Compile 1.0.1j on Win8.1 with capi

2014-11-14 Thread Derek Cole
Hello,

I am noticing that when I install the OpenSSL bundle from
http://slproweb.com/products/Win32OpenSSL.html

The lib folder gets a lot of .lib files in it that are corresponding to the
engines such as capi.lib

How can I compile OpenSSL to generate those same lib files? Is it simply a
matter of configuring with enable-capieng to make this happen? I need to
generate the libraries for use in my stunnel compile that I am trying to do
on windows. When I just did a build line like in the INSTALL.W32 :

perl Configure VC-WIN32 no-asm --prefix=c:/some/openssl/dir
ms\do_ms

I do not get those same .lib files, specifically, the capi.lib file is
missing, so I get a message like the following from stunnel when it's
running:

 [ ] Enabling support for engine 'capi'
 [!] error queue: 2606A074: error:2606A074:engine routines:ENGINE_by_id:no
such engine
 [!] error queue: 260B6084: error:260B6084:engine routines:DYNAMIC_LOAD:dso
not found
 [!] error queue: 25070067: error:25070067:DSO support
routines:DSO_load:could not load the shared library
 [!] ENGINE_by_id: 25078067: error:25078067:DSO support
routines:WIN32_LOAD:could not load the shared library

Any guidance appreciated. This is my first time trying to build OpenSSL
myself, and I am not wholly familiar with visual studio build on top of
that. Thanks!


Re: Compile 1.0.1j on Win8.1 with capi

2014-11-14 Thread Derek Cole
Just to add some more information - When I do my nmake -f ms\ntdll.mak
command, I do end up with some out32dll.dbg and out32.dbg directories in my
source folders, and if I browse to the out32.dbg folder and do openssl
engine I do get some output:

$ ../out32.dbg/openssl.exe engine
(rdrand) Intel RDRAND engine
(dynamic) Dynamic engine loading support
(4758cca) IBM 4758 CCA hardware engine support
(aep) Aep hardware engine support
(atalla) Atalla hardware engine support
(cswift) CryptoSwift hardware engine support
(chil) CHIL hardware engine support
(nuron) Nuron hardware engine support
(sureware) SureWare hardware engine support
(ubsec) UBSEC hardware engine support
(padlock) VIA PadLock (no-RNG, no-ACE)
(gost) Reference implementation of GOST engine
(capi) CryptoAPI ENGINE


So it seems to me like the libraries maybe are getting built, but I can't
seem to link to them correctly in my stunnel code. And also, if i do the
nmake -f ms\ntdll.mak install, *.lib files in the out32dll.dbg folder do
not make it to the lib folder of my install directory. They are in there
for the precompiled binaries. Were those just copied in by hand?



On Fri, Nov 14, 2014 at 3:11 PM, Derek Cole derek.c...@gmail.com wrote:

 Hello,

 I am noticing that when I install the OpenSSL bundle from
 http://slproweb.com/products/Win32OpenSSL.html

 The lib folder gets a lot of .lib files in it that are corresponding to
 the engines such as capi.lib

 How can I compile OpenSSL to generate those same lib files? Is it simply a
 matter of configuring with enable-capieng to make this happen? I need to
 generate the libraries for use in my stunnel compile that I am trying to do
 on windows. When I just did a build line like in the INSTALL.W32 :

 perl Configure VC-WIN32 no-asm --prefix=c:/some/openssl/dir
 ms\do_ms

 I do not get those same .lib files, specifically, the capi.lib file is
 missing, so I get a message like the following from stunnel when it's
 running:

  [ ] Enabling support for engine 'capi'
  [!] error queue: 2606A074: error:2606A074:engine routines:ENGINE_by_id:no
 such engine
  [!] error queue: 260B6084: error:260B6084:engine
 routines:DYNAMIC_LOAD:dso not found
  [!] error queue: 25070067: error:25070067:DSO support
 routines:DSO_load:could not load the shared library
  [!] ENGINE_by_id: 25078067: error:25078067:DSO support
 routines:WIN32_LOAD:could not load the shared library

 Any guidance appreciated. This is my first time trying to build OpenSSL
 myself, and I am not wholly familiar with visual studio build on top of
 that. Thanks!




RE: detect Md5 sign signatures

2013-09-24 Thread Derek Del Miller
The Signature Algorithm field is the correct field to check. 

 

As clarification: MD5 is not a signature algorithm, it's a hashing
algorithm. A certificate is hashed using the specified hashing algorithm,
and then signed using the specified signature algorithm.

Thus, sha1WithRSAEncryption indicates that the certificate was hashed using
sha1, and the result was encrypted using RSA to generate the signature.
Md5WithRSAEncryption indicates it was hashed using md5, and signed with RSA.

 

Thus, the certificate you're looking at was hashed with SHA1, not MD5.

 

Derek

 

 

From: owner-openssl-us...@openssl.org
[mailto:owner-openssl-us...@openssl.org] On Behalf Of val john
Sent: Tuesday, September 24, 2013 1:03 AM
To: openssl-users@openssl.org
Subject: detect Md5 sign signatures

 

Hi guys 

i have server certificate used in company Radius server , i how can check
wheather its a md5 sign cert or sha sign certificate . 

which attribute that indicate whether its md5 sign or sha sign ?  is
iSignature Algorithm: sha1WithRSAEncryptiot   attribute 

Please advice 



Thank You

John

 






 



Re: SANs for self signed certs

2013-04-25 Thread Derek Cole
Just to update - I found the section in one of the apps that copies the
extensions from the request. I was able to enable the EXT_COPY_ADD and was
able to get my SANS in the cert as well as the request.


On Wed, Apr 24, 2013 at 6:44 PM, Derek Cole derek.c...@gmail.com wrote:

 Hello,

 I have some code which I am using to generate a CSR and some code which I
 am using to generate a cert using my cert authority.

 If I view the CSR, I can see that my alt names were added correctly. If I
 view the cert itself, the altnames are not there. I had kind of thought
 that if I had a CSR with the alt names in it, the cert would get them too.
 Is that not correct? I am using the same CONF variable for both the CSR and
 the cert, but I am adding the extensions for subject alt name
 programmatically to the CSR (but not to the cert). I am doing this in a
 similar way as the mkreq.c demo by pushing my extension objects onto a
 stack and adding them before the X509_REQ_sign call.

 Do I need it in both places, or maybe just on the cert creation part and
 nto the CSR?


 Alternatively, is there a way to add subject alt names programmatically to
 the config as an X509_EXTENSION object? Then I could perhaps just rely on
 the configuration to set the alt names instead of trying to force the
 X509_EXTENSION into the cert.

 Thanks for any help



Working with the CA database

2013-04-25 Thread Derek Cole
Hello,

I am acting as my own cert authority so the index.txt file is constantly
being updated as I generate new certs. However, I have noticed that things
like the DB_file field are never used in the CA program.

 Is it safe for me to write some custom code that will take advantage of
that field?

