about a redefinition of NETSCAPE_ENCRYPTED_PKEY 
and NETSCAPE_PKEY

in the file crypto/asn1/n_pkey.c at line 96 and 109 ( 
DECLARE_ASN1_ENCODE_FUNCTIONS_const  ).

Commenting out the lines, the compilation job is ok, and so the test 
suite, but which are the implications of this line removal ??



I've tested compiling OpenSSL 0.9.7a with VC++ and various SPs and never
had any problems like that: it should compile without any warnings.
Check that the line:

#define EXPORT_VAR_AS_FUNCTION

appears in crypto\opensslconf.h if not then the configuration didn't work.
Make sure you follow all the steps in INSTALL.W32 to the letter.
normally I follow all the steps, as I recompile openssl for my project as soon as a new version is available...

The define was not present, so I run again perl Configure and the the define appear ...

All the things go fine ... maybe i've missed the first step ?? Maybe ...

Thanks again.
--
Dott. Sergio Rabellino
 Technical Staff
 Department of Computer Science
 University of Torino (Italy)
 Member of the Internet Society
http://www.di.unito.it/~rabser
Tel. +39-0116706701
Fax. +39-011751603
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]


Re: I just want the binaries for W2K

2002-12-13 Thread Rabellino Sergio
Peter 'Luna' Runestig wrote:

Marcel Elsner wrote:


Hi,
 
i am sick of compiling everything again and again using 3 or more 
different compilers. I really tried it but now just want
running code. Is anybody out there who allready has the binarys for 
windows 2000? if, then please send it or give me
a link where i can download.


Here's one suggestion:
ftp://ftp.runestig.com/pub/openssl-win32/openssl-0.9.6h.msi
ftp://ftp.runestig.com/pub/openssl-win32/openssl-0.9.6h.msi.sig
or
http://www.runestig.com/pub/openssl-win32/openssl-0.9.6h.msi
http://www.runestig.com/pub/openssl-win32/openssl-0.9.6h.msi.sig

More info about these packages:
http://marc.theaimsgroup.com/?l=openssl-devm=103210259026139w=2

Cheers,
- Peter


Hi peter, which tool are you using to create .msi packages ??
It's a freeware one ?


Thanks.
--
Dott. Sergio Rabellino

 Technical Staff
 Department of Computer Science
 University of Torino (Italy)
 Member of the Internet Society

http://www.di.unito.it/~rabser
Tel. +39-0116706701
Fax. +39-011751603

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: Remove passprase

2002-10-25 Thread Rabellino Sergio
Robbert Hardin wrote:
 
 Hello Bruno
 
 I tried, but it doesn't work:
 
 # openssl rsa -in cakey.pem -out canokey.pem
 read RSA key
 Enter PEM pass phrase:
 unable to load key
 15251:error:06065064:digital envelope routines:EVP_DecryptFinal:bad
 decrypt:/usr/src/secure/lib/libcrypto/../../../crypto/openssl/crypto/evp/evp
 _enc.c:277:
 15251:error:0906A065:PEM routines:PEM_do_header:bad
 decrypt:/usr/src/secure/lib/libcrypto/../../../crypto/openssl/crypto/pem/pem
 _lib.c:452:
 #
 
 I forgot to tell you I lost the pass phrase, which is why I wanted to change
 it. Sorry.
 
 Let me rephrase my question:
 Is it possible to remove or change a PEM pass phrase on keypair.pem
 generated with openssl if you don't have the PEM pass phrase?
 
 Cheers, Robbert
Only by brute force, I suppose, or everything we do is not security 
-- 
Dott. Sergio Rabellino 

 Technical Staff
 Department of Computer Science
 University of Torino (Italy)
 Member of the Internet Society

http://www.di.unito.it/~rabser
Tel. +39-0116706701
Fax. +39-011751603
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: SSL_write problems

2002-09-02 Thread Rabellino Sergio

Trey A Mujakporue wrote:
 
 I recently posted a message to the list with details of a problem i am
 experiencing with Qpopper ver 4.04 with SSL/TLS enabled using Openssl
 version 0.9.6e It seems like this probelm has been ongoing for the past 2
 years but there has been no fix. From my investigations it appears that the
 the problem may exist in the qpopper implementation of the SSL libraries,
 hence my posting to both lists, Im kinda desperate now so any help would be
 apreciated!
 
