RE: [openssl.org #2988] Makefiles should (usually) remove target before re-generating

2013-02-13 Thread Salz, Rich via RT
> Unfortunately some platforms can't automatically build the files e.g. WIN32, > VMS. Okay, so those targets shouldn't get invoked? Or are you saying that you WANT the build to fail on those platforms? > # objects.pl both reads and writes obj_mac.num > obj_mac.h: objects.pl objects.txt obj_ma

RE: [openssl.org #2988] Makefiles should (usually) remove target before re-generating

2013-02-14 Thread Salz, Rich via RT
We extract a tarball and make everything read-only. Sometimes an item in the distribution gets re-made. This can fail because of permissions. So, on platforms where this would happen, we'd like to remove the file first. I wasn't advocating to remove them from the distro, I understand we need t

RE: [openssl.org #2988] Makefiles should (usually) remove target before re-generating

2013-02-17 Thread Salz, Rich via RT
Yes, it predates the latest release. I thin in general it's like a "makefile hygiene" thing -- if files are read-only, but can be created, then the target needs to be removed first. -- Principal Security Engineer Akamai Technology Cambridge, MA _

RE: [openssl.org #3001] [PATCH] Reduce unnecessary verifying iteration in rsa_test.c

2013-02-26 Thread Salz, Rich via RT
You might want to read about timing attacks. -- Principal Security Engineer Akamai Technology Cambridge, MA __ OpenSSL Project http://www.openssl.org Development Mailing List

Re: [openssl-dev] [openssl.org #3627] Enhancement request: add more "Protocol" options for SSL_CONF_CTX

2014-12-08 Thread Salz, Rich via RT
I think magic names -- shorthands -- are a very bad idea. They are point-in-time statements whose meaning evolves, if not erodes, over time. ___ openssl-dev mailing list openssl-dev@openssl.org https://mta.opensslfoundation.net/mailman/listinfo/openss

Re: [openssl-dev] [openssl.org #3627] Enhancement request: add more "Protocol" options for SSL_CONF_CTX

2014-12-10 Thread Salz, Rich via RT
> Personally i am willing to put enough trust in the OpenSSL team *even > insofar* as i now do 'set ssl-protocol="ALL,-VULNERABLE"' > and leave the task of deciding what is VULNERABLE up to you. That is not a responsibility we want. No how, no way. It is enough to be responsible for the code.

Re: [openssl-dev] [openssl.org #3627] Enhancement request: add more "Protocol" options for SSL_CONF_CTX

2014-12-10 Thread Salz, Rich via RT
-- Principal Security Engineer, Akamai Technologies IM: rs...@jabber.me Twitter: RichSalz > You are almost certainly far better qualified to make this decision than most > administrators. Not sure who the "you" is. Me, openssl, or the original poster :) > Nevertheless, if upgrading OpenSSL

Re: [openssl-dev] [openssl.org #3627] Enhancement request: add more "Protocol" options for SSL_CONF_CTX

2014-12-10 Thread Salz, Rich via RT
> I'd love to see a version of bettercrypto.org that only has to say "to > configure > OpenSSL version 1.0.3 and higher, you should use the string BEST_PRACTICE" That can happen but not by embedding magic strings into code. See http://rt.openssl.org/Ticket/Display.html?id=3266 ht

Re: [openssl-dev] [openssl.org #3627] Enhancement request: add more "Protocol" options for SSL_CONF_CTX

2014-12-11 Thread Salz, Rich via RT
> So you want a separate "openssl-conf" package. Fine, then provide it and > give an easy mechanism for applications to hook into it. > And for users to be able to overwrite system defaults. > But this has not that much to do with #3627. Yes it does. :) A newer simpler API that does what you wa

Re: [openssl-dev] [openssl.org #3621] Support legacy CA removal, ignore unnecessary intermediate CAs in SSL/TLS handshake by default

2014-12-15 Thread Salz, Rich via RT
> For what it's worth, I have tested the Alexa top 1 million servers with the - > trusted_first option and haven't found a single server that looses its trusted > status, on the other hand, good few percent of servers do gain it. It's worth a great deal. Thanks! I love fact-based analysis. :)

Re: [openssl-dev] [openssl.org #3562] leading dots in nameConstraints ... bug report and patch

2015-01-01 Thread Salz, Rich via RT
> This is a "security issue" in the sense that is a Type-II error (disallowing > good > guys). It affects thousands of sites and who-knows-how-many users. Well, kinda. It disallows good guys who made a mistake and are violating the RFC. Sure, they're not written in stone and that particular R

Re: [openssl-dev] [openssl.org #3488] OPENSSL_config shouldn't exit()

2015-01-26 Thread Salz, Rich via RT
Yes. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #3695] DTLS Handshake issue (openssl-1.0.1e-dtls-ecc-ext.patch) leads to process crash

2015-02-10 Thread Salz, Rich via RT
Matt tried to explain this before. 1.0.1e-30 is not a version that OpenSSL provides. You will have to contact your vendor. The backtrace information is not usable as there are no function names; you will have to build a debugging version. We cannot help you. -- Principal Security Engineer,

Re: [openssl-dev] [openssl.org #3526] [Patch] Removed the dependency on the obsolete TERMIO.h for linux 32 and 64bits.

2015-02-24 Thread Salz, Rich via RT
> I took this a bit further and made TERMIOS the default if nothing else is > said. YEA! ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #3738] [PATCH] tell make running subcommands are make based

2015-03-08 Thread Salz, Rich via RT
> Lets add + to the rules we know are make based. Isn't that a gnu-make-only thing? -- Senior Architect, Akamai Technologies IM: rs...@jabber.me Twitter: RichSalz ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo

[openssl-dev] [openssl.org #3717] Patch for IPv6 support in s_client/s_server

2015-03-24 Thread Salz, Rich via RT
The short answer is that nobody has come up with comprehensive cross-platform IPv6 support. Fixing the apps isn't enough; how does a server listen on IPv4, v6, both -- and make it work on our supported platforms? What should the various BIO API's do? Looking forward to diff's.