For example, if a client is connecting and I already have a cert for it,
I'd like to be able to load the Cert based on the filename (that still
exists on the drive somewhere). It'd be nice to be able to do that DB
lookup, find the filename, load the cert, and return. It doesnt look like
OpenSSL actually has anything like that already in it, so I'm not sure what
people are doing in production environments with a bunch of certs.

The closest thing I can find to what I am talking about is the CRL tool,
however, that seems to just be concerned with updating the list, not
actually serving back up the cert or anything.

Thanks in advance for any tips.


SANs for self signed certs

2013-04-24 Thread Derek Cole
Hello,

I have some code which I am using to generate a CSR and some code which I
am using to generate a cert using my cert authority.

If I view the CSR, I can see that my alt names were added correctly. If I
view the cert itself, the altnames are not there. I had kind of thought
that if I had a CSR with the alt names in it, the cert would get them too.
Is that not correct? I am using the same CONF variable for both the CSR and
the cert, but I am adding the extensions for subject alt name
programmatically to the CSR (but not to the cert). I am doing this in a
similar way as the mkreq.c demo by pushing my extension objects onto a
stack and adding them before the X509_REQ_sign call.

Do I need it in both places, or maybe just on the cert creation part and
nto the CSR?


Alternatively, is there a way to add subject alt names programmatically to
the config as an X509_EXTENSION object? Then I could perhaps just rely on
the configuration to set the alt names instead of trying to force the
X509_EXTENSION into the cert.

Thanks for any help


Help me understand how this should work:

2013-03-28 Thread Derek Cole
Hello all,

I am curious about how something should work relating to some self signed
certs I am trying to use. It has been a while since I was messing with
this.

I have a webserver setup for my internal webmail at https://examplemail.com.
however, that site redirects to https://mail.mycompany.com

How should the certs be set up for this? Currently, my browser is giving me
a warning when I go to https://example.com that the cert i am giving back
is only valid for www.mycompany.com

I guess I need to know what to research to make all of these guys sort of
use the same cert. is this what chaining could do for me?

Thanks


Re: Use OpenSSL socket as a normal socket

2012-11-09 Thread Derek Cole
Well that would still require an SSL handshake right? My client that sends
the unencrypted traffic knows nothing of SSL at all, and I can't modify it,
so it is just coming in a normal TCP stream.


On Fri, Nov 9, 2012 at 6:44 AM, Michel msa...@paybox.com wrote:

 Hi,

 Perhaps I misunderstand you, but wouldn't it be easier to just choose
 eNULL cipher when no encryption is needed ?

 Le 09/11/2012 06:08, Derek Cole a écrit :

  Hello,

 I have a server running that I am accepting both SSL and non SSL traffic.
 Currently I check the traffic first and if the first part of the TCP data
 looks like an SSL header, I send it off to an OpenSSL socket to be read.
 If
 it's plaintext, I just read it right there on that socket.

 Is it possible to skip the SSL header check and just send all traffic to
 an
 SSL socket, and reliably be able to read the traffic regardless whether
 it's encryprted or not?

 just to be clear, I do have the SSL context set up properly and don't have
 a problem reading it, it's just annoying that I Have to check my traffic
 in
 a separate step, and send it down the flow path of SSL if it's encrypted.

 Thanks


 __**__**__
 OpenSSL Project http://www.openssl.org
 User Support Mailing Listopenssl-users@openssl.org
 Automated List Manager   majord...@openssl.org



Use OpenSSL socket as a normal socket

2012-11-08 Thread Derek Cole
Hello,

I have a server running that I am accepting both SSL and non SSL traffic.
Currently I check the traffic first and if the first part of the TCP data
looks like an SSL header, I send it off to an OpenSSL socket to be read. If
it's plaintext, I just read it right there on that socket.

Is it possible to skip the SSL header check and just send all traffic to an
SSL socket, and reliably be able to read the traffic regardless whether
it's encryprted or not?

just to be clear, I do have the SSL context set up properly and don't have
a problem reading it, it's just annoying that I Have to check my traffic in
a separate step, and send it down the flow path of SSL if it's encrypted.

Thanks


libpcap working with openSSL sockets

2012-10-31 Thread Derek Cole
Hello,

Is it possible to use libpcap to detect an incoming connection (writing all
packets those packets to a socket), then, if using libpcap i determine that
a SSL connection was established , stand up another socket to read the same
file descriptor with the SSL client so that I could use the proper context
and such to decrypt it?

THanks


Re: libpcap working with openSSL sockets

2012-10-31 Thread Derek Cole
To be clear - I have already written the code to read the SSL header.

Regarding your last line - is there a cleaner way to redirect as you say,
or is it as I described - opening a new socket and writing the packet to it?

If I wanted to decrypt on the fly, is there a standard way of decrypting
the TCP payload automatically as the SSL socket does when you stand up a
SSL_CTX and use SSL_new with that context?




On Wed, Oct 31, 2012 at 2:06 PM, dreamwvr dream...@dreamwvr.com wrote:

 On 10/31/12 11:21 AM, Derek Cole wrote:

 Hello,

 Is it possible to use libpcap to detect an incoming connection (writing
 all packets those packets to a socket),

 Yes

  then, if using libpcap i determine that a SSL connection was established
 ,

 Then check if it has a SSL header reading the header
 https://en.wikipedia.org/wiki/**Transport_Layer_Security#TLS_**
 handshake_in_detailhttps://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_handshake_in_detail

  stand up another socket to read the same file descriptor with the SSL
 client so that I could use the proper context and such to decrypt it?

 THanks

 Then redirect to another socket or dup to
  decrypting on the fly.. although it did work well for the fly.. not so
 well the other guy:-)





Re: libpcap working with openSSL sockets

2012-10-31 Thread Derek Cole
As I am thinking about this a little more - I guess that the SSL_new and
SSL_accept handles all of the SSL handshake negotiation as well, that would
have to be manually handled if you were trying to decrypt on the fly?




On Wed, Oct 31, 2012 at 2:23 PM, Derek Cole derek.c...@gmail.com wrote:

 To be clear - I have already written the code to read the SSL header.

 Regarding your last line - is there a cleaner way to redirect as you
 say, or is it as I described - opening a new socket and writing the packet
 to it?

 If I wanted to decrypt on the fly, is there a standard way of decrypting
 the TCP payload automatically as the SSL socket does when you stand up a
 SSL_CTX and use SSL_new with that context?





 On Wed, Oct 31, 2012 at 2:06 PM, dreamwvr dream...@dreamwvr.com wrote:

 On 10/31/12 11:21 AM, Derek Cole wrote:

 Hello,

 Is it possible to use libpcap to detect an incoming connection (writing
 all packets those packets to a socket),

 Yes

  then, if using libpcap i determine that a SSL connection was established
 ,

 Then check if it has a SSL header reading the header
 https://en.wikipedia.org/wiki/**Transport_Layer_Security#TLS_**
 handshake_in_detailhttps://en.wikipedia.org/wiki/Transport_Layer_Security#TLS_handshake_in_detail

  stand up another socket to read the same file descriptor with the SSL
 client so that I could use the proper context and such to decrypt it?

