[openssl-dev] X11 forwarding not working.

2015-05-22 Thread dE
Hi! I'm having a difficult time getting X11 forwarding to work. Since I've read the docs completely about this, this must be an SSH bug which is likely because I'm using Gentoo as the SSH server. When trying to forward X11 connections, I get X11 connection rejected because of wrong authentic

[openssl-dev] [openssl.org #266] [PATCH] Proposed proxy client functionality in s_client

2015-05-22 Thread Rich Salz via RT
Thanks for your patience ;) This will be in the next release of openssl; it is checked into master. -- Rich Salz, OpenSSL dev team; rs...@openssl.org ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

[openssl-dev] [openssl.org #266] Resolved: [PATCH] Proposed proxy client functionality in s_client

2015-05-22 Thread Rich Salz via RT
According to our records, your request has been resolved. If you have any further questions or concerns, please respond to this message. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

[openssl-dev] [openssl.org #3858] [PATCH] fix copy paste error in ec_GF2m function prototypes

2015-05-22 Thread Billy Brumley via RT
Just removes some duplication in the header file. Patch attached. BBB >From ad6f09994d0cb2dd49d7356cff1dcf294d908f3f Mon Sep 17 00:00:00 2001 From: Billy Brumley Date: Fri, 22 May 2015 17:44:49 +0300 Subject: [PATCH] fix copy paste error in ec_GF2m function prototypes --- crypto/ec/ec_lcl.h |

Re: [openssl-dev] What key length is used for DHE by default ?

2015-05-22 Thread Rainer Jung
Am 22.05.2015 um 18:32 schrieb Nayna Jain: Ok, I think this is what I didn't know. I was using openssl 1.0.1g client. I still didn't have openssl 1.0.2 . If it were trivial I think showing the temp key size would be a welcome backport to 1.0.1 before the next release. It is very useful in lig

Re: [openssl-dev] What key length is used for DHE by default ?

2015-05-22 Thread Nayna Jain
Ok, I think this is what I didn't know. I was using openssl 1.0.1g client. I still didn't have openssl 1.0.2 . Thanks.. Thanks & Regards, Nayna Jain From: "Salz, Rich" To: "openssl-dev@openssl.org" Date: 05/22/2015 09:31 PM Subject:Re: [openssl-dev] What key length is used f

Re: [openssl-dev] What key length is used for DHE by default ?

2015-05-22 Thread Salz, Rich
Did you follow the full instructions - using a 1.0.2 openssl client? The blog posting is pretty clear. https://www.openssl.org/blog/blog/2015/05/20/logjam-freak-upcoming-changes/ ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailm

Re: [openssl-dev] What key length is used for DHE by default ?

2015-05-22 Thread Nayna Jain
Hi Hubert, Thanks.. I tried the command you mentioned i.e. openssl s_client -connect hostname:443 -cipher EDH /dev/null | grep 'Server Temp Key' But it didn't output anything. Thanks & Regards, Nayna Jain From: Hubert Kario To: openssl-dev@openssl.org Cc: Nayna Jain/India/IBM@IB

Re: [openssl-dev] What key length is used for DHE by default ?

2015-05-22 Thread Hubert Kario
On Friday 22 May 2015 15:41:09 Nayna Jain wrote: > Hi, > > With the latest logjam attack, as I was trying to verify if my server > (lighttpd) accepts DHE_xxx ciphers, I saw that it accepted and I didn't > do any configuration setting done for DH parameters explicitly. There's no default in Open

[openssl-dev] What key length is used for DHE by default ?

2015-05-22 Thread Nayna Jain
Hi, With the latest logjam attack, as I was trying to verify if my server (lighttpd) accepts DHE_xxx ciphers, I saw that it accepted and I didn't do any configuration setting done for DH parameters explicitly. But I couldn't verify what is the key length did it use by default 512/1024/2048 ?

[openssl-dev] [openssl.org #2801] Lost alert if client receives bad hello in dtls1_read_bytes

2015-05-22 Thread Matt Caswell via RT
Patch applied. Many thanks. Matt ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

[openssl-dev] [openssl.org #3857] hash files for validating source are incorrectly formed

2015-05-22 Thread Quanah Gibson-Mount via RT
The hash files (md5, sha1) for validating downloaded source are not correclty formed, breaking the check (-c) function: wget https://www.openssl.org/source/openssl-1.0.1m.tar.gz wget https://www.openssl.org/source/openssl-1.0.1m.tar.gz.sha1 build@c7test:~/p4/zimbra/main/ThirdParty/openssl/src$ sh