Re: [openssl-users] osf-contact Latest Openssl Issue with Bind 9.12.2-P2 on RHEL 7.5

2018-10-08 Thread Porter, Andrew
See the error message about looking at the FAQ? Here it is:

https://www.openssl.org/docs/faq.html#USER1

From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of 
aakash.ku...@orange.com
Sent: Sunday, October 07, 2018 22:51
To: openssl-users@openssl.org
Cc: osf-cont...@openssl.org
Subject: Re: [openssl-users] osf-contact Latest Openssl Issue with Bind 
9.12.2-P2 on RHEL 7.5


Hi Team,



Please find below error in text format.



[root@g3r1 ~]# systemctl status bind -l

● bind.service - LSB: DNS Daemon

   Loaded: loaded (/etc/rc.d/init.d/bind)

   Active: active (exited) since Fri 2018-10-05 13:31:09 CEST; 2 days ago

 Docs: man:systemd-sysv-generator(8)

  Process: 32417 ExecStop=/etc/rc.d/init.d/bind stop (code=exited, 
status=0/SUCCESS)

  Process: 32421 ExecStart=/etc/rc.d/init.d/bind start (code=exited, 
status=0/SUCCESS)



Oct 05 13:31:09 g3r1 named[32429]: 


Oct 05 13:31:09 g3r1 named[32429]: adjusted limit on open files from 4096 to 
1048576

Oct 05 13:31:09 g3r1 named[32429]: found 1 CPU, using 1 worker thread

Oct 05 13:31:09 g3r1 named[32429]: using 1 UDP listener per interface

Oct 05 13:31:09 g3r1 named[32429]: using up to 4096 sockets

Oct 05 13:31:09 g3r1 named[32429]: openssl_link.c:296: fatal error:

Oct 05 13:31:09 g3r1 named[32429]: OpenSSL pseudorandom number generator cannot 
be initialized (see the `PRNG not seeded' message in the OpenSSL FAQ)

Oct 05 13:31:09 g3r1 named[32429]: exiting (due to fatal error in library)

Oct 05 13:31:09 g3r1 bind[32421]: [13B blob data]

Oct 05 13:31:09 g3r1 systemd[1]: Started LSB: DNS Daemon.





[root@g3r1 ~]# tail /var/log/message

Oct  5 13:31:09 g3r1 systemd: Starting LSB: DNS Daemon...

Oct  5 13:31:09 g3r1 bind: /etc/rc.d/init.d/bind: line 36: log_info_msg: 
command not found

Oct  5 13:31:09 g3r1 named[32429]: starting BIND 9.12.2-P2 

Oct  5 13:31:09 g3r1 named[32429]: running on Linux x86_64 
3.10.0-327.13.1.el7.x86_64 #1 SMP Mon Feb 29 13:22:02 EST 2016

Oct  5 13:31:09 g3r1 named[32429]: built with '--prefix=/usr' 
'--sysconfdir=/etc' '--localstatedir=/var' 'mandir=/usr/share/man' 
'--enable-threads' '--with-libtool' '--with-openssl=/usr/local/ssl' 
'--disable-static' '--with-randomdev=/dev/urandom'

Oct  5 13:31:09 g3r1 named[32429]: running as: named -u named -t /srv/named -c 
/etc/named.conf

Oct  5 13:31:09 g3r1 named[32429]: compiled by GCC 4.8.5 20150623 (Red Hat 
4.8.5-28)

Oct  5 13:31:09 g3r1 named[32429]: compiled with OpenSSL version: OpenSSL 
1.0.2p  14 Aug 2018

Oct  5 13:31:09 g3r1 named[32429]: linked to OpenSSL version: OpenSSL 1.0.2p  
14 Aug 2018

Oct  5 13:31:09 g3r1 named[32429]: compiled with zlib version: 1.2.7

Oct  5 13:31:09 g3r1 named[32429]: linked to zlib version: 1.2.7

Oct  5 13:31:09 g3r1 named[32429]: threads support is enabled

Oct  5 13:31:09 g3r1 named[32429]: 


Oct  5 13:31:09 g3r1 named[32429]: BIND 9 is maintained by Internet Systems 
Consortium,

Oct  5 13:31:09 g3r1 named[32429]: Inc. (ISC), a non-profit 501(c)(3) 
public-benefit

Oct  5 13:31:09 g3r1 named[32429]: corporation.  Support and training for BIND 
9 are

