List of supported CipherSuite and CompressionMethod

2008-06-25 Thread Richard Hartmann
Hi all,

I was wondering if there is a list of all CipherSuite[s] and
CompressionMethod[s] supported by OpenSSL. At this point,
I would prefer not to go through the code to get an answer, but
if you guys would point me at a file name, I would gladly take
that, as well :)


Richard
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]



Re: List of supported CipherSuite and CompressionMethod

2008-06-25 Thread Richard Hartmann
On Wed, Jun 25, 2008 at 16:26, Bill Colvin [EMAIL PROTECTED] wrote:


 http://openssl.hoxt.com/openssl-web/docs/apps/ciphers.html

Thanks! From the man page of ciphers, I assume I need to bake my
own OpenSSL binaries to enable NULL ciphers?

And yes, I know what I am doing and yes, in this stage, I do want
NULL ciphers.


Richard
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


[SOLVED] Re: Strange OpenSSL error when trying to use OpenVPN

2008-03-26 Thread Richard Hartmann
My certificate uses a SHA256 hash and the client has OpenSSL 0.9.7.
0.9.8 is needed to support SHA256 hashes.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Strange OpenSSL error when trying to use OpenVPN

2008-03-25 Thread Richard Hartmann
Hi all,

I have my own CA tree, with the relevant part being:

 root CA {1}
 \- VPN CA {2}
\- server CA {3}
   |- server certificate {4}
   \- client certificate {5}

I put 1  2 into /etc/ssl/certs/ of the server and 3 into
/etc/openvpn/default/default-ca.pem . The server does, of course, use
its server certificate  privkey.

The client has a single CA file with 1, 2  3's certificates
concatenated. It also has its own client certificate  privkey.

Verifying the trust chain with openssl verify -verbose -CAfile foo works
for all five certificates with foo holding 1, 2  3.


Yet, when I want to connect to the server, OpenVPN dies with:

Tue Mar 25 15:04:53 2008 us=886000 Incoming Ciphertext - TLS
Tue Mar 25 15:04:53 2008 us=886000 VERIFY OK: depth=3, /CN=root_CA
Tue Mar 25 15:04:53 2008 us=886000 VERIFY ERROR: depth=2,
error=certificate signature failure: /CN=VPN_CA
Tue Mar 25 15:04:53 2008 us=886000 SSL alert (write): fatal: decrypt error
Tue Mar 25 15:04:53 2008 us=886000 TLS_ERROR: BIO read
tls_read_plaintext error: error:14090086:SSL
routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
Tue Mar 25 15:04:53 2008 us=886000 TLS Error: TLS object - incoming
plaintext read error
Tue Mar 25 15:04:53 2008 us=886000 TLS Error: TLS handshake failed

(The name strings for 1  2 being shortened to root_CA  VPN_CA respectively)


man verify tells me:

7 X509_V_ERR_CERT_SIGNATURE_FAILURE: certificate signature failure
the signature of the certificate is invalid.

which does not make sense, seeing as the path verifies OK when doing the
same thing manually and even using the very same file for the
verification that the OpenVPN client is using.


So, if anyone has any idea or an educated guess about the cause or hints
to get better debug output, please tell me.


Thanks in advance :)
Richard
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Difference between signing a CSR and a public key with server-side options?

2007-11-26 Thread Richard Hartmann
Hi all,

basically, I am wondering if there is a real difference between signing
a normal CSR and signing a plain public key while defining the
appropriate X509 v3 extensions at sign time. I suspect that there is no
difference that would matter from the end user's perspective, but I am
far from sure.

If you can point me to some docs that explain any issues in depth, I am
more than willing to rtfm, as well :)


Any help appreciated,
Richard
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: Are there any CA packages that support XMLRPC?

2007-09-20 Thread Richard Hartmann
On 20/09/2007, Rodney Thayer [EMAIL PROTECTED] wrote:

 That being said the existence of any code that handles that
 sort of thing is interesting, since there are so few implementations.

Yes, it seems that everyone who does any real work in this direction
keeps the fruits to themselves :/

If I were to modify/enhance a command line solution that is under the
GPL, I might be able to give back. If I bake our own, I am not so sure.

So, as there do not seem to be any solutions that do what I need,
does anyone know of a command line based Perl CA that is able to
create root and sub CAs and person/email/server certificates
automagically that I could enhance to speak XMLRPC?

Any and all suggestions are welcome, even if they do not fit the above
exactly.


Richard
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: Are there any CA packages that support XMLRPC?

2007-09-19 Thread Richard Hartmann
I am replying to myself to clarify somthing which I should have put
better:

I want to run my own CA, not buy certificates from established ones.


Sorry for asking a misleading question :/
Richard
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Are there any CA packages that support XMLRPC?

2007-09-13 Thread Richard Hartmann
Hi all,

I am looking for existing implementation of a CA that supports external
APIs. Ideally, it should be able to speak XMLRPC or, at least, offer
an API.


Thanks,
Richard
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: Are there any CA packages that support XMLRPC?

2007-09-13 Thread Richard Hartmann
On 13/09/2007, Rodney Thayer [EMAIL PROTECTED] wrote:


 Why XMLRPC instead of any of the existing online enrollment protocols?

Well, the main reason is that, like it or not, XMLRPC is developing into
a kind of lingua franca when it comes to interoperability. The easy
availablity of TLS for this path is an obvious plus.


 Not that I am trying to defend the existing online enrollment protocols,
 mind you...

Well, if there is anything that works in a secure and reliable way, I am
all ears :)


 What CLIENT do you think would interoperate with such a CA, should it
 exist?

A self-baked one.


Thanks for your reply :)
Richard
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]