Re: [openssl.org #3516] OCSP Certificate Chain Response Handling

2014-09-09 Thread Rob Stradling
Duplicate of #2206 ? On 05/09/14 08:35, Mehner, Carl via RT wrote: OCSP response handling in /apps/ocsp.c -- 2014-06-25 The OCSP Documentation States https://www.openssl.org/docs/apps/ocsp.html Otherwise the OCSP responder certificate's CA is checked against the issuing CA certificate

Re: [openssl.org #2354] [PATCH] Increase Default RSA Key Size to 2048-bits

2014-09-09 Thread Rob Stradling
This can presumably be resolved as fixed, given the commit on #2626 just now. On 29/09/10 20:54, Rob Stradling via RT wrote: NIST (SP800-57 Part 1) recommends a minimum RSA key size of 2048-bits beyond 2010. From January 1st 2011, in order to comply with the current Microsoft[1] and

[openssl.org #3519] BUG: incorrect handling of 'CAfile' and 'CApath' defaults

2014-09-09 Thread Mihaly Barasz via RT
Please, see my pull request on GitHub: https://github.com/openssl/openssl/pull/170 Description from the pull request: This commit has security implications for simple clients that use openssl s_client. To demostrate the issue described in the commit message do: openssl s_client -connect

[openssl.org #3520] [PATCH] 1.0.1e: Configure: Correctly Handle GCC/clang/LLVM -arch and -isysroot Options

2014-09-09 Thread Grant Erickson via RT
Correctly handle '-arch' and '-isysroot' GCC/clang/LLVM options when compiling for Mac OS X or iOS using targets such as BSD-generic32 in which the external environment passes in the processor architecture and toolchain root. --- openssl/Configure | 12 +++- 1 file changed, 11

[openssl.org #3521] [PATCH] 1.0.1e: Configure: Correctly Handle GCC --sysroot Option

2014-09-09 Thread Grant Erickson via RT
Correctly handle '--sysroot' GCC toolchain option when compiling for the Android NDK using targets such as linux-generic32 in which the external environment passes in the toolchain root. --- openssl/Configure | 4 1 file changed, 4 insertions(+) diff --git a/openssl/Configure

[openssl.org #3522] [PATCH] 1.0.1e: Configure: Allow the apps, test and tools directories to be configured out of DIRS.

2014-09-09 Thread Grant Erickson via RT
In exceedingly minimal libcrypto-only configurations of OpenSSL such as: no-lock no-threads no-shared no-zlib no-idea no-camellia no-seed no-bf no-cast no-des no-rc2 no-rc4 no-rc5 no-md2 no-md4 no-ripemd no-mdc2 no-rsa no-dsa no-dh no-whirlpool no-cms no-dgram no-sock no-ssl2

Re: OPenssl 20140909 issues

2014-09-09 Thread Mike Bland
doctor.nl2k.ab.ca//usr/source/openssl-1.0.2-stable-SNAP-20140909$ make test testing... (cd ..; make DIRS=crypto all) making all in crypto... ar r ../libcrypto.a cryptlib.o mem.o mem_dbg.o cversion.o ex_data.o cpt_err.o ebcdic.o uid.o o_time.o o_str.o o_dir.o o_fips.o o_init.o fips_ers.o

Re: OPenssl 20140909 issues

2014-09-09 Thread Viktor Dukhovni
On Mon, Sep 08, 2014 at 11:41:42PM -0600, The Doctor wrote: ls: error initializing month strings The literal string month does not appear in OpenSSL 1.0.2 source code. You're probably compiling in a locale not supported by your system. ls -l is unable to format the date. -- Viktor.

[openssl.org #2642] Bug Report: s_client uses forged/blacklisted EHLO hostname in smtp

2014-09-09 Thread Rich Salz via RT
Fixed in https://github.com/akamai/openssl/tree/rsalz-monolith/apps to be part of post-1.0.2 commit 90899ae82e14ecbfbeac6fc47757470f9a0a9b80 Author: Rich Salz rs...@akamai.com Date: Tue Sep 9 10:22:01 2014 -0400 RT2642: Allow EHLO hostname to be specified. Add -smtphost flag, to specify the

[openssl.org #3519] BUG: incorrect handling of 'CAfile' and 'CApath' defaults

2014-09-09 Thread Rich Salz via RT
This is a duplicate of RT2936, fixed in https://github.com/akamai/openssl/tree/rsalz-monolith which will be part of post-1.0.2 commit 3938694b2a770efad980c947b68981b110e784d6 Author: Rich Salz rs...@akamai.com Date: Fri Aug 15 14:27:04 2014 -0400 PR 2936, etc: Consistently use default cert dir

[openssl.org #2932] smime cmdline utility ignores errors

2014-09-09 Thread Rich Salz via RT
Fixed in https://github.com/akamai/openssl/tree/rsalz-monolith/apps for inclusion after 1.0.2 (The RAND_xxx issue was already fixed) commit 16365c8dc390e1cb29a4f64c9b3450d89532a960 Author: Dmitry Belyavsky beld...@gmail.com Date: Tue Sep 9 12:09:32 2014 -0400 RT2932: Catch write errors Don't