 details as follows.
 why not use ipop3d from washington university ???
see at http://www.washington.edu/imap
Bye.
-- 
Dott. Sergio Rabellino 

 Technical Staff
 Department of Computer Science
 University of Torino (Italy)
 Member of the Internet Society

http://www.di.unito.it/~rabser
Tel. +39-0116706701
Fax. +39-011751603
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: Compiling OpenSSH 3.3 or 3.4 with OpenSSL 0.9.6e under Solari s 9

2002-08-01 Thread Rabellino Sergio

Lutz Jaenicke wrote:
 
 On Thu, Aug 01, 2002 at 11:15:24AM +1000, Kalam, Imran wrote:
  I get the similar error when I am compiling openssl-0.6.c on solaris 2.6
  operating system but the only difference is it complains about libld.so.1,
  which is missing from /usr/lib but it exits in /usr/ccs/lib directory, any
  help please ???
 
 Seems that OpenSSL was compiled on a machine with libld.so.1 being located
 in another directory. I guess that you should recompile OpenSSL from source.
 I don't have Solaris around, so I cannot give you more than this generic
 advice.
 
 Best regards,
 Lutz
On my solaris 2.6, that library is missing at all; which compiler are you using: cc or 
gcc ?
-- 
Dott. Sergio Rabellino 

 Technical Staff
 Department of Computer Science
 University of Torino (Italy)
 Member of the Internet Society

http://www.di.unito.it/~rabser
Tel. +39-0116706701
Fax. +39-011751603
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: build a pkcs10 request using private / public key on asmartcard

2002-07-19 Thread Rabellino Sergio

Hul van den, G (Gerrit) wrote:
 
 Hi all,
 
 I want to build a pkcs10 request using the openssl software, but with the
 private/public key on a smartcard. I have a pcks11 library to access the
 smartcard.
 
 If have stripped the req.c source, and now I have to do two things:
 - Push the public key into the pkcs10 request structure.
 - Sign the request.
 
 To begin with the sign: This is not to difficult: I'll sign the request with
 the pkcs11 library and push the sign into the request structure. I think
 this will work.
 
 Pushing the public key is different. The openssl req command expects a
 private key. It extracts the public key from the private key and pushes the
 public key into the pkcs10 request.
 
 I don't have access to the private key: it is on the smartcard, but it is
 possible to read the public key components: the modulus and exponent.
 
 I have tried to analyse how the public key is retrieved from the private key
 in the req command and how it is pushed into the request, but I can't find
 the solution for my problem:
 
 howto push the public key (modulus and exponent) directly into the
 pkcs10 request structure - the X509_REQ structure in req.c; defined in
 x509.h.
 
 Does someone have any idea?
 
 Greetings,
 
 Inside the array PublicKeys[] i've the public keys parameters stored in the token

  pkey=EVP_PKEY_new();^M
^M
  rsapubkey=RSA_new();^M
^M
  // We must get the hex version of the modulus and the exponent...^M
  strcpy(modstring,);^M
  for(k=0;kMODULUS_SIZE;k++)^M
  {^M
sprintf(hexchar,%02.2x,PublicKeys[SelectedKeyPair].Modulus[k]);^M
strcat(modstring,hexchar);^M
  }^M
^M
  strcpy(expstring,);  ^M
  for(k=0;kEXPONENT_SIZE;k++)^M
  {^M
sprintf(hexchar,%02.2x,PublicKeys[SelectedKeyPair].Exponent[k]);^M
strcat(expstring,hexchar);^M
  }^M
^M
  BN_hex2bn((rsapubkey-n),modstring);^M
  BN_hex2bn((rsapubkey-e),expstring);^M
  rsapubkey-d=NULL;^M
  rsapubkey-p=NULL;^M
  rsapubkey-q=NULL;^M
^M
#ifdef RABSER_DEBUG^M
  printf(Request ModString is %s\n,modstring);^M
  printf(Request ExpString is %s\n,expstring);^M
#endif^M
^M
  EVP_PKEY_assign_RSA(pkey,rsapubkey);

