Re: [openssl.org #3494] Possible sign bit bug in openssl 1.0.1i handling of 128-bit serial numbers

2014-09-01 Thread Igor Levicki
I fail to see how it is not wrong to get 17 bytes instead of 16 you requested in the certificate? -- Regards, Igor On 01.09.2014. 23:21, Rich Salz via RT wrote: This is not wrong. Serial numbers are unsigned, and the leading zero byte is to avoid confusing the high-bit with a sign bit. -- Rich

RE: [openssl.org #3494] Possible sign bit bug in openssl 1.0.1i handling of 128-bit serial numbers

2014-09-01 Thread Salz, Rich
It is wrong because the 16 bytes wil be interpreted as a negative number and that's not allowed so you have to put a leading 0 byte there. -- Principal Security Engineer Akamai Technologies, Cambridge MA IM: rs...@jabber.me Twitter: RichSalz

Re: [openssl.org #3494] Possible sign bit bug in openssl 1.0.1i handling of 128-bit serial numbers

2014-09-01 Thread Igor Levicki via RT
I fail to see how it is not wrong to get 17 bytes instead of 16 you requested in the certificate? -- Regards, Igor On 01.09.2014. 23:21, Rich Salz via RT wrote: > This is not wrong. Serial numbers are unsigned, and the leading zero byte is > to > avoid confusing the high-bit with a sign bit. > -

[openssl.org #3473] Long SNI names are rejected in client code

2014-09-01 Thread Rich Salz via RT
The s_server accepts a very long name because all it is doing is comparing the name you specify on the command-line to whatever the client sends. I am more worried about jerks DoS'ing a server by sending 65K of SNI name, than I am worried about someone having a valid reason for more than 256 bytes

[openssl.org #3494] Possible sign bit bug in openssl 1.0.1i handling of 128-bit serial numbers

2014-09-01 Thread Rich Salz via RT
This is not wrong. Serial numbers are unsigned, and the leading zero byte is to avoid confusing the high-bit with a sign bit. -- Rich Salz, OpenSSL dev team; rs...@openssl.org __ OpenSSL Project htt

Re: [openssl.org #3512] SSL_MODE_ENABLE_PARTIAL_WRITE does not work in DTLS

2014-09-01 Thread Iñaki Baz Castillo
2014-09-01 15:42 GMT+02:00 Salz, Rich : > The size of your UDP packet depends on the MTU supported by everyone along > the path. (BTW, that's what heartbeat was created.) Yes, it is understood now. But, given that DTLS provides reliability and message order, it makes sense IMHO that SSL_write(lo

RE: apps/ts.c patch - engine support

2014-09-01 Thread Salz, Rich
> Of no less importance is to emphasise that it adds additional "keyform" > parameter to functions defined in ts.c and utilized by "-reply" function, that > will *break* compatibility with any previously existing code. How does it break? We don't care about source-level compatibility within the

RE: openssl 1.0.1i ignores ciphers in cipherlist

2014-09-01 Thread Salz, Rich
If Frank doesn't want SSLv2 then he needs to disable it in the SSL_CTX first, no? The mechanism to say what ciphers you want is orthogonal to the mechanism to say what protcols you want. That's unfortunate and a source of confusion, but is unlikely to change any time soon. -- Principal Secu

RE: [openssl.org #2665] s_client support for starttls ldap

2014-09-01 Thread Salz, Rich
My point is that since stunnel has a different goal of wrapping almost any protocol, that might be a better place for it, rather than going down the slippery slope of putting a binary hack into s_client which wouldn't let you actually USE the protocol. __

Re: openssl 1.0.1i ignores ciphers in cipherlist

2014-09-01 Thread Daniel Kahn Gillmor
On 08/29/2014 08:16 AM, Tomas Mraz wrote: > On Pá, 2014-08-29 at 16:19 +0200, Frank Meier wrote: >> While testing different ciphersuites I found a quite drastic change in >> the behavior between openssl version 1.0.1h to 1.0.1i. While using a >> cipherlist like "ECDHE-RSA-AES128-SHA256:RC4" with

Re: [openssl.org #2665] s_client support for starttls ldap

2014-09-01 Thread Viktor Dukhovni
On Mon, Sep 01, 2014 at 09:40:55AM -0400, Salz, Rich wrote: > What about usoing stunnel? Stunnel's STARTTLS support does not include LDAP as the initial protocol. -- Viktor. __ OpenSSL Project

RE: [openssl.org #3512] SSL_MODE_ENABLE_PARTIAL_WRITE does not work in DTLS

2014-09-01 Thread Salz, Rich
You can't use partial writes. The size of your UDP packet depends on the MTU supported by everyone along the path. (BTW, that's what heartbeat was created.) I suggest you get your program working "properly" for your definition of what properly means, without DTLS. Then add DTLS. And have you

RE: [openssl.org #2665] s_client support for starttls ldap

2014-09-01 Thread Salz, Rich
What about usoing stunnel?

Re: [openssl.org #2665] s_client support for starttls ldap

2014-09-01 Thread Hubert Kario
- Original Message - > From: "Rich Salz via RT" > To: r...@king7.com > Cc: openssl-dev@openssl.org > Sent: Wednesday, August 27, 2014 5:39:33 AM > Subject: [openssl.org #2665] s_client support for starttls ldap > > s_client is really for text-based protocols only. It still would be usefu

apps/ts.c patch - engine support

2014-09-01 Thread Damir Dzeko Antic
Dear Dev team, Regarding "engine" support in timestamping (ts) app, I find it has compatibility issues with the rest of OpenSSL. That is why I took some patches that were applicable to o.9.8 version and adapted them to the current git-head. I'm not the only contributor to this patch, there are

[openssl.org #3512] SSL_MODE_ENABLE_PARTIAL_WRITE does not work in DTLS

2014-09-01 Thread Iñaki Baz Castillo via RT
SSL in DTLS mode. SSL_CTX with SSL_MODE_ENABLE_PARTIAL_WRITE option enabled so SSL_write() may return less than the given data length. It does not work. I call SSL_write() by passing a very long data (65536) and it still returns -1. So, in case I want to write a big data over a DTLS UDP connection

Re: openssl 1.0.1i ignores ciphers in cipherlist

2014-09-01 Thread Frank Meier
On 29/08/14 17:12, Viktor Dukhovni wrote: I retestet with "-no_ssl2" option and then the ECDHE ciphers are used again. Applications should these days employ "SSL_OP_NO_SSLv2", I agree, but then openssl should set this option by default also. _