 THanks

 Then redirect to another socket or dup to
  decrypting on the fly.. although it did work well for the fly.. not so
 well the other guy:-)






Re: Firefox unhappy with my self signed Cert

2012-10-15 Thread Derek Cole
As some additional info, I am suspecting this may be an issue with my
config file.

I am using the same config file I used to set up my certificate authority,
which has under [ req ] a couple of values plugged in - for one, prompt=no,
because I didnt want it to prompt me for values. It also has a value filled
in for distinguished_name which points to a section called [
ca_distinguished_name ] that has the values for commonName, etc, that seem
to be getting put into my CSR.

Could this be the issue? Do I need to have a separate config file for
generating my CSRs than I used for generating my CA cert?

Thanks

On Fri, Oct 12, 2012 at 11:22 AM, Derek Cole derek.c...@gmail.com wrote:

 So I think you were right. I used a command to view the CSR that I
 generated with the following:

 openssl req -new -nodes -subj /CN=www.myserver.com -out /tmp/file.csr
 -keyout /tmp/privkey.csr -config /my/openssl.cnf

 when I do this though, I noticed that my subject line, which I view with

 openssl req -noout -text -in /tmp/file.csr -config /my/openssl.cnf


 It seems like the file is getting created with the common name in the
 config file intsead of the one I pass it. Does it not overrride the config
 file?

 Thanks




 On Thu, Oct 11, 2012 at 7:55 PM, Dave Thompson dthomp...@prinpay.comwrote:

 From: owner-openssl-us...@openssl.org On Behalf Of Derek Cole
 Sent: Thursday, 11 October, 2012 19:03

 i have a server that is running a custom app that can accept
 a SSL connection. I generate a cert on each server, that is
 signed by my own CA. I tested whether this worked or not by
 using the openssl s_client and s_server commands, and it actually
 worked to connect to the server using those commands. I started
 the server with a PEM file that contained the signed cert request,

 Nit: it contains the cert, and privatekey. A cert is NOT a signed CSR.

 as well as the private key for that cert request. This allowed me
 to start the server with
openssl s_server -accept 443 -cert myfile.cert

 Note that will support connection at the SSL level, but not give
 an HTTP response unless you type it by hand (which is hard to do).
 Add -www to support minimal requests from browsers.

and on the client side snip: s_client okay

 I installed my_server_cert.pem as a trusted authority in firefox,
 however, it still prompts that it is an Untrusted Connection
 and has the button to add security exception. [which] says Wrong Site
 and This iste attempts to identify itself iwth invalid information

 Most SSL clients including Firefox, unlike s_client, check that the
 name in the server cert matches the name of the server they want,
 almost always as a domain name. The traditional and simple way is
 the CommonName in the server cert's Subject field is the FQDN.
 Most clients, I'd expect including Firefox but didn't take time to test,
 also support (1-level) wildcard, or the SubjectAlternativeName extension
 which can have multiple domain names or wildcards or some other options
 that are rarely used. Public CAs often call this multi-domain, or
 Unified Communications which was Microsoft's jargon for it.

 If you're doing these certs yourself and can issue whatever you want
 free anytime, I'd go with simple, but openssl ca (or x509 -req)
 can do SAN if you set-up the config file(s).


 __
 OpenSSL Project http://www.openssl.org
 User Support Mailing Listopenssl-users@openssl.org
 Automated List Manager   majord...@openssl.org





SSL_connect with pselect failing

2012-10-14 Thread Derek Cole
Hello,

I am trying to use SSL_connect. I have bound a socket to my interface, set
up the context, and call SSL_connect(). This is returning a -1, which I
catch, and call SSL_get_error() to fall through a switch statement. It is
retuning a SSL_ERROR_WANT_WRITE

So I am trying to use pselect in a while loop here to get the return. I
call SSL_get_fd() to get the file descriptor, FD_SET() to add to my fd_set,
and then pselect(ssl_fd+1, 0, fds, 0, timeout, NULL)

This reaches my timeout every time. Is there a reason to see why it is not
connecting, even though the intiial SSL_connect returned WANT_WRITE?

Just to complete the model of what I was doing - assuming there was a
succesful pselect(), I was going to call SSL_connect() again, and either go
through the loop again, or exitand continue.


Re: SSL_connect with pselect failing

2012-10-14 Thread Derek Cole
Nevermind.

I didn't realize that I did have the call in there for my socket connect()
(which was in another part of the code for non-ssl connections...it is
needed for both). I had though SSL_connect took care of that too.

On Sun, Oct 14, 2012 at 5:35 PM, Derek Cole derek.c...@gmail.com wrote:

 Hello,

 I am trying to use SSL_connect. I have bound a socket to my interface, set
 up the context, and call SSL_connect(). This is returning a -1, which I
 catch, and call SSL_get_error() to fall through a switch statement. It is
 retuning a SSL_ERROR_WANT_WRITE

 So I am trying to use pselect in a while loop here to get the return. I
 call SSL_get_fd() to get the file descriptor, FD_SET() to add to my fd_set,
 and then pselect(ssl_fd+1, 0, fds, 0, timeout, NULL)

 This reaches my timeout every time. Is there a reason to see why it is not
 connecting, even though the intiial SSL_connect returned WANT_WRITE?

 Just to complete the model of what I was doing - assuming there was a
 succesful pselect(), I was going to call SSL_connect() again, and either go
 through the loop again, or exitand continue.



Re: Firefox unhappy with my self signed Cert

2012-10-12 Thread Derek Cole
So I think you were right. I used a command to view the CSR that I
generated with the following:

openssl req -new -nodes -subj /CN=www.myserver.com -out /tmp/file.csr
-keyout /tmp/privkey.csr -config /my/openssl.cnf

when I do this though, I noticed that my subject line, which I view with

openssl req -noout -text -in /tmp/file.csr -config /my/openssl.cnf


It seems like the file is getting created with the common name in the
config file intsead of the one I pass it. Does it not overrride the config
file?

Thanks



On Thu, Oct 11, 2012 at 7:55 PM, Dave Thompson dthomp...@prinpay.comwrote:

 From: owner-openssl-us...@openssl.org On Behalf Of Derek Cole
 Sent: Thursday, 11 October, 2012 19:03

 i have a server that is running a custom app that can accept
 a SSL connection. I generate a cert on each server, that is
 signed by my own CA. I tested whether this worked or not by
 using the openssl s_client and s_server commands, and it actually
 worked to connect to the server using those commands. I started
 the server with a PEM file that contained the signed cert request,

 Nit: it contains the cert, and privatekey. A cert is NOT a signed CSR.

 as well as the private key for that cert request. This allowed me
 to start the server with
openssl s_server -accept 443 -cert myfile.cert

 Note that will support connection at the SSL level, but not give
 an HTTP response unless you type it by hand (which is hard to do).
 Add -www to support minimal requests from browsers.

and on the client side snip: s_client okay

 I installed my_server_cert.pem as a trusted authority in firefox,
 however, it still prompts that it is an Untrusted Connection
 and has the button to add security exception. [which] says Wrong Site
 and This iste attempts to identify itself iwth invalid information

 Most SSL clients including Firefox, unlike s_client, check that the
 name in the server cert matches the name of the server they want,
 almost always as a domain name. The traditional and simple way is
 the CommonName in the server cert's Subject field is the FQDN.
 Most clients, I'd expect including Firefox but didn't take time to test,
 also support (1-level) wildcard, or the SubjectAlternativeName extension
 which can have multiple domain names or wildcards or some other options
 that are rarely used. Public CAs often call this multi-domain, or
 Unified Communications which was Microsoft's jargon for it.