So you have a pkey to pass to the request creation call

This works for me  (Eutron CryptoIdentity USB Token with PKCS#11 Interface)

 Gerrit
 
 **
 Gerrit van den Hul
 Senior Software Designer
 Altium - Think it, Design it, Build it
 Phone Rabobank: +31 30 21 51 390
 Phone Altium: +31 33 455 8584
 Fax Altium: +31 33 455 5503
 mobile: +31 6 1464 9859
 E-Mail Rabobank: [EMAIL PROTECTED]
 E-Mail Altium: [EMAIL PROTECTED]
 Private E-mail: [EMAIL PROTECTED]
 URL: http://www.altium.com
 **
 
 
 De informatie opgenomen in dit bericht kan vertrouwelijk zijn en
 is uitsluitend bestemd voor de geadresseerde. Indien u dit bericht
 onterecht ontvangt, wordt u verzocht de inhoud niet te gebruiken en
 de afzender direct te informeren door het bericht te retourneren.
 
 The information contained in this message may be confidential
 and is intended to be exclusively for the addressee. Should you
 receive this message unintentionally, please do not use the contents
 herein and notify the sender immediately by return e-mail.
 
 __
 OpenSSL Project http://www.openssl.org
 User Support Mailing List[EMAIL PROTECTED]
 Automated List Manager   [EMAIL PROTECTED]

-- 
Dott. Sergio Rabellino 

 Technical Staff
 Department of Computer Science
 University of Torino (Italy)
 Member of the Internet Society

http://www.di.unito.it/~rabser
Tel. +39-0116706701
Fax. +39-011751603
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: anybody is working with openssl and visual basic?

2002-04-03 Thread Rabellino Sergio

Yes, i've done an tool for corporate user certification (key and cert management) 
interfacing visualbasic with openssl.
What do you need ?
-- 
Dott. Sergio Rabellino 

 Technical Staff
 Department of Computer Science
 University of Torino (Italy)
 Member of the Internet Society

http://www.di.unito.it/~rabser
Tel. +39-0116706701
Fax. +39-011751603
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: Java + SSL

2002-04-03 Thread Rabellino Sergio

Zamangoer, Ferruh wrote:
 
 Hi All,
 
 have anybody experiences with the following Error, which occurs when I want
 to use the example from the JNDI == LDAP == Security to connect to an LDAP
 Server over SSL:
 
 cutscence
 // Set up the environment for creating the initial context
 Hashtable env = new Hashtable();
 env.put(Context.INITIAL_CONTEXT_FACTORY,
 com.sun.jndi.ldap.LdapCtxFactory);
 env.put(Context.PROVIDER_URL, ldap://localhost:636/o=JNDITutorial;);
 
 // Specify SSL
 env.put(Context.SECURITY_PROTOCOL, ssl);
 
 // Authenticate as S. User and password mysecret
 env.put(Context.SECURITY_AUTHENTICATION, simple);
 env.put(Context.SECURITY_PRINCIPAL, cn=S. User, ou=NewHires,
 o=JNDITutorial);
 env.put(Context.SECURITY_CREDENTIALS, mysecret);
 
 // Create the initial context
 DirContext ctx = new InitialDirContext(env);
 
 // ... do something useful with ctx
 /cutscence
 
 I become the following Error Root exception is java.net.SocketException:
 SSL implementation not available. I use also jsse.jar which is needed to
 run SSL.
 
 Can anybody help me :)
 
 Thanks in advance
 
 regards Ferruh
It seems that jsse is not correctly installed in you VM. Follow the instruction 
embedded with the jsse for the correct definition of the
security provider in the
JRE_HOME/lib/security/java.security
config file.
-- 
Dott. Sergio Rabellino 

 Technical Staff
 Department of Computer Science
 University of Torino (Italy)
 Member of the Internet Society

http://www.di.unito.it/~rabser
Tel. +39-0116706701
Fax. +39-011751603
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: No certificates in popup dialog box.

2002-03-07 Thread Rabellino Sergio

Dr S N Henson wrote:
 
 Brandon Amundson wrote:
 
  I am trying to sign a server cert from IIS 5.0 with my CA (openssl) that
  runs on my linux webserver.
 