[openssl.org #2956] incomplete archive

2014-09-09 Thread Rich Salz via RT
the link's good now. -- Rich Salz, OpenSSL dev team; rs...@openssl.org __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated

[openssl.org #2991] Certifacte verification with a RSA-SHA512 hash algorithm fails

2014-09-09 Thread Rich Salz via RT
SLS_library_init only loads the algorithms needed by SSL/TLS ciphersuites. -- Rich Salz, OpenSSL dev team; rs...@openssl.org __ OpenSSL Project http://www.openssl.org Development Mailing List

[openssl.org #2966] OpenSsl Library crashed,

2014-09-09 Thread Rich Salz via RT
Not enough information to reproduce the problem. Most likely application bug that is romping on memory. -- Rich Salz, OpenSSL dev team; rs...@openssl.org __ OpenSSL Project http://www.openssl.org

[openssl.org #2982] Security Advisory as of 2013-02-05

2014-09-09 Thread Rich Salz via RT
Right, 1.0.1d had an error in the fix. Update the advisory to point to 1.0.1e or later. -- Rich Salz, OpenSSL dev team; rs...@openssl.org __ OpenSSL Project http://www.openssl.org Development

[openssl.org #2938] [PATCH] Severe resource leak in tls_P_hash() (v1.0.1 and up)

2014-09-09 Thread Rich Salz via RT
From an internal review of the patch: Contexts are meant to be reused and (for example) reusing the same context and digest avoids having to reallocate a buffer for the internal context structure. I think this might actually be a problem in the ENGINE not handling reuse properly, or the EVP API

[openssl.org #3263] BUG: loading a config file from a drive with no media results in exit(1)

2014-09-09 Thread Rich Salz via RT
OPENSSL_config is a very simple-minded API. If the config file is on a drive that isn't available, and since the API exits on error, it's working as designed. Closing ticket. -- Rich Salz, OpenSSL dev team; rs...@openssl.org __

[openssl.org #3506] [PATCH] Fix typos in ssltest.c.

2014-09-09 Thread Rich Salz via RT
Fixed in master and 1.0.2 OpenSSL_1_0_2-stable 283a8fd RT3506: typo's in ssltest HEAD 4eadd11 RT3506: typo's in ssltest Author: Kurt Cancemi k...@x64architecture.com Date: Tue Sep 9 13:48:00 2014 -0400 RT3506: typo's in ssltest Reviewed-by: Dr. Stephen Henson st...@openssl.org -- Rich Salz,

[openssl.org #1766] [PATCH] s_client -reconnect and -starttls don't work together

2014-09-09 Thread Rich Salz via RT
Fixed in https://github.com/akamai/openssl/tree/rsalz-monolith/apps to be intergrated after 1.0.2 commit 07cae301ea569173e18ae585caa1457660baf024 Author: John Gardiner Myers jgmy...@proofpoint.com Date: Tue Sep 9 14:12:42 2014 -0400 RT1766: s_client -reconnect and -starttls broke Using both

[openssl.org #2100] RAND_poll can be incredibly slow on Windows7 due to Heap32Next

2014-09-09 Thread Rich Salz via RT
timer-limiting for windows heap-walking, etc., seems to have been implemented some time ago. Closing ticket. -- Rich Salz, OpenSSL dev team; rs...@openssl.org __ OpenSSL Project

[openssl.org #2176] OPENSSL_ia32cap_loc() inconsistent

2014-09-09 Thread Rich Salz via RT
This incompatible change was made five years ago; nothing to do now. Closing ticket. -- Rich Salz, OpenSSL dev team; rs...@openssl.org __ OpenSSL Project http://www.openssl.org Development Mailing

Re: [openssl.org #2938] [PATCH] Severe resource leak in tls_P_hash() (v1.0.1 and up)

2014-09-09 Thread Andrey Kulikov via RT
Indeed, Improved version of the patch are in: [openssl.org #2937] Handshake performance degradation in 1.0.1 and up. On 9 September 2014 21:16, Rich Salz via RT r...@openssl.org wrote: From an internal review of the patch: Contexts are meant to be reused and (for example) reusing the same

Re: [openssl.org #2938] [PATCH] Severe resource leak in tls_P_hash() (v1.0.1 and up)

2014-09-09 Thread Andrey Kulikov
Indeed, Improved version of the patch are in: [openssl.org #2937] Handshake performance degradation in 1.0.1 and up. On 9 September 2014 21:16, Rich Salz via RT r...@openssl.org wrote: From an internal review of the patch: Contexts are meant to be reused and (for example) reusing the same

Re: [openssl.org #3502] nameConstraints bypass bug: a fix, or some approximation thereto

2014-09-09 Thread John Denker via RT
On 08/22/2014 12:26 PM, Salz, Rich wrote: It'd be good to fix this. Behold a patch that seems to fix it: https://www.av8n.com/openssl/bypass-bugfix.diff The code seems pretty straightforward to me, but on the other hand, I have very little experience coding in the openssl environment, so I

[openssl.org #1909] bug report: OpenSSL can generate invalid version 1 certificates