 If you're doing these certs yourself and can issue whatever you want
 free anytime, I'd go with simple, but openssl ca (or x509 -req)
 can do SAN if you set-up the config file(s).


 __
 OpenSSL Project http://www.openssl.org
 User Support Mailing Listopenssl-users@openssl.org
 Automated List Manager   majord...@openssl.org



Re: Firefox unhappy with my self signed Cert

2012-10-12 Thread Derek Cole
Interesting. While I was playing around with this, I actually noticed that
if I use the -subj option on the CSR, I am not able to do this. I was able
to get it working by adding the common name on the actual cert generation
from that CSR. The config file was modified so that for my priority_match,
which had some match fields, was changed to priority_any which only had a
common name required, firefox was happy.

Just thought I'd post this workaround in case anyone else stumbles across
it.

On Fri, Oct 12, 2012 at 4:42 PM, Dave Thompson dthomp...@prinpay.comwrote:

 From: owner-openssl-us...@openssl.org On Behalf Of Derek Cole
 Sent: Friday, 12 October, 2012 11:22

 So I think you were right. I used a command to view the CSR
 that I generated with the following:
 openssl req -new -nodes -subj /CN=www.myserver.com -out /tmp/file.csr
 -keyout /tmp/privkey.csr -config /my/openssl.cnf

 when I do this though, I noticed that my subject line, which I view with
 openssl req -noout -text -in /tmp/file.csr -config /my/openssl.cnf

 Aside: you don't need a config file to view an existing request,
 although since 1.0.0 it gives a spurious warning.

 It seems like the file is getting created with the common name
 in the config file intsead of the one I pass it. Does it not
 overrride the config file?

 req -new has two ways of getting the subject DistinguishedName,
 prompted from the terminal and unprompted from the config file.
 Apparently -subj substitutes only for prompted; to make it
 effective, specify or default prompt=yes in the config file.
 (And if that config file will or might be used in actual
 prompting mode, make sure you have DNpart = promptstring
 not DNpart = actualvalue as you should for prompt=no.)

 In 0.9.8 if you specify all parameters needed for req -new
 on the commandline you don't need a config file for that.
 Since 1.0.0 -new demands a config file even if not needed.

 On Thu, Oct 11, 2012 at 7:55 PM, Dave Thompson dthomp...@prinpay.com
 wrote:
 snip: name(s) in cert must match host desired by client like Firefox

 __
 OpenSSL Project http://www.openssl.org
 User Support Mailing Listopenssl-users@openssl.org
 Automated List Manager   majord...@openssl.org



Re: OpenSSL cert authority with no database

2012-10-11 Thread Derek Cole
Thanks for the quick response. I hadn't thought about CRL at this point
actually.. I am just wading into this trying to get minimal functionality
first.

In case anyone is wondering, I also found that if you make a database.attr
file to go with database, you can add unique_subject = no for a
workaround until implementing something more stable.

-Derek


On Thu, Oct 11, 2012 at 6:34 PM, Charles Mills charl...@mcn.org wrote:

 I hit this EXACT problem.

 ** **

 The **wrong* *ways to solve it are to keep deleting the database or
 deleting records from the database.

 ** **

 The right way to solve it is to revoke certificates that you want to
 re-issue. I just happen to have a (Windows – sorry if you’re not Windows)
 .BAT file to do just that, and as a side benefit, it maintains a CRL that
 you can play with. (You do intend to support CRLs, right?)

 ** **

 rem revoke a certificate and re-issue the CRL

 rem unable to write 'random state' seems to be normal

 rem pass the name of the PEM file to be revoked as the only argument

 ** **

 openssl.exe ca -revoke %1 -config myConfig.cnf -keyfile myRoot.key.pem
 -passin pass:the_password

 ** **

 openssl.exe ca -gencrl -out myRevocations.crl -config myConfig.cnf
 -keyfile myRoot.key.pem -passin pass:the_password

 ** **

 pause Check status of certificate revocation and CRL generation (CRL
 *success* outputs no messages)

 ** **

 *Charles*

 *From:* owner-openssl-us...@openssl.org [mailto:
 owner-openssl-us...@openssl.org] *On Behalf Of *Derek Cole
 *Sent:* Thursday, October 11, 2012 3:14 PM
 *To:* openssl-users@openssl.org
 *Subject:* OpenSSL cert authority with no database

 ** **

 Hello,

 Is there a way to sign certificates with your own CA, and NOT have to use
 a database file to keep track of them? For development purposes, I end up
 creating the same cert multiple times, and trying to sign it which will
 cause me to get the TXT_DB error number 2
 sometimes, which does not allow the signing of the cert to proceed.

 Thanks!



Firefox unhappy with my self signed Cert

2012-10-11 Thread Derek Cole
Hello,

I sort of posted about this earlier, but I think this is  a more concise
question (as the previous replies were helpful for me to start debugging
the problem).

i have a server that is running a custom app that can accept a SSL
connection. I generate a cert on each server, that is signed by my own CA.
I tested whether this worked or not by using the openssl s_client and
s_server commands, and it actually worked to connect to the server using
those commands. I started the server with a PEM file that contained the
signed cert request,  as well as the private key for that cert request.
This allowed me to start the server with

openssl s_server -accept 443 -cert myfile.cert

and on the client side

openssl s_client -connect myserver:443 -CAfile my_server_cert.pem

This gave me a verify code of zero, so I thought I was good to go.

I installed my_server_cert.pem as a trusted authority in firefox, however,
it still prompts that it is an Untrusted Connection and has the button to
add security exception. When I click this button, I noticed that under
Certificate Status it says Wrong Site and This iste attempts to identify
itself iwth invalid information


I'd prefer my clients to not have this pop-up when they are connecting to
my servers. From the server  side, when I debug the app, I see I get the
sslv3 alert bad certificate error at first, and then the next
connection's are SSL_accepted() as the client requests cert status and
such, until i'm finally done adding the security exception, and my final
SSL_accept() finally gets a return of 1 which  I was hoping for.

Is this just a firefox bug or what? I have noticed too, that I am able to
launch my custom app, and use openssl s_client -connect to connect to that
same server, same certs, and it gives me verify code zero.


Thanks for any insight.


Re: Firefox unhappy with my self signed Cert

2012-10-11 Thread Derek Cole
Thanks to everyone for the information. I can't recall right now how I set
up the name - I was thinking for sure it was with the FQDN, but I'll double
check. I will do that reading and check tomorrow when I am back at work and
see if I can figure out what is going wrong there.