  I have successfully signed the cert and move it back into IIS but when I go
  to access the site, the certificate dialog
 
  box pops up but there are no available certificates.  I would like to use
  pre-existing user certificates that I have issued
 
  for my other site because I am going to be letting the same people have
  access to the new site.  Does anyone know if this is
 
  possible and what I am not doing correctly, (besides using MS)? I heard
  something about the v3 extensions being a possible
 
  cause.  Any thoughts?
 
 
 The FAQ gives the reason for this and some more info. What it doesn't
 say is how to add your CA to the trusted list of IIS. IIRC you can do
 this via the certificate import wizard, something like clicking on the
 show physical stores box and trusted root-local computer. You may
 have to the reboot. You can check using s_client to see if your CA is
 then sent (see FAQ).
 
 Steve.
 --
... your support is definitely wonderful...
Now I can use the client-authentication under IIS5 ... thanks.
The strange thing is that now in IIS5 there is an interface to the
TRUSTED-CA-LIST, but seems to be unused, or better used in combination
to the importing in the trusted root-local computer store.
Obviously this is undocumented in the ms-site.

Thanks.
-- 
Dott. Sergio Rabellino 

 Technical Staff
 Department of Computer Science
 University of Torino (Italy)
 Member of the Internet Society

http://www.di.unito.it/~rabser
Tel. +39-0116706701
Fax. +39-011751603
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: Client certificate verification

2002-02-25 Thread Rabellino Sergio

Michael Sierchio wrote:
 
 Sharkey, Aoife wrote:
  Hi
 
  I am having aproblem where the server is unable to verify the client
  certificate I created.
  The Server is running IIS and is listening on port 443 for SSL traffic.
 
 
 here is an example of the ssldump file
 
 I didn't see anything here that suggests that the server is requesting
 client auth.  There was apparently no 'Certificate request' component
 to the handshake, in which the server enumerates the DNs of acceptable
 CAs and client cert types.  I'd conclude that the server isn't
 configured to need client auth.
 
This is also my opinion, but after configuring (correctly ...) IIS to
request client authentication, and inserting my CA in the list of CA
trusted by IIS, the server doesn't request client certificate.

Anyone has resolved this problem ? Maybe the extensions are wrong in the
root or the server certificate ?

My CA is published on http://ca.unito.it and a sample server certificate
is on https://ca.unito.it

thanks
-- 
Dott. Sergio Rabellino 

 Technical Staff
 Department of Computer Science
 University of Torino (Italy)
 Member of the Internet Society

http://www.di.unito.it/~rabser
Tel. +39-0116706701
Fax. +39-011751603
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: Expired Certificate in CRL

2002-01-25 Thread Rabellino Sergio

Stéphane Lemaire wrote:
 
 Hi,
 
 I wish improve my question. My CRL contains expirated and revokated
 Certificates. I wish that my CRL contains only the expired certificates
 which are technically valid and not expirated certificates. I do not wish
 that the size of my CRL increases without end.
 
 Did somebody already find a solution?
 
 Regards,
 
 Stéphane Lemaire
 
an entry can be marked either as 
R=Revoked
V=Valid
E=Expired

In attachment you can find a source for the expire check (I don't
remember if was based on some sources similar found in the internet, or
if it's entirely of my inspiration...)

Use free for everyone who wants... But retain the creator credits...
-- 
Dott. Sergio Rabellino 

 Technical Staff
 Department of Computer Science
 University of Torino (Italy)
 Member of the Internet Society

http://www.di.unito.it/~rabser
Tel. +39-0116706701
Fax. +39-011751603

// Rabellino Sergio - [EMAIL PROTECTED]
// Computer Science Department of Torino

#include stdio.h
#include stdlib.h
#include time.h

/* Openssl Includes */
#include openssl/conf.h
#include openssl/bio.h
#include openssl/err.h
#include openssl/bn.h
#include openssl/txt_db.h
#include openssl/evp.h
#include openssl/x509.h
#include openssl/x509v3.h
#include openssl/objects.h
#include openssl/pem.h

#define DB_type 0
#define DB_exp_date 1
#define DB_rev_date 2
#define DB_serial   3   /* index - unique */
#define DB_file 4
#define DB_name 5   /* index - unique for active */
#define DB_NUMBER   6