2014-09-09 Thread Rich Salz via RT
OpenSSL_1_0_2-stable 8c0d19d RT1909: Omit version for v1 certificates HEAD 1f18f50 RT1909: Omit version for v1 certificates Author: Geoff Keating geo...@apple.com Date: Tue Sep 9 14:28:54 2014 -0400 RT1909: Omit version for v1 certificates When calling X509_set_version to set v1 certificate,

[openssl.org #2938] [PATCH] Severe resource leak in tls_P_hash() (v1.0.1 and up)

2014-09-09 Thread Rich Salz via RT
Closing this in favor of 2937 -- Rich Salz, OpenSSL dev team; rs...@openssl.org __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org

[openssl.org #1165] Bug Report

2014-09-09 Thread Rich Salz via RT
Not enough information to reproduce the defect, closing the ticket. -- Rich Salz, OpenSSL dev team; rs...@openssl.org __ OpenSSL Project http://www.openssl.org Development Mailing List

[openssl.org #2560] missing NULL pointer check in ocsp_req_find_signer

2014-09-09 Thread Rich Salz via RT
This can't happen. It's an internal function and never gets NULL -- Rich Salz, OpenSSL dev team; rs...@openssl.org __ OpenSSL Project http://www.openssl.org Development Mailing List

[openssl.org #2519] crash when using newly-defined ASN1_SEQUENCE macros in Windows with elements that are also newly-defined SEQUENCEs...

2014-09-09 Thread Rich Salz via RT
Local config error. -- Rich Salz, OpenSSL dev team; rs...@openssl.org __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List

[openssl.org #2537] potential use of uninitialized variable in x509_lu.c

2014-09-09 Thread Rich Salz via RT
The analysis seems wrong, getting confused by the union. closing ticket. -- Rich Salz, OpenSSL dev team; rs...@openssl.org __ OpenSSL Project http://www.openssl.org Development Mailing List

[openssl.org #2570] Timing related bug in openssl pkcs

2014-09-09 Thread Rich Salz via RT
sorry, you can't use stdin twice. we have no control over system buffering, among other things. closing file. -- Rich Salz, OpenSSL dev team; rs...@openssl.org __ OpenSSL Project

[openssl.org #2503] openssl-1.0.0d build bug ? i686 build does not define AES_unwrap_key and other symbols on x86_64

2014-09-09 Thread Rich Salz via RT
Local error. Other tickets are tracking makefile changes, so closing this one. -- Rich Salz, OpenSSL dev team; rs...@openssl.org __ OpenSSL Project http://www.openssl.org Development Mailing List

[openssl.org #2629] finalize MD2 removal

2014-09-09 Thread Rich Salz via RT
fixed earlier on https://github.com/akamai/openssl/tree/rsalz-monolith -- Rich Salz, OpenSSL dev team; rs...@openssl.org __ OpenSSL Project http://www.openssl.org Development Mailing List

[openssl.org #3512] SSL_MODE_ENABLE_PARTIAL_WRITE does not work in DTLS

2014-09-09 Thread Rich Salz via RT
Partial writes don't work for UDP. -- Rich Salz, OpenSSL dev team; rs...@openssl.org __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org

[openssl.org #3271] OpenSSL 1.0.2 Beta 1 Solaris 10 Sparc Shell error during make install

2014-09-09 Thread Rich Salz via RT
OpenSSL_1_0_2-stable e61c648 RT3271: Don't use if ! in shell lines HEAD b999f66 RT3271: Don't use if ! in shell lines Merge: 843921f b999f66 Author: Rich Salz rs...@openssl.org Date: Tue Sep 9 17:06:40 2014 -0400 Merge branch 'master' of git.openssl.org:openssl Previous commit was reviewed by

[openssl.org #3192] [PATCH] Fix spurious error in DSA verification failure

2014-09-09 Thread Rich Salz via RT
OpenSSL_1_0_2-stable f33ce36 RT3192: spurious error in DSA verify HEAD eb63bce RT3192: spurious error in DSA verify Author: Matt Caswell m...@openssl.org Date: Tue Sep 9 16:50:06 2014 -0400 RT3192: spurious error in DSA verify This is funny; Ben commented in the source, Matt opend a ticket, and

[openssl.org #2196] openssl1.0.0beta5 problems on FreeBSD

2014-09-09 Thread Rich Salz via RT
The perl issues aren't reproducible; maybe fixed now if there was a problem. Make issues are being tracked in (several) other tickets. The README/rt issue is fixed: OpenSSL_1_0_2-stable 3aa2d2d RT2196: Clear up some README wording HEAD 468ab1c RT2196: Clear up some README wording Author: Rich

Re: [openssl.org #2962] [patch] openssl s_{client,server} improvements for Kerberos

2014-09-09 Thread Richard Silverman via RT
On Tue, 9 Sep 2014, Rich Salz via RT wrote: Fixed in https://github.com/akamai/openssl/tree/rsalz-monolith/apps for integration after 1.0.2 commit f4f79df1a2e1d295e93afe68691499ec034b76ad Author: Richard Silverman r...@qoxp.net Date: Tue Sep 9 12:37:27 2014 -0400 RT2962: add -keytab and