Thanks

On Thu, Oct 11, 2012 at 8:41 PM, Charles Mills charl...@mcn.org wrote:

  The wildcard is the lowest-level component of a DNS name, which is at the
 left as written; in

 You're right (left?) of course. I was somehow picturing it incorrectly in
 my
 mind. I quick went and looked at my wildcard comparison code and it is
 correct (whew!).

 In my other thread about checking client IP addresses I was picturing a
 lowest-level/RIGHTmost wildcard on the IP address: e.g. 192.168.1.*

 That's lowest level conceptually but I guess not what the standard or
 convention provides for.

 BTW, a good quick discussion of wildcard certificate names:

 http://support.godaddy.com/help/article/567/what-is-a-wildcard-ssl-certifica
 te (They'd love to sell you one; this is not an endorsement.)

 Charles

 -Original Message-
 From: owner-openssl-us...@openssl.org
 [mailto:owner-openssl-us...@openssl.org] On Behalf Of Dave Thompson
 Sent: Thursday, October 11, 2012 5:13 PM
 To: openssl-users@openssl.org
 Subject: RE: Firefox unhappy with my self signed Cert

 From: owner-openssl-us...@openssl.org On Behalf Of Charles Mills
 Sent: Thursday, 11 October, 2012 19:40

 Some minor points:

 How do you specify the name (URL) of the Web site in Firefox?
 Do you use exactly the same name as you use with the test client (and
 the name in the certificate)?

 OP's test client was openssl s_client, which does NOT check hostname, so
 that one doesn't matter. URL in Firefox/etc and name in cert do.

 Firefox is saying the certificate is for myserver but you are
 specifying a different name when you open the site. The name has to be
 exactly the same as one of the names (including alternates) in the
 certificate. (You can wildcard the last node in the alternate
 names.) myserver is not the same as myserver.com

 You can use wildcard in either Subject or SubjectAlternativeNames.
 The wildcard is the lowest-level component of a DNS name, which is at the
 left as written; in abstract that might be considered last
 but I think most people wouldn't call it that.

 __
 OpenSSL Project http://www.openssl.org
 User Support Mailing Listopenssl-users@openssl.org
 Automated List Manager   majord...@openssl.org



Re: SSL_accept fails with bad certificate error

2012-10-10 Thread Derek Cole
Thank you for the reply. It is probably obvious that I am new to SSL
programming, and I am modifying some existing code. I will read over your
information and write back if I am still having issues.

Thanks

Derek

On Wed, Oct 10, 2012 at 4:30 AM, Dave Thompson dthomp...@prinpay.comwrote:

 From: owner-openssl-us...@openssl.org On Behalf Of Derek Cole
 Sent: Tuesday, 09 October, 2012 21:12

 I am trying to write a server that will accept an incoming SSL connection.

 In psuedo, I have the following chain of function calls

 SSL_CTX_load_verify_locations(ctx, root_cert_file, root_cert_dir)
 SSL_CTX_use_certificate_chain_file(chain file)
 SSK_CTX_use_PrivateKey_file(chain file)
 SSL_CTX_set_verify (sets SSL_VERIFY_PEER)
 SSL_CTS_set_verify_depth(to a depth of 4)

 I assume you are checking all calls that can return an error
 indication; you suggest this below everything goes fine.
 If not, do so. But not all errors are (or can be) caught,
 so lack of error indication doesn't prove lack of error.

 When you request client auth (aka client cert), it's usually
 best to specify the CAs you like, so if the client has multiple
 certs it can pick right. OpenSSL does NOT do this automatically.
 If root_cert_file (or another file) has all CA(s) you trust, you
 can use SSL_load_client_CA_file and SSL_[CTX_]set_client_CA_list .
 Otherwise, e.g. if you have CA(s) present only in root_cert_dir,
 it's a little more complicated.

 Note SSL_VERIFY_PEER requests client auth but doesn't require it.
 To require it add SSL_VERIFY_FAIL_IF_NO_PEER_CERT .

 And if you want to allow clients to use certs from a public CA,
 depth 4 doesn't leave much margin. Practically all public CAs
 today chain either 2 or 3 within the CA itself, and often 1 or 2
 more when one CA buys trust from another (usually older) one.
 If you require clients use certs you issue with your own CA
 (see below) you can control the depth.

The chain file has 3 things in it -
private key of the server CA
a signed certificate request signed by my server CA
the public key of the server CA

 0. A CA doesn't sign requests (CSRs), it signs certs.
 A cert is *derived from* a CSR, but it isn't a signed CSR.
 If you have a cert issued from a CSR for your server,
 it is a cert for your server, or just your server cert.

 1. A cert chain consists of certs, not publickeys.

 2. If your server cert is signed by the CA root key+cert,
 you don't need any chain. Just load the server privatekey
 and the server cert. If your server cert is signed by an
 intermediate CA key+cert, and that possibly by another etc.,
 you must either (1) send chain or (2) have client(s) trust
 anyway, depending on client. There are several suboptions:
 (1A) give the server cert and chain cert(s) in chain_file
 (1B) give the server cert and have chain cert(s) in server
 truststore (your root_cert_file and/or root_cert_dir).
 OpenSSL automatically fills the chain from truststore.
 (2A) have client trust the first (non-sent) intermediate
 cert as an anchor. OpenSSL doesn't but other clients may.
 (2B) have all non-sent chain certs in and used from client
 truststore. OpenSSL does (automatically).
 2A and 2B depend on the client(s), and so are suitable only
 if your clients are known and reasonably few.

 3. In all cases, the/each client's truststore must contain
 the CA root for the server cert. Does my server CA mean one
 you own and operate, or a public one you chose to use?

 3A. If the server CA is a public one like Verisign, the client
 may already trust its root, depending on the client. Windows
 and common web browsers, and some utilities like curl, and
 Java, come with truststores containing some dozens of public
 established CA roots. OpenSSL does not. If you use s_client
 or similar, you need to get at least the root used, and
 optionally others you like, and put in client truststore.

 3B. If the server CA is one you created (and not delegated
 as a CA under an established CA, which AIUI is difficult and
 costly to obtain so probably not), no typical client will
 have its root already; for all clients, you must add it.

 When I create a new SSL structure everything goes fine, but when
 I call SSL_accept() on it, I get a return of zero, which when
 I read the error queue says sslv3 alert bad certificate

 What does this error mean exactly? Is it a problem with my server
 certificate itself, the client certificate returned on the verify,
 or what?

 alert means client said it didn't like your (server) auth.
 Either the client is mistaken, usually because it doesn't have
 the root in its truststore as above (though bugs are possible),
 or the cert/chain you sent is in fact bad. This occurs at a
 point the in protocol before client-auth, so no attempt was
 made to verify any client cert. If a client cert is received
 and doesn't verify, that's a different error.

 The client may have displayed a more specific error. If not,
 try another client

SSL_accept fails with bad certificate error

2012-10-09 Thread Derek Cole
Hello,

I am trying to write a server that will accept an incoming SSL connection.