#define DB_TYPE_REV 'R'
#define DB_TYPE_EXP 'E'
#define DB_TYPE_VAL 'V'



main(int argc, char *argv[])
{
  BIO *in=NULL;
  BIO *out=NULL;
  BIO *bio_err=NULL;
  TXT_DB *db=NULL;
  char **pp,*p;
  int i,l;
  time_t nowbin;
  const struct tm *nowstruct;
  char longdate[20];
  long dd,cdd;
  char tmpdate[20];
  char indbfile[256];
  char outdbfile[256];

  /* Get time from the O.S. */
  time(nowbin);
  nowstruct = localtime(nowbin);
  strftime(longdate,256,20%y%m%d%H,nowstruct);
  dd=atol(longdate);

  if ( argc  1 )
 strcpy(indbfile,argv[1]);
  else
 strcpy(indbfile,index.txt);
 
  if ( argc  2 )
 strcpy(outdbfile,argv[2]);
  else
 strcpy(outdbfile,index.new);

  printf(Reading from %s\n,indbfile);
  printf(Writing to   %s\n,outdbfile);

  if (bio_err == NULL)
if ((bio_err=BIO_new(BIO_s_file())) != NULL)
   BIO_set_fp(bio_err,stderr,BIO_NOCLOSE|BIO_FP_TEXT);

  in=BIO_new(BIO_s_file());
  out=BIO_new(BIO_s_file());

  if (BIO_read_filename(in,indbfile) = 0)
{
 perror(indbfile);
 BIO_printf(bio_err,unable to open '%s'\n,indbfile);
 exit(1);
}
  if (BIO_write_filename(out,outdbfile) = 0)
{
 perror(outdbfile);
 BIO_printf(bio_err,unable to open '%s'\n,outdbfile);
 exit(1);
}

  db=TXT_DB_read(in,DB_NUMBER);
  if (db == NULL)
{
 perror(indbfile);
 BIO_printf(bio_err,unable to decode '%s'\n,indbfile);
 exit(1);
}

  /* Lets check the entries */
  for (i=0; isk_num(db-data); i++)
   {
 pp=(char **)sk_value(db-data,i);
 if (pp[DB_type][0] == DB_TYPE_VAL)
   {
strcpy(tmpdate,);
p=pp[DB_exp_date];
/* Do the dirty work for Y2K compatibility */
if (p[0] == '9')
 strcat(tmpdate,19);
else
 strcat(tmpdate,20);

strncat(tmpdate,pp[DB_exp_date],8);
cdd=atol(tmpdate);
if(dd  cdd)
  { /* Expire the cert... */
printf(Certificate %s is signed Valid but is Expired...\n,pp[DB_serial]);
pp[DB_type][0] = DB_TYPE_EXP;
  }
   }
 if (pp[DB_type][0] == DB_TYPE_REV)
   {
strcpy(tmpdate,);
p=pp[DB_exp_date];
/* Do the dirty work for Y2K compatibility */
if (p[0] == '9')
 strcat(tmpdate,19);
else
 strcat(tmpdate,20);

strncat(tmpdate,pp[DB_exp_date],8);
cdd=atol(tmpdate);
if(dd  cdd)
  { /* Expire the cert... */
printf(Certificate %s is signed as Revoked but is 
Expired...\n,pp[DB_serial]);
pp[DB_type][0] = DB_TYPE_EXP;
pp[DB_rev_date] = NULL;
  }
   }
   }

 /* Write out the DB on the output file */

  l=TXT_DB_write(out,db);
  if (l  0)
{
 perror(outdbfile);
 BIO_printf(bio_err,unable to encode '%s'\n,indbfile);
}
  else
printf(DB analyzed  checked ok. \n);
  