Oct  5 13:31:09 g3r1 named[32429]: available at https://www.isc.org/support

Oct  5 13:31:09 g3r1 named[32429]: 


Oct  5 13:31:09 g3r1 named[32429]: adjusted limit on open files from 4096 to 
1048576

Oct  5 13:31:09 g3r1 named[32429]: found 1 CPU, using 1 worker thread

Oct  5 13:31:09 g3r1 named[32429]: using 1 UDP listener per interface

Oct  5 13:31:09 g3r1 named[32429]: using up to 4096 sockets

Oct  5 13:31:09 g3r1 named[32429]: openssl_link.c:296: fatal error:

Oct  5 13:31:09 g3r1 named[32429]: OpenSSL pseudorandom number generator cannot 
be initialized (see the `PRNG not seeded' message in the OpenSSL FAQ)





Thanks & Regards,



Aakash kumar

ITE - India

Tower B, 8th Floor, DLF Infinity Towers,

DLF Cyber City Phase - II

Gurgaon - 122002, Haryana, INDIA

aakash.ku...@orange.com



  Mobile: +91-8527288977

  CVS: 7357 3706







-Original Message-
From: Viktor Dukhovni [mailto:openssl-us...@dukhovni.org]
Sent: 05 October 2018 21:23
To: KUMAR Aakash IMT/OINIS
Cc: osf-cont...@openssl.org; SRIVASTAVA Himanshu IMT/OINIS; VARSHNEY Praveen 
IMT/OINIS
Subject: Re: osf-contact Latest Openssl Issue with Bind 9.12.2-P2 on RHEL 7.5





Please try to send the text of error reports, not pictures.



> I am getting below error while starting the bind service.

>

> 



If you ask on the openssl-users list, someone else may have seen

the same issue, and may have useful advice to share.



NOTE!!!:  I've set the Reply-To: address to .

If you just hit "Reply", your answer may go to the list, though you'd

need to join the list first to be able to post...



Does

Re: [openssl-users] osf-contact Latest Openssl Issue with Bind 9.12.2-P2 on RHEL 7.5

2018-10-07 Thread aakash.kumar
Hi Team,



Please find below error in text format.



[root@g3r1 ~]# systemctl status bind -l

● bind.service - LSB: DNS Daemon

   Loaded: loaded (/etc/rc.d/init.d/bind)

   Active: active (exited) since Fri 2018-10-05 13:31:09 CEST; 2 days ago

 Docs: man:systemd-sysv-generator(8)

  Process: 32417 ExecStop=/etc/rc.d/init.d/bind stop (code=exited, 
status=0/SUCCESS)

  Process: 32421 ExecStart=/etc/rc.d/init.d/bind start (code=exited, 
status=0/SUCCESS)



Oct 05 13:31:09 g3r1 named[32429]: 


Oct 05 13:31:09 g3r1 named[32429]: adjusted limit on open files from 4096 to 
1048576

Oct 05 13:31:09 g3r1 named[32429]: found 1 CPU, using 1 worker thread

Oct 05 13:31:09 g3r1 named[32429]: using 1 UDP listener per interface

Oct 05 13:31:09 g3r1 named[32429]: using up to 4096 sockets

Oct 05 13:31:09 g3r1 named[32429]: openssl_link.c:296: fatal error:

Oct 05 13:31:09 g3r1 named[32429]: OpenSSL pseudorandom number generator cannot 
be initialized (see the `PRNG not seeded' message in the OpenSSL FAQ)

Oct 05 13:31:09 g3r1 named[32429]: exiting (due to fatal error in library)

Oct 05 13:31:09 g3r1 bind[32421]: [13B blob data]

Oct 05 13:31:09 g3r1 systemd[1]: Started LSB: DNS Daemon.





[root@g3r1 ~]# tail /var/log/message

Oct  5 13:31:09 g3r1 systemd: Starting LSB: DNS Daemon...