In psuedo, I have the following chain of function calls


SSL_CTX_load_verify_locations(ctx, root_cert_file, root_cert_dir)

SSL_CTX_use_certificate_chain_file(chain file)

SSK_CTX_use_PrivateKey_file(chain file)

SSL_CTX_set_verify (sets SSL_VERIFY_PEER)

SSL_CTS_set_verify_depth(to a depth of 4)

The chain file has 3 things in it -

private key of the server CA
a signed certificate request signed by my server CA
the public key of the server CA


When I create a new SSL structure everything goes fine, but when I call
SSL_accept() on it, I get a return of zero, which when I read the error
queue says sslv3 alert bad certificate

What does this error mean exactly? Is it a problem with my server
certificate itself, the client certificate returned on the verify, or what?


Re: openssl procedure - i read your mini tutorial have 1 question - please

2003-07-27 Thread Derek Chew En-Hock
Hello Alain,

sorry for the delay in the reply... I'm currently outstation at the
moment and had to find the time to VPN into my network inorder to
check the IIS settings for you...

hmm... I checked my IIS setup and it indicates that the server
certificate is valid... one thing I noticed is that you are using a
512-bit RSA key instead of a 1024-bit RSA key which I am using...

if it is not too much effort, please run over the steps I outlined,
this time specify a 1024 bit key.. also ensure that the common name
used by the certficate (inputted during the certificate request
generation) is the same as the NETBIOS/DNS Name of your IIS Server
Machine...

Good Luck and please let me know how it pans out...

Friday, July 25, 2003, 8:47:14 PM, you wrote:
AL Very thanks for you answer.

AL In the website console administration.
AL On my Webserver, via properties - tab Directory Security - in secure
AL communication frame, View Certificate.

AL In the Certificate Window, the last tab called  Certification Path, you have
AL a box called 'Certificate Status' that give me :
AL This certificate has an nonvalid digital signature.

AL If I try to connect my website : https://127.0.0.1/   No connection... the
AL IIS web server just don't listen on port 443 because it think that
AL certificate is bad..

AL The most amazing things that is IIS import with succes the certificate and
AL indicate than I have the privkey. Also, I check in the Event Viewer in all
AL subdirectories... but I found nothing concerning IIS except this :
AL ---
AL Event Type: Warning
AL Event Source: W3SVC
AL Event Category: None
AL Event ID: 48
AL Description:
AL One of the certificates in the certificate chain of the server certificate
AL for instance '1' has an invalid signature.
AL 

AL Also,  If I installed my NetMeeting certificate, IIS web server work fine in
AL SSL mode(so my configuration is correct.. .except for this Server
AL Certificate)

AL So, if you have an idea... ! Thanks,
AL Alain


AL nb: i attached snapshot about the certificate window.


AL - Original Message - 
AL From: Derek Chew En-Hock [EMAIL PROTECTED]
AL To: Alain Lafleche [EMAIL PROTECTED]
AL Cc: [EMAIL PROTECTED]
AL Sent: Friday, July 25, 2003 7:42 AM
AL Subject: Re: openssl procedure - i read your mini tutorial  have 1
AL question - please


 Hello Alain,

 where did you see the certificate status option? from my IE6 browser,
 it indicates only indicates that the certificate isn't verified by a
 trusted CA... not to mention I see the SSL symbol (locked padlock
 icon) which indicates that 128-bit encryption is enabled...

 any more experienced OpenSSL users would like to comment on this?

 Thursday, July 24, 2003, 10:34:54 PM, you wrote:
 AL Hi,
 AL I just read your mini-tutorial  i want to thanks you..! It was really
AL better easy to do procedure. Thanks
 AL But, I have only  1 question :
 AL Certificate Request is sign with success. I imported it in IIS. I can
AL check the certificate is write at my name  it's indicated than I have
AL private key for this certificate.

 AL But the problem is in certificate status is indicate :
 AL This certificate has an nonvalid digital signature.

 AL The results is than IIS doen'st work in secure mode.
 AL Thanks very much,
 AL Alain
 AL nb: i make test with another certificate and my IIS configuration
AL works good in secure ssl mode.

 -- 
 Best regards,
  Derekmailto:[EMAIL PROTECTED]




-- 
Best regards,
 Derekmailto:[EMAIL PROTECTED]

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]


Re: openssl procedure - i read your mini tutorial have 1 question - please

2003-07-25 Thread Derek Chew En-Hock
Hello Alain,

where did you see the certificate status option? from my IE6 browser,
it indicates only indicates that the certificate isn't verified by a
trusted CA... not to mention I see the SSL symbol (locked padlock
icon) which indicates that 128-bit encryption is enabled...

any more experienced OpenSSL users would like to comment on this?

Thursday, July 24, 2003, 10:34:54 PM, you wrote:
AL Hi,
AL I just read your mini-tutorial  i want to thanks you..! It was really better easy 
to do procedure. Thanks
AL But, I have only  1 question :
AL Certificate Request is sign with success. I imported it in IIS. I can check the 
certificate is write at my name  it's indicated than I have private key for this 
certificate. 

AL But the problem is in certificate status is indicate :
AL This certificate has an nonvalid digital signature.

AL The results is than IIS doen'st work in secure mode.
AL Thanks very much,
AL Alain
AL nb: i make test with another certificate and my IIS configuration works good in 
secure ssl mode.

-- 
Best regards,
 Derekmailto:[EMAIL PROTECTED]

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]


[HOWTO] Use Open SSL Cert in IIS

2003-07-22 Thread Derek Chew En-Hock
Hello Everyone,

just wanted to contribute a short HOWTO as I have been spending the
last few days reading google groups, the openssl HOWTOs and didn't
really find a good one that teaches you how to get it done... any
comments appreciated!

anyway, great work OpenSSL team!

How to use OpenSSL to act as a CA to sign an IIS certificate request for SSL use

1. Create a certificate request via the Internet Services Manager under
'Directory Security-Secure Communication-Server Certificate'. This
is found under the property tab for the webserver you want to secure.
Follow the wizard to create a certificate request and fill up all
required details. At the end of the wizard, it will generate a
certreq.txt file. Move this to your favorite linux box (e.g Debian) or
run openssl under cygwin.

2. We now have to generate a private key using OpenSSL

openssl genrsa -des3 -out cakey.pem 2048

The process will prompt you to supply a PEM pass phrase to help secure the key.

3. Now we have to create a CA certificate for our bogus CA

openssl req -new -x509 -key cakey.pem -out cacert.pem -days 1825

4. Create the following directories in your home directory

demoCA
demoCA/private
demoCA/newcerts

Also create in demoCA a empty text file called 'index.txt' and a text
file called 'serial' with the numbers '01'

5. Move your private key cakey.pem to the demoCA/private directory
and cacert.pem to demoCA/

6. Sign our previously created IIS certificate request

openssl ca -in certreq.txt -out iis.cer

7. Open iis.cer in your favorite text editor (eg vi) and remove all the text
before the line '-- Begin Certificate --'. IIS is not able to handle
the text above that line and may get confused!

8. Move iis.cer back to your Windows machine and complete the
certificate request in IIS by importing the iis.cer file.

All done!