  BIO_free(in);
  BIO_free(out);
}




# Set whatever you have installed the Openssl Libraries
OPENSSL_LIB = ./lib
OPENSSL_INCLUDE = ./include

CC = gcc

all :   expire

expire  :   expire.c
${CC} expire.c -o expire -I ${OPENSSL_INCLUDE} -L ${OPENSSL_LIB}  
-lcrypto 

clean   :
rm -f *.o
rm -f expire



SSL_connect on Non-Blocking Socket under Windows

2001-10-22 Thread Rabellino Sergio

Dear list users,
 i'm going to code a tls-telnet module for teraterm under windows socket
2.x, using the Non Blocking version of the sockets.
Supposing that I can't never revert the socket to blocking, there's
someone that has the right solution for doing the SSL_connect either
with tls or sslv3 ?
In my tests the SSL_connect fails on a regular basis, with the (rigth)
socket error WSAEWOULDBLOCK and the simple re-calling of the the
SSL_connect is not useful at all

any hints ?
Note that teraterm is freeware for win, and my module will be also free
(if it runs)

Thanks.
-- 
Dott. Sergio Rabellino 

 Technical Staff
 Department of Computer Science
 University of Torino (Italy)
 Member of the Internet Society

http://www.di.unito.it/~rabser
Tel. +39-0116706701
Fax. +39-011751603
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: How I can create a Cert STORE

2001-05-04 Thread Rabellino Sergio

Antonio Ruiz Martínez wrote:
 
 Hello!
 
 Like I say in the subject
 
 How I can create a Cert Store?
 
 Thanks in advance,
 Regards,
 Antonio.
Are you thinking about the Java Keystore (and certs... also)?
-- 
Dott. Sergio Rabellino 

 Technical Staff
 Department of Computer Science
 University of Torino (Italy)
 Member of the Internet Society

http://www.di.unito.it/~rabser
Tel. +39-0116706701
Fax. +39-011751603
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: How I can create a Cert STORE

2001-05-04 Thread Rabellino Sergio

Antonio Ruiz Martínez wrote:
 
 Rabellino Sergio wrote:
 
  Antonio Ruiz Martínez wrote:
  
   Hello!
  
   Like I say in the subject
  
   How I can create a Cert Store?
  
   Thanks in advance,
   Regards,
   Antonio.
  Are you thinking about the Java Keystore (and certs... also)?
 
 No, I'm thinking about the X509_STORE_CTX of OpenSSL
 
I use the X509_STORE_CTX  __only__ in the verify_callback function
(merely copied from the apps dir of openssl...)

Maybe others in the list are more skilled about it.
-- 
Dott. Sergio Rabellino 

 Technical Staff
 Department of Computer Science
 University of Torino (Italy)
 Member of the Internet Society

http://www.di.unito.it/~rabser
Tel. +39-0116706701
Fax. +39-011751603
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: Problems with Microsoft IIS csr

2001-04-23 Thread Rabellino Sergio

Enrico Russo wrote:
 
 Hi,
 I've some problems with string encoding.
 
 The Root Cert (created and self-signed with openssl) DN is :
 
 subject= /C=IT/ST=GE/L=Genova/O=Universit\xE0 di Genova/OU=Unige
 CA/CN=unige [EMAIL PROTECTED]
 
 When I try to sign requests created with Microsoft IIS or IE the
 organizationName field (with policy 'match')
 doesn't match ... :
 
 Check that the request matches the signature
 Signature ok
 The Subjects Distinguished Name is as follows
 commonName:PRINTABLE:'.csita.unige.it'
 organizationalUnitName:PRINTABLE:'Unige CA'
 organizationName  :ASN.1
 30:'^@U^@n^@i^@v^@e^@r^@s^@i^@t^@\0xFFE0^@ ^@d^@i^@
 ^@G^@e^@n^@o^@v^@a'
 localityName  :PRINTABLE:'Genova'
 stateOrProvinceName   :PRINTABLE:'GE'
 countryName   :PRINTABLE:'IT'
 The organizationName field needed to be the same in the
 CA certificate (Universit di Genova) and the request ()
 
 There's a way to solve this problem ?
 
 Thanks
 
Per evitare problemi, le consiglio di usare solo Universita senza la
lettera accentata...
E' bruttino, ma non c'e' altro modo, anche modificando il codice di
openssl in modo da accettare caratteri NON PRINTABLE, poi incorre in
molti problemi con i browser, fino al crash di netscape e/o explorer.

Buon Lavoro.
-- 
Dott. Sergio Rabellino 

 Technical Staff
 Department of Computer Science
 University of Torino (Italy)
 Member of the Internet Society

http://www.di.unito.it/~rabser
Tel. +39-0116706701
Fax. +39-011751603
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]