[ANNOUNCE] OpenSSL 0.9.7c and 0.9.6k released

2003-09-30 Thread Mark J Cox
ar.gz Yours, The OpenSSL Project Team... Mark J. Cox Ben Laurie Andy Polyakov Ralf S. Engelschall Richard Levitte Geoff Thorpe Dr. Stephen Henson Bodo Möller Lutz JänickeUlf Möller -BEGIN PGP SIGNATURE- Version: G

[OpenSSL Advisory] Vulnerabilities in ASN.1 parsing

2003-09-30 Thread Mark J Cox
-BEGIN PGP SIGNED MESSAGE- OpenSSL Security Advisory [30 September 2003] Vulnerabilities in ASN.1 parsing NISCC (www.niscc.gov.uk) prepared a test suite to check the operation of SSL/TLS software when presented with a wide range of malformed client certif

[OpenSSL Advisory] Denial of Service in ASN.1 parsing

2003-11-04 Thread Mark J Cox
-BEGIN PGP SIGNED MESSAGE- OpenSSL Security Advisory [4 November 2003] Denial of Service in ASN.1 parsing == Previously, OpenSSL 0.9.6k was released on the 30 September 2003 to address various ASN.1 issues. The issues were found using a test suite from NI

New OpenSSL releases fix denial of service attacks [17 March 2004]

2004-03-17 Thread Mark J Cox
-BEGIN PGP SIGNED MESSAGE- OpenSSL Security Advisory [17 March 2004] Updated versions of OpenSSL are now available which correct two security issues: 1. Null-pointer assignment during SSL handshake === Testing performed by the OpenSSL group

OpenSSL 0.9.7e released

2004-10-25 Thread Mark J Cox
following command: openssl md5 < openssl-0.9.7e.tar.gz Yours, The OpenSSL Project Team... Mark J. Cox Ben Laurie Andy Polyakov Ralf S. Engelschall Richard Levitte Geoff Thorpe Dr. Stephen Henson Bodo Möller Lutz Jänicke

Re: Final www.openssl.org website

1998-12-30 Thread Mark J Cox
> Ok, after I've not established the project environment for us, I've now spent > two days in front of Photoshop and WML and created the (hopefully) final In general the new design is really neat; a few minor niggles however: The second layer of menus are not obvious; when you select about you g

Interesting verify problem

1999-01-20 Thread Mark J Cox
I've found some fun bug in OpenSSL that I'll work through later. This only seems to be happening in SSLeay 0.9.1b and anything onwards although I've not yet tried earlier versions yet apart from 0.8.0d (which works). ./openssl s_client -connect www.ukweb.com:443 -CAfile cacert.pem 15929:error:

Re: Interesting verify problem

1999-01-21 Thread Mark J Cox
BN_RECURSION in bn.org. Mark Mark J Cox, . www.awe.com/~mark Latest news on the Apache Web Server ... www.apacheweek.com __ OpenSSL Project

TLSv1 rollback changes

1999-01-31 Thread Mark J Cox
In going through our internal code I came across some changes that we should look at putting into OpenSSL. I've attached a large DIFF against the current CVS tree (all changes in the /ssl/ directory). "This patch is a fix so that the version number in the master secret, when passed via RSA, chec

Re: TLSv1 rollback changes

1999-02-01 Thread Mark J Cox
ode thoroughly however, so it may break for people. I was concerned about the ssl changes as they are a fairly major change and have not been part of C2Net products so they've not seen any public testing yet. Mark Mark J Cox, .

Re: TLSv1 rollback changes

1999-02-04 Thread Mark J Cox
I'm going to delay applying this patch; after applying some connections fail: try openssl -connect www.trustcenter.de:443 [fails] try openssl -connect www.trustcenter.de:443 -no_tls1 [passes] On Sun, 31 Jan 1999, Mark J Cox wrote: > In going through our internal code I came acr

Re: New Tools Proposal

1999-03-26 Thread Mark J Cox
> Actually I didn't found any command line tool able to generate and/or > verify PKCS#7 signatures (such as generated by signed forms by Netscape > and other tools ...) We've (C2Net) got a set of stand-alone command line programs for PKCS#7 encrypt/decrypt that seem to work well. They need a lit