Oct  5 13:31:09 g3r1 bind: /etc/rc.d/init.d/bind: line 36: log_info_msg: 
command not found

Oct  5 13:31:09 g3r1 named[32429]: starting BIND 9.12.2-P2 

Oct  5 13:31:09 g3r1 named[32429]: running on Linux x86_64 
3.10.0-327.13.1.el7.x86_64 #1 SMP Mon Feb 29 13:22:02 EST 2016

Oct  5 13:31:09 g3r1 named[32429]: built with '--prefix=/usr' 
'--sysconfdir=/etc' '--localstatedir=/var' 'mandir=/usr/share/man' 
'--enable-threads' '--with-libtool' '--with-openssl=/usr/local/ssl' 
'--disable-static' '--with-randomdev=/dev/urandom'

Oct  5 13:31:09 g3r1 named[32429]: running as: named -u named -t /srv/named -c 
/etc/named.conf

Oct  5 13:31:09 g3r1 named[32429]: compiled by GCC 4.8.5 20150623 (Red Hat 
4.8.5-28)

Oct  5 13:31:09 g3r1 named[32429]: compiled with OpenSSL version: OpenSSL 
1.0.2p  14 Aug 2018

Oct  5 13:31:09 g3r1 named[32429]: linked to OpenSSL version: OpenSSL 1.0.2p  
14 Aug 2018

Oct  5 13:31:09 g3r1 named[32429]: compiled with zlib version: 1.2.7

Oct  5 13:31:09 g3r1 named[32429]: linked to zlib version: 1.2.7

Oct  5 13:31:09 g3r1 named[32429]: threads support is enabled

Oct  5 13:31:09 g3r1 named[32429]: 


Oct  5 13:31:09 g3r1 named[32429]: BIND 9 is maintained by Internet Systems 
Consortium,

Oct  5 13:31:09 g3r1 named[32429]: Inc. (ISC), a non-profit 501(c)(3) 
public-benefit

Oct  5 13:31:09 g3r1 named[32429]: corporation.  Support and training for BIND 
9 are

Oct  5 13:31:09 g3r1 named[32429]: available at https://www.isc.org/support

Oct  5 13:31:09 g3r1 named[32429]: 


Oct  5 13:31:09 g3r1 named[32429]: adjusted limit on open files from 4096 to 
1048576

Oct  5 13:31:09 g3r1 named[32429]: found 1 CPU, using 1 worker thread

Oct  5 13:31:09 g3r1 named[32429]: using 1 UDP listener per interface

Oct  5 13:31:09 g3r1 named[32429]: using up to 4096 sockets

Oct  5 13:31:09 g3r1 named[32429]: openssl_link.c:296: fatal error:

Oct  5 13:31:09 g3r1 named[32429]: OpenSSL pseudorandom number generator cannot 
be initialized (see the `PRNG not seeded' message in the OpenSSL FAQ)





Thanks & Regards,



Aakash kumar

ITE - India

Tower B, 8th Floor, DLF Infinity Towers,

DLF Cyber City Phase - II

Gurgaon - 122002, Haryana, INDIA

aakash.ku...@orange.com



  Mobile: +91-8527288977

  CVS: 7357 3706







-Original Message-
From: Viktor Dukhovni [mailto:openssl-us...@dukhovni.org]
Sent: 05 October 2018 21:23
To: KUMAR Aakash IMT/OINIS
Cc: osf-cont...@openssl.org; SRIVASTAVA Himanshu IMT/OINIS; VARSHNEY Praveen 
IMT/OINIS
Subject: Re: osf-contact Latest Openssl Issue with Bind 9.12.2-P2 on RHEL 7.5





Please try to send the text of error reports, not pictures.



> I am getting below error while starting the bind service.

>

> 



If you ask on the openssl-users list, someone else may have seen

the same issue, and may have useful advice to share.



NOTE!!!:  I've set the Reply-To: address to .

If you just hit "Reply", your answer may go to the list, though you'd

need to join the list first to be able to post...



Does the error still happen when you disable "chroot" in BIND?

Perhaps BIND is doing late initialization of the PRNG after

entering the chroot jail, and maybe trying to use "/dev/urandom",

which not be in the jail?  That's a wild guess.  You'd need to

trace system calls to see what it is actually doing...



--

Viktor.



__

Re: POP3 client with OpenSSL issue

2013-04-22 Thread vinay krishna
Thanks a lot for the reply Mr Dave!
The info on wireshark was really helpful.
By flush I meant the buffer before being used in sprintf  was clean.