-- 
Best regards,
 Derek Chew En-Hock   mailto:[EMAIL PROTECTED]

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]


Outlook DOES NOT support client-side certs

2002-10-22 Thread Derek Simkowiak

This is for the purposes of the list archives, as I have wasted a
great deal of time on this and there is misleading information on the
Internet.

I have tested Outlook 2002, both with and without Office
ServicePack1 and Office ServicePack2 (independently), on 4 different
workstations, and I can say with a high degree of certainty that Microsoft
Outlook does NOT support the use of client-side certificates.  It simply
does not return the certificate when prompted for it, and then fails to
connect.

I was very thorough in my testing, trying everying including
making sure that the cert 'cn' matched the email address of the IMAP
account, and it just doesn't work.  Several hours of Google searches and
Microsoft KnowledgeBase searches did not produce any information on this
subject.



Thanks,
Derek Simkowiak
dereks at itsite dot com

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



OpenSSL Book....

2002-07-17 Thread Derek Heidorn


For those who don't already know this, there's a book on OpenSSL published
by O'Reilly.
Details:
Network Security with OpenSSL
Authors: John Viega, Matt Messier and Pravir Chandra
Publisher: O'Reilly
ISBN: 0-596-00270-X
Cheers,

Derek
--
__
Derek Heidorn
E-Mail: [EMAIL PROTECTED]



Converting PCKS12 certificates to PEM format

2002-06-05 Thread Derek Jones

Hi,

I have PKCS12 format certificates (.pfx) which I use in conjunction with IE
to connect to a secure site requiring client certificates. This works fine.

I would like to do the same using openssl. However, since openssl does not
support the PKCS12 format directly, I need to convert the certificates to
PEM format. I have tried various utilities such as openssl PKCS12, but
cannot get openssl to successfully send the client certificate in an
acceptable format for the server. I get a fatal certificate_unknown alert
when openssl sends the certificate after the ServerHello.

Any help would be appreciated.

Regards

Derek Jones
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: Microsoft IIS backup key format

2001-08-21 Thread derek

I was just playing with this yesterday...

I generated a CSR for thawte and imported the cert and verified it all 
worked in IIS5 and then export everything for use with Apache-mod-ssl 1.3.20.

I was able to run the exported private key file through the pkcs12 util in 
openssl and then edit the file in vi to seperate out the encrypted private key

just use the -in and -out params to the pkcs12 util

Later,
dj

Hellan,Kim KHE wrote:

 Simple question.
 Does anyone know what format the key backup file from a MS IIS webserver is?
 If yes...anyone know of a tool to parse/create such a file?
 The binary backup file contains both the private key and the belonging
 certificate, but it is not PKCS#12.
 
 My guess is, that the key probably is the obscure MS PVK format and the
 certificate is another MS specific format.
 
 Thanks,
 Kim Hellan
 KMD / KMD-CA
 http://www.kmd-ca.dk
 Mailto:[EMAIL PROTECTED]
 
 __
 OpenSSL Project http://www.openssl.org
 User Support Mailing List[EMAIL PROTECTED]
 Automated List Manager   [EMAIL PROTECTED]
 


-- 

Derek Browne[EMAIL PROTECTED]
Director of RD - Security  Yo Inc.

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



timestamp server with OpenSSL

2000-11-02 Thread Derek Charles

I'd like to set up my own timestamping server with OpenSSL.

Has anyone done this already and can give me some pointers or point me to a 
good resource?

Thanks in advance,

Derek.


_
Get Your Private, Free E-mail from MSN Hotmail at http://www.hotmail.com.

Share information about yourself, create your own public profile at 
http://profiles.msn.com.

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



req: help to rebuff an attack on openssl

2000-10-09 Thread Derek Charles

All,

I have a report in front of me commissioned by someone in my company to 
review our CA/PKI system.  Frankly I'm not too happy about it and would like 
some bitingly worded and technically brilliant responses to support our use 
of OpenSSL which I would like to continue.

The push of the report is to move away from openss to a vendor solution.  
I've had a cursory look over some vendor products like baltimore, identrus 
and iplanet and haven't been too impressed with any of the bells and 
whistles they offer like vendor specific browser apps and client private key 
escrow in proprietary databases.  I was very impressed by Iplanet's pre 
sales "technical" sales guys telling me they didn't use Xenroll.dll to 
install certs in IE browsers with their certificate management software (as 
I do with my CA), they use OSPF! and suggest we _force_ all of our clients 
to use netscape browser anyway. Some other unnamed company expect you to 
think adding %30 to the price of their already pricey software is justified 
if it lets you use "advanced features" (ie x509v3 extended attribute).  I 
guess people that have never used openssl would be impressed.

Is there anyone on the list who has done a more rigourous comparison of 
commercial systems Vs. OpenSSL?  Either out of the box openssl executables 
or custom written apps using the libraries?  An independant review of 
commercial CA's would be the ultimate resource here and I can add on the 
features possible with openssl based apps/scripts.

Any help as always greatly appreciated.

Dereck Charles.

_
Get Your Private, Free E-mail from MSN Hotmail at http://www.hotmail.com.

Share information about yourself, create your own public profile at 
http://profiles.msn.com.

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Certificate based SSO

2000-10-02 Thread Derek Charles

Forgive me for being slightly off topic here.

My company has several sites and applications that require authentication by 
digital certificate.  We'd like to wrap it all up into a portal site for 
single point of access and make it single sign on.

I was wondering if anyone on the list could point me to a good source of 
info on certificate based single sign on solutions, preferably based on 
openssl and some sort of ldap x.500 system?

I'd like to have people come in to the portal site over https, authenticate 
with a digital certificate and then be able to access other secure sites 
using the same certificate _without being asked again for the certificate_.

Thanks in advance for any help.


Derek Charles.
_
Get Your Private, Free E-mail from MSN Hotmail at http://www.hotmail.com.

Share information about yourself, create your own public profile at 
http://profiles.msn.com.

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: autoloader emissions in Net::SSLeay.pm

2000-08-18 Thread Derek J. Balling

Has NOBODY got any idea why this would be happening? Same program, 
same call-method, but when one program calls it, it autoloads the 
die_if_ssl_error nonsense causing the "known problem", but if another 
program calls with the exact same parameters it works fine.

Help!

D

OK, I'll bite... under what conditions will die_if_ssl_error be made 
autoloadable?

I can call the get_https function with the SAME set of arguments 
from the same perl package (I have my own "WebGet" package that I 
use internally at work for fetching pages from HTTP or HTTPS 
servers).

Setting stuff up in debug mode, I print out the argument list I'm 
going to call get_https with, and they're identical. Is there any 
way to FORCE it NOT to autoload die_if_ssl_error?

Here's the debug output in the case where it works. In both cases, 
this debug output is printed out RIGHT before my WebGet.pm package 
calls out to:

 ($page,$response,%reply_headers) =
 get_https($host,$port,$location,$header_string);

[ I'm using $header_string and not make_headers only because I had 
removed that code in the process of debugging, and after I found out 
what it did I didn't bother putting it back ]

Can anyone give me any suggestions as to what I am doing wrong, and 
what I should do to correct it?