[PATCH] allow certificates in a file to be repeated

1999-04-10 Thread Mark J Cox
I noticed a problem - when the CA list we were loading from a file (standard verify_locations stuff) contained a duplicate certificate all certificates after the duplicate would be ignored. This patch alters X509_load_cert_file() so that if an error occurs looking at one certificate the routine w

Re: New U.S. export regs - my opinion

2000-01-13 Thread Mark J Cox
> that incorporate become covered by the E.A.R. and must adhere to the > U.S. governments decisions on which countries are to be considered ...plus they may change the rules in 120 days :) Mark __ OpenSSL Project

SGC obsolete? (Was Re: Exporting (SGC) keys from IIS -> OpenSSL)

2000-01-17 Thread Mark J Cox
> Having said that SGC might now become obsolete anyway. I think it will take some time for this to happen; we've got to wait for MS and Netscape to release full-strength versions, then wait for everyone to upgrade to them. Theres still a large percentage of people who hit our site with browsers

[ANNOUNCE] OpenSSL version 0.9.8a and 0.9.7h released

2005-10-11 Thread Mark J Cox
cksum: 8dc90a113eb8925795071fbe52b2932c SHA1 checksum: 9fe535fce89af967b29c4727dedd25f2b4cc2f0d The checksums were calculated using the following commands: openssl md5 openssl-0.9.*.tar.gz openssl sha1 openssl-0.9.*.tar.gz Yours, The OpenSSL Project Team... Mark J

[SECURITY] OpenSSL 0.9.8c and 0.9.7k released

2006-09-05 Thread Mark J Cox
84dd2 The checksums were calculated using the following commands: openssl md5 openssl-0.9.*.tar.gz openssl sha1 openssl-0.9.*.tar.gz Yours, The OpenSSL Project Team... Mark J. Cox Nils Larsch Ulf Möller Ralf S. Engelschall Ben Laurie

[SECURITY] OpenSSL 0.9.8d and 0.9.7l released

2006-09-28 Thread Mark J Cox
e575d The checksums were calculated using the following commands: openssl md5 openssl-0.9.*.tar.gz openssl sha1 openssl-0.9.*.tar.gz Yours, The OpenSSL Project Team... Mark J. Cox Nils Larsch Ulf Möller Ralf S. Engelschall Ben Laurie Andy Pol

OpenSSL 0.9.8h released

2008-05-28 Thread Mark J Cox
penssl-0.9.*.tar.gz Yours, The OpenSSL Project Team... Mark J. Cox Nils Larsch Ulf Möller Ralf S. Engelschall Ben Laurie Andy Polyakov Dr. Stephen Henson Richard Levitte Geoff Thorpe Lutz JänickeBodo Möller -BEGIN PGP

Re: cvs commit: openssl/crypto/engine/vendor_defns hw_ubsec.h

2001-11-13 Thread Mark J Cox
> It would be really good if the RH patches were at least contributed > for inclusion into 0.9.7 as well. Yup, and we'll have AEP and Baltimore engines for 0.9.7 soon, it just wasn't the highest priority. Cheers, Mark __ OpenS

Re: cvs commit: openssl TABLE

2001-11-15 Thread Mark J Cox
> perl util/mkerr.pl -recurse -write -rebuild > > (now, just look at the effect that last thing had on the ENGINE error > strings! How did that unbalance between macros and strings happen?) I should have ran that before commiting the SureWare code; I was working from a diff that was sent t

[PATCH] fix "make install"

2001-11-21 Thread Mark J Cox
Noticed a problem with "make install" on the 0.9.6c-dev engine branch, might affect other branches too. Mark Index: Makefile.org === RCS file: /e/openssl/cvs/openssl/Makefile.org,v retrieving revision 1.88.2.7.4.7 diff -u -r1

Fix inttypes.h problem

2001-12-06 Thread Mark J Cox
The recent fix in 0.9.6c engine adding inttypes.h for AEP accelerator broke Solaris 2.5.1 and Unixware 7 builds. Joe wrote this patch which compiles on all our build machines. Not tested (but should be okay) on Windows too. Cheers, Mark -- Forwarded message -- Date: Tue, 04 Dec