On Mon, Apr 22, 2013 at 9:48 AM, Viktor Dukhovni  wrote:

> On Sun, Apr 21, 2013 at 10:17:31PM -0400, Dave Thompson wrote:
>
> > >scanf("%s",password);
>
> This also mishandles passwords containing whitespace.  The code
> looks so poor that my guess is that someone is asking us to do
> their homework.
>
> --
> Viktor.
> __
> OpenSSL Project http://www.openssl.org
> User Support Mailing Listopenssl-users@openssl.org
> Automated List Manager   majord...@openssl.org
>


Re: POP3 client with OpenSSL issue

2013-04-21 Thread Viktor Dukhovni
On Sun, Apr 21, 2013 at 10:17:31PM -0400, Dave Thompson wrote:

> >scanf("%s",password);

This also mishandles passwords containing whitespace.  The code
looks so poor that my guess is that someone is asking us to do
their homework.

-- 
Viktor.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


RE: POP3 client with OpenSSL issue

2013-04-21 Thread Dave Thompson
>From: owner-openssl-us...@openssl.org On Behalf Of vinay krishna
>Sent: Sunday, 21 April, 2013 00:52

>Hello I am writing a POP3 client in C on ubuntu. I am using OpenSSl 
>I am stuck in the AUTHORIZATION state! I send the user name and get 
>a success response, and when i send the password , it always says 
>-ERR bad command. I am sure the password is correct. Since i am 

Are you sure the username is correct? Usual security practice has 
long required, as RFC 1939 hints, that the feedback for a uid/pw 
login should not indicate which one was bad nor in what way, 
only that the *pair* is bad. This means that a bad USER 
would still +OK and only the subsequent PASS would -ERR.
Although -ERR "bad command" is somewhat discourteous;
it could be a little more specific and still be secure.

>using open ssl , wireshark was of not of much help. Heres how 

For recent versions of wireshark (about the last 2 years or so) 
if your code gets the SSL_SESSION after handshake (i.e. after 
SSL_connect or equivalent for a client) and _print's it to a file 
which you give to wireshark it should be able to decrypt.
(And wireshark has vulnerabilities, at least loop or crash 
vulnerabilities, often enough it's good to keep up to date.)

>i am sending the password 

>scanf("%s",password);
>sprintf(pass_cmd,"PASS %s\r\n",password);

If either the input to password or the line to pass_cmd 
exceeds the size of the respective buffer, this will 
overrun memory and do unpredictably bad things.
The official C term for this is Undefined Behavior.
Use *scanf %s where limit is at most size-1, 
and unless you've prearranged the sizes to fit, 
either sprintf %.s or snprintf (standard in C99, 
but widely available before and outside that).

Alternatively if this is the only data on an input line, 
and I expect in this situation it would be, use fgets 
and discard the \n if (and only if) it's there.

>sent = SSL_write(ssl, pass_cmd, strlen(pass_cmd));

>pass_cmd is flushed and cleaned before used in write.

What exactly is flush? Normally that is used for I/O 
(write especially, less often read) and there is no I/O 
before the SSL_write; the SSL_write IS the I/O.
Assuming clean means OPENSSL_cleanse or equivalent, 
before the build (sprintf) or between that and write?
The former is useless; the latter would destroy exactly 
the data you want to send, which is stupid. If you want 
to clean it so you don't have it in memory, clean it after 
sending. And clean password anytime after using it to 
build pass_cmd. (It may be and often is convenient 
to group all needed clean operations at the end 
of the function body, just before the return -- 
assuming there is a single return, which is often but 
not universally considered good programming practice.)

>The strlen is also giving a valid size including \r\n

But not after being cleaned, if in fact it is.

FWIW {,f,s,sn}printf returns the number of characters 
written, excluding the null terminator, so you could 
remember that and use that. Tomayto, tomahto.

>Is this in anyway related to OpenSSL?

Very unlikely. If you get an application level response -ERR 
then your application level request got there.

If the server allows nonSSL access that might be easier 
to debug. Alternatively, try connecting with commandline 
s_client and typing the (few) commands manually. (It's 
not easy to get the CR on terminal input at least on Unix, 
but a Postelian server will likely accept plain-LF.)


__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


POP3 client with OpenSSL issue

2013-04-20 Thread vinay krishna
Hello I am writing a POP3 client in C on ubuntu. I am using OpenSSl I am
stuck in the AUTHORIZATION state! I send the user name and get a success
response, and when i send the password , it always says *-ERR bad command*.
I am sure the password is correct. Since i am using open ssl , wireshark
was of not of much help. Heres how i am sending the password

scanf("%s",password);

sprintf(pass_cmd,"PASS %s\r\n",password);

sent = SSL_write(ssl, pass_cmd, strlen(pass_cmd));

pass_cmd is flushed and cleaned before used in write.The strlen is also
giving a valid size including \r\n

Is this in anyway related to OpenSSL?