$ ./db_test.pl
HOST: pp1.yahoo.com PORT: 443 LOCATION: /
HEADER_STRING:
--
User-Agent: Mozilla/4.0 (compatible; MSIE 4.01; Windows 95)
Host: my.secure.yahoo.com
--
OK


... And In the case where it fails:


$ ./test.sh
HOST: pp1.yahoo.com PORT: 443 LOCATION: /
HEADER_STRING:
--
User-Agent: Mozilla/4.0 (compatible; MSIE 4.01; Windows 95)
Host: my.secure.yahoo.com
--
Argument "pp1.yahoo.com" isn't numeric in entersub at 
/usr/local/lib/perl5/site_perl/5.005/i386-freebsd/Net/SSLeay.pm line 
342.
Ambiguous call resolved as CORE::connect(), qualify as such or use  
at blib/lib/Net/SSLeay.pm (autosplit into 
blib/lib/auto/Net/SSLeay/open_tcp_connection.al) line 1034.
Argument "/etc/passwd" isn't numeric in entersub at 
/usr/local/lib/perl5/site_perl/5.005/i386-freebsd/Net/SSLeay.pm line 
342.
Use of uninitialized value at blib/lib/Net/SSLeay.pm (autosplit into 
blib/lib/auto/Net/SSLeay/https_cat.al) line 1265.
Use of uninitialized value at blib/lib/Net/SSLeay.pm (autosplit into 
blib/lib/auto/Net/SSLeay/https_cat.al) line 1266.
Use of uninitialized value at blib/lib/Net/SSLeay.pm (autosplit into 
blib/lib/auto/Net/SSLeay/https_cat.al) line 1310.
Use of uninitialized value at blib/lib/Net/SSLeay.pm (autosplit into 
blib/lib/auto/Net/SSLeay/https_cat.al) line 1313.
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



autoloader emissions in Net::SSLeay.pm

2000-08-15 Thread Derek J. Balling

OK, I'll bite... under what conditions will die_if_ssl_error be made 
autoloadable?

I can call the get_https function with the SAME set of arguments from 
the same perl package (I have my own "WebGet" package that I use 
internally at work for fetching pages from HTTP or HTTPS servers).

Setting stuff up in debug mode, I print out the argument list I'm 
going to call get_https with, and they're identical. Is there any way 
to FORCE it NOT to autoload die_if_ssl_error?

Here's the debug output in the case where it works. In both cases, 
this debug output is printed out RIGHT before my WebGet.pm package 
calls out to:

 ($page,$response,%reply_headers) =
 get_https($host,$port,$location,$header_string);

[ I'm using $header_string and not make_headers only because I had 
removed that code in the process of debugging, and after I found out 
what it did I didn't bother putting it back ]

Can anyone give me any suggestions as to what I am doing wrong, and 
what I should do to correct it?


$ ./db_test.pl
HOST: pp1.yahoo.com PORT: 443 LOCATION: /
HEADER_STRING:
--
User-Agent: Mozilla/4.0 (compatible; MSIE 4.01; Windows 95)
Host: my.secure.yahoo.com
--
OK


... And In the case where it fails:


$ ./test.sh
HOST: pp1.yahoo.com PORT: 443 LOCATION: /
HEADER_STRING:
--
User-Agent: Mozilla/4.0 (compatible; MSIE 4.01; Windows 95)
Host: my.secure.yahoo.com
--
Argument "pp1.yahoo.com" isn't numeric in entersub at 
/usr/local/lib/perl5/site_perl/5.005/i386-freebsd/Net/SSLeay.pm line 
342.
Ambiguous call resolved as CORE::connect(), qualify as such or use  
at blib/lib/Net/SSLeay.pm (autosplit into 
blib/lib/auto/Net/SSLeay/open_tcp_connection.al) line 1034.
Argument "/etc/passwd" isn't numeric in entersub at 
/usr/local/lib/perl5/site_perl/5.005/i386-freebsd/Net/SSLeay.pm line 
342.
Use of uninitialized value at blib/lib/Net/SSLeay.pm (autosplit into 
blib/lib/auto/Net/SSLeay/https_cat.al) line 1265.
Use of uninitialized value at blib/lib/Net/SSLeay.pm (autosplit into 
blib/lib/auto/Net/SSLeay/https_cat.al) line 1266.
Use of uninitialized value at blib/lib/Net/SSLeay.pm (autosplit into 
blib/lib/auto/Net/SSLeay/https_cat.al) line 1310.
Use of uninitialized value at blib/lib/Net/SSLeay.pm (autosplit into 
blib/lib/auto/Net/SSLeay/https_cat.al) line 1313.
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Iaik and Openssl

2000-06-13 Thread Derek DeMoro



Does anybody now how to make openSSL read 
certificates and keys created by IAIK?
I think they might implement different 
OIDs.

Please Help?

Derek DeMoroChief Technical 
OfficerBallotDirect(650) 799-8490


No Subject

2000-06-13 Thread Derek DeMoro



Does anybody now how to make openSSL read 
certificates and keys created =by IAIK?I think they might implement 
different OIDs. OpenSSL cannot seem to recognize 
my Iaik Private Key.

Please Help?
Derek DeMoroChief Technical 
OfficerBallotDirect(650) 799-8490


Re: Sign.sh on win32

2000-06-08 Thread Derek DeMoro

Thank You very much.  It worked.  Why is it creating
a bad crt file?

Derek

- Original Message -
From: "Peter 'Luna' Runestig" [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]
Sent: Thursday, June 08, 2000 11:53 AM
Subject: Re: Sign.sh on win32


 Derek DeMoro wrote:

 Hi All,
I created my own CA and now want to sign any *.csr file on win32.
 I noticed the sign.sh file
 in mod-ssl and tried to duplicate it on my 2000 machine.  The
 certificate is created, but when
 I click on it, it says it's an invalid security certificate.  Anybody
 have a fix? Help. Please

The crt file contains both some clear text info about the cert and the
-BEGIN/END CERTIFICATE- wrapped pem encoded part. Open the file
in a text editor and put the pem encoded part first, and you'll be fine.

--
Peter "Luna" Runestig (fd. Altberg), Sweden [EMAIL PROTECTED]
PGP Key ID: 0xD07BBE13
Fingerprint: 7B5C 1F48 2997 C061 DE4B  42EA CB99 A35C D07B BE13

Gubben Movitz ler och nickar, / men från Charons mörka sund
dödens blund / i dina blickar / bådar snart din sista stund.
Carl Michael Bellman, Fredmans epistel nr 34

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: SafeGossip

1999-10-07 Thread Derek J. Balling

At 10:14 AM 10/7/99 +0100, Ben Laurie wrote:
  IIRC, providing "hooks" to strong-crypto stuff is also considered the same
  as providing strong-crypto itself, according to U.S. Idiocy^WLaw.

Allegedly, it isn't illegal, but the spooks keep telling everyone it is.
IANAL.

Dunno. Sendmail's not including hooks because their lawyers seem to have 
agreed with the spooks.

IANAL.

D
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]