Any pointers will be greatly appreciated!!


Openssl issue??

2010-03-31 Thread Govind c
I am trying to to use ftps for secure server. We have two identical 
client trying to connect to the server.Client 1 can connect but not 
client 2. Client 2 throws below error 

error:0D0680A8:asn1 encoding routines:ASN1_CHECK_TLEN:wrong tag 


Openssl on both clients 


openssl-0.9.7a-43.1 
xmlsec1-openssl-1.2.6-3 
openssl-devel-0.9.7a-43.1 


client 1 
--- 


 curl  -3 -v  --ftp-ssl -k -S ftp://abc:xyz...@10.10.10.1 
* About to connect() to 10.10.10.1 port 21 
*   Trying 10.10.10.1... * connected 
* Connected to 10.10.10.1 (10.10.10.1) port 21 
< 220 (vsFTPd 2.0.1) 


> AUTH SSL 


< 234 Proceed with negotiation. 
* successfully set certificate verify locations: 
*   CAfile: /usr/share/ssl/certs/ca-bundle.crt 
  CApath: none 
* SSL connection using DES-CBC3-SHA 
* Server certificate: 
*subject: /C=US/ST=NJ/L=FP/O=test/CN=test.test.com 
*start date: 2010-03-31 04:53:33 GMT 
*expire date: 2011-03-31 04:53:33 GMT 
*common name: test.test.com (does not match '10.10.10.1') 
*issuer: /C=US/ST=NJ/L=FP/O=test/CN=test.test.com 
* SSL certificate verify result: error number 1 (18), continuing 
anyway. 

> USER abc 


< 331 Please specify the password. 

> PASS xyz123 


< 530 Login incorrect. 
* the username and/or the password are incorrect 
* Closing connection #0 

client2 


#  curl  -3 -v  --ftp-ssl -k -S ftp://abc:xyz...@10.10.10.1 
* About to connect() to 10.10.10.1 port 21 
*   Trying 10.10.10.1... * connected 
* Connected to 10.10.10.1 (10.10.10.1) port 21 
< 220 (vsFTPd 2.0.1) 


> AUTH SSL 


< 234 Proceed with negotiation. 
* successfully set certificate verify locations: 
*   CAfile: /usr/share/ssl/certs/ca-bundle.crt 
  CApath: none 
* error:0D0680A8:asn1 encoding routines:ASN1_CHECK_TLEN:wrong tag 
* Closing connection #0 

Cheers 
CG 





  
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Reg: openSSL issue with Apache Server

2008-03-18 Thread K, Karunamurthy
Hi Team,
We have upgraded our openssl from 0.9.7 to 0.9.8 version. 

The OS on the system is Solaris 8.

We have complied the Apache Webserver [ 1.3.29 ] with 0.9.7, I suppose. 

We have rebooted the whole Hardware server and while starting the apache, we 
are getting the following error.

Error Message:
Syntax error on line 208 of /opt/semagix/apache/conf/httpd.conf:
Cannot load /opt/semagix/apache/libexec/libssl.so into server: ld.so.1: 
libhttpd.ep: fatal: libssl.so.0.9.7: open failed: No such file or directory


Could you help us regarding...

The line no : 208 on the apache configuration file is 

207 
208 LoadModule ssl_module libexec/libssl.so
209 

LD_LIBRARY_PATH - has /usr/local/ssl/lib path

Thanks and Regards, 
Karunamurthy K., 
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Recall: Reg: openSSL issue with Apache Server

2008-03-18 Thread K, Karunamurthy
The sender would like to recall the message, "Reg: openSSL issue with Apache 
Server".
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


RE: What is an OpenSSL issue (was Re[2]: Vista 64 bit)

2008-01-03 Thread David Schwartz


smime.p7m
Description: S/MIME encrypted message


Re: What is an OpenSSL issue (was Re[2]: Vista 64 bit)

2008-01-03 Thread Jeffrey Altman
David Schwartz wrote:
> However, they generally require particular versions of OpenSSL or particular
> build environments. They impose their own requirements. If you can state and
> explain these requirements and reduce your question to one that is actually
> about OpenSSL, then I agree with you.
And yet there are folks like Thomas Hruska who are distributing
installer packages for end users (not developers) that are claimed to be
the "official OpenSSL win32 binary" and application developers who don't
want to link to crypto code because they are afraid of the legal issues
surrounding crypto in some countries.

Now when a user is told by their application documentation to go get
OpenSSL and install it and there is someone claiming  to provide the
official build and there are packages specifically for non-developers,
what are you expecting the non-developer users to do when they have a
question?

The application developer doesn't know enough to realize that they need
to be careful about the OpenSSL version they use.  The application
developer wants to treat OpenSSL just like any other package that can be
installed such as Kerberos or Perl.  When they have a question they are
going to come to the folks that developed the software they have a
question about.

Now perhaps the question should have been sent to Thomas Hruska because
he distributes the builds he claims are official but when someone looks
for OpenSSL they see the OpenSSL Users mailing list as free and Thomas'
support costs money.  Where do you think the user will go first?

The best you can do is try to give end users a message to send back to
the application developer and at the same time attempt to answer their
question or point them at the "official" distributors and let Thomas
deal with the fallout.

Jeffrey Altman



smime.p7s
Description: S/MIME Cryptographic Signature


RE: What is an OpenSSL issue (was Re[2]: Vista 64 bit)

2008-01-02 Thread David Schwartz

> > OpenSSL is *NOT* intended to be 'used' by people who use
> > programs that use
> > it. It is intended to be used by programs and by people who make them.

> I'll stick my 0.01 euro cent in here and state i disagree with this
> hypothesis.  whether you are a user via a 3rd party program (as almost
> all users of openssl are!) or are directly using openssl as a developer
> both camps and parties should be catered for - especially
> as a lot of apps that use openssl really only look for the DLL
> or shared library - or, if built from source, the required dev libraries
> and link libraries.

However, they generally require particular versions of OpenSSL or particular
build environments. They impose their own requirements. If you can state and
explain these requirements and reduce your question to one that is actually
about OpenSSL, then I agree with you.

OpenSSL explicitly is *not* a stable library such that you can make library
upgrades without consideration application details -- other than withing the
same minor version to fix specific security issues. If a post is about a
specific known OpenSSL security issue, and the issue is how to fix that
issue within the minor version required by the application, that would be an
OpenSSL issue.

Even then, it may be dangerous to do that if the application contains its
own workaround to that same issue. Or the application may not even use the
part of OpenSSL that has the vulnerability, making the exercise pointless.
This should still, in most cases, be treated as an application issue first.
If it is handled as an OpenSSL issue, that should be by one of the
application's developers, not a mere user.

> either type of user may be intersted in such things as keeping an
> up-to-date version for security - or ways of configuring it for
> better speed, performance or security settings.

That's true. I agree, my position as stated is a bit too harsh. I disagree
about security settings though, those are application issues, not library
issues. It's dangerous to treat them as library issues.

A security issue should not be fixed without the presence of *someone* with
detailed understanding of how the application uses OpenSSL. An actual user
(in the sense of application developer) of the library needs to do this to
be sure it's done properly. Even OpenSSL experts would either have to
familiarize themselves with the application or do a lot of guessing.
Guessing in the security field is bad.

DS


__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Openssl issue with embedded linux - monavista

2007-03-05 Thread Prasanna

Hello,
  I am using openssl 0.9.8a with SSL support.
When I call SSL_CTX_free() when we close HTTP Session the openssl stack 
causes segmentation fault.
in crypto/stack/stck.c in function sk_pop_free() the ht->num has some 
junk value. whihc causes the segfault.


When we used openssl 0.9.7d we never entered the for look present in 
sk_pop_free funtion.

Any fix for this.
Kindly elt me know if you need any further information about my setup
Regards
Prasanna

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: OpenSSL issue with xsupplicant

2005-08-08 Thread Shane Stixrud

On Mon, 8 Aug 2005, Michael Wang wrote:


On 8/6/05, Shane Stixrud <[EMAIL PROTECTED]> wrote:

I am attempting to use xsupplicant to connect my fedora 4 laptop to a Open
/ static wep / eap-tls enabled cisco wireless network with Cisco ACS
radius server and a Microsoft CA, everything works fine if I just use wep
and avoid EAP-TLS.

My xsupplicant configuration files seems to be correct, however my
authentication requests fail during an openssl handshake to my radius
server with the following error:

[AUTH TYPE]  --- SSL_verify : depth 1
[AUTH TYPE]  --- SSL_verify error : num=19:self signed certificate in
certificate chain:depth=1:/DC=org/DC=vmmc/DC=vmad/CN=vmad1
[AUTH TYPE]  --- SSL : SSLv3 read server certificate B
[AUTH TYPE]  --- ALERT : unknown CA
[AUTH TYPE]  --- SSL : SSLv3 read server certificate B
OpenSSL Error -- error:14090086:SSL
routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
Failure!



Look at your eap.conf, section tls, CA_file parameter.

Is CA_file pointing to the certificate of the CA that signed your user
certificate?


It seems so:

default
{
 allow_types = eap_tls
 identity = spgsrs-laptop
 eap_tls {
 user_cert = /etc/xsupplicant/cert.cer
 user_key  = /etc/xsupplicant/key.pem
 user_key_pass = XX
 root_cert = /etc/xsupplicant/root/vm.pem
 crl_dir = /etc/xsupplicant/crl
 chunk_size = 1398
 random_file = /dev/urandom
  }
}

[EMAIL PROTECTED] ~]# openssl x509 -noout -issuer -in 
/etc/xsupplicant/root/vm.pem

issuer= /DC=org/DC=vmmc/DC=vmad/CN=vmad1

[EMAIL PROTECTED] ~]# openssl x509 -noout -issuer -in 
/etc/xsupplicant/key.pem

issuer= /DC=org/DC=vmmc/DC=vmad/CN=vmad1

Thanks,
Shane
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: OpenSSL issue with xsupplicant

2005-08-08 Thread Michael Wang
On 8/6/05, Shane Stixrud <[EMAIL PROTECTED]> wrote:
> I am attempting to use xsupplicant to connect my fedora 4 laptop to a Open
> / static wep / eap-tls enabled cisco wireless network with Cisco ACS
> radius server and a Microsoft CA, everything works fine if I just use wep
> and avoid EAP-TLS.
> 
> My xsupplicant configuration files seems to be correct, however my
> authentication requests fail during an openssl handshake to my radius
> server with the following error:
> 
> [AUTH TYPE]  --- SSL_verify : depth 1
> [AUTH TYPE]  --- SSL_verify error : num=19:self signed certificate in
> certificate chain:depth=1:/DC=org/DC=vmmc/DC=vmad/CN=vmad1
> [AUTH TYPE]  --- SSL : SSLv3 read server certificate B
> [AUTH TYPE]  --- ALERT : unknown CA
> [AUTH TYPE]  --- SSL : SSLv3 read server certificate B
> OpenSSL Error -- error:14090086:SSL
> routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
> Failure!
> 

Look at your eap.conf, section tls, CA_file parameter.

Is CA_file pointing to the certificate of the CA that signed your user
certificate?

Michael
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


OpenSSL issue with xsupplicant

2005-08-06 Thread Shane Stixrud
I am attempting to use xsupplicant to connect my fedora 4 laptop to a Open 
/ static wep / eap-tls enabled cisco wireless network with Cisco ACS 
radius server and a Microsoft CA, everything works fine if I just use wep 
and avoid EAP-TLS.


My xsupplicant configuration files seems to be correct, however my
authentication requests fail during an openssl handshake to my radius 
server with the following error:


[AUTH TYPE]  --- SSL_verify : depth 1
[AUTH TYPE]  --- SSL_verify error : num=19:self signed certificate in
certificate chain:depth=1:/DC=org/DC=vmmc/DC=vmad/CN=vmad1
[AUTH TYPE]  --- SSL : SSLv3 read server certificate B
[AUTH TYPE]  --- ALERT : unknown CA
[AUTH TYPE]  --- SSL : SSLv3 read server certificate B
OpenSSL Error -- error:14090086:SSL
routines:SSL3_GET_SERVER_CERTIFICATE:certificate verify failed
Failure!

This seems to be a common error for many programs that use openssl. I
attempted to solve this by adding our Microsoft cert to /etc/pki/tls/certs
as a hash.  This change did allow openssl verify to confirm the 
certificate without error but did have any affect on 
xsupplicant.


I would think the above change would behave similarly to adding our
Microsoft CA to our Windows XP clients "Trusted root certificate
authorities" list on Windows, but it does not appear so.

Any suggestions would be most welcome.

Cheers,
Shane
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]