[openssl-dev] [openssl.org #3769] Bug in v3_alt.c

2015-03-29 Thread Salz, Rich via RT
Found during internal code review. V3_alt.c has this proposed change: ret = X509V3_NAME_from_section(nm, sk, MBSTRING_ASC); - if (!ret) + if (!ret) { X509_NAME_free(nm); + nm = NULL; + } gen->d.dirn = nm; Kurt points out: This looks like a bugfix that should probably go to other branches. Bu

[openssl-dev] [openssl.org #3784] bug in v3_alt.c

2015-04-06 Thread Salz, Rich via RT
In crypto/x509v3/v3_alt.c, around line 603: - if (!ret) + if (!ret) { X509_NAME_free(nm); +nm = NULL; + } Kurt points out: This looks like a bugfix that needs to go to other branches. We probably shouldn't even touch gen in case of an error. / . __

[openssl-dev] [openssl.org #3782] bug/leak in crypto/ec/ecp_smpl.c

2015-04-06 Thread Salz, Rich via RT
around line 135. The old code has a memory leak, only freeing the BN if it's NULL. - if (!group->field) - BN_free(group->field); - if (!group->a) - BN_free(group->a); - if (!group->b) - BN_free(group->b); + BN_free(group->field); + BN_free(group->a); + BN_free(group->b); . _

[openssl-dev] [openssl.org #3783] missing null pointer check in x509_lu.c

2015-04-06 Thread Salz, Rich via RT
void X509_OBJECT_free_contents(X509_OBJECT *a) { + if (!a) + return; switch (a->type) { already done in master. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

[openssl-dev] [openssl.org #3785] missing NULL check in X509_VERIFY_PARAM_free

2015-04-06 Thread Salz, Rich via RT
Need "if (!param) return;" at the start of X509_VERIFY_PARAM_free Found by Kurt while code-reviewing some of my changes on master. . ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

[openssl-dev] [openssl.org #3798] null check in x509_lu.c:cleanup

2015-04-12 Thread Salz, Rich via RT
around line 218 add the if check: static void cleanup(X509_OBJECT *a) { + if (!a) +return; . ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

[openssl-dev] [openssl.org #3799] add null to check X509_STORE_CTX_free

2015-04-12 Thread Salz, Rich via RT
Around line 2226 add the NULL check. void X509_STORE_CTX_free(X509_STORE_CTX *ctx) { + if (!ctx) + return; ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

[openssl-dev] [openssl.org #3801] need NULL check in CMAC_CTX_free

2015-04-13 Thread Salz, Rich via RT
need to add these lines around 115 in cma.c void CMAC_CTX_free(CMAC_CTX *ctx) { +if (!ctx) +return; CMAC_CTX_cleanup(ctx); OPENSSL_free(ctx); } . ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listi

Re: [openssl-dev] [openssl.org #3876] [PATCH] Do not complain if config file not found

2015-05-28 Thread Salz, Rich via RT
> My suggestion is, at least for 1.1 (but I don't see why this can't be ported > down to 1.0.2 and 1.0.1) remove the config loading code from > openssl.c:main() and add the same code in req.c as you can find in ts.c or > srp.c... possibly refactoring that code into a helper function in apps.c. Ye

Re: [openssl-dev] [openssl.org #3883] [PATCH] Add IPv4/IPv6:port-based client cache

2015-05-31 Thread Salz, Rich via RT
> > (Documentation is in the source files, not a .pod) > > Do you have code to produce usable manpages from the embedded > documentation? We can't ask users to read the source. I believe Todd meant for the test program. > * The copyright notice does not refer to any license that would all

Re: [openssl-dev] [openssl.org #3891] [PATCH] Fix undefined behavior executed through OpenSSL tests

2015-06-02 Thread Salz, Rich via RT
Generally, these look good. I have concerns about three (that you raised); quoting from your README. Any comments from others? + err.c.patch The 'int_thread_del_item' function calls 'int_thread_release' that accesses (*hash), but this is invalid because 'int_thread_del_item' frees 'int_threa

Re: [openssl-dev] [openssl.org #3897] request: add BLAKE2 hash function (let's kill md5sum!)

2015-06-08 Thread Salz, Rich via RT
>Blake2s is 256-bit, while Blake2d is 512-bit.  These are the ones I assume >that would be best for addition.  The other two, Blake2sp and Blake2bp are >multi-threaded, and are optimized for multi-core CPUs. It is unfortunate that 's' and 'd' mean different algorithms, while 2sp and 2bp are, pr

Re: [openssl-dev] [openssl.org #3897] request: add BLAKE2 hash function (let's kill md5sum!)

2015-06-08 Thread Salz, Rich via RT
So it's really a request to add four hash functions. Bummer. > In practice the parallel mode works nicely on modern systems. Well, on clients. On servers, presumably, those cores would be busy ;) I'd support adding 2b and 2s, in spite of the fact that the names are really really bad. I'm les

Re: [openssl-dev] [openssl.org #3903] Infer run on openssl-1.0.2a

2015-06-11 Thread Salz, Rich via RT
This is great! Any chance you can run it against master? I'm hoping most of the ones in apps go away ... ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #3934] [PATCH] test: use _DEFAULT_SOURCE with newer glibc versions

2015-07-10 Thread Salz, Rich via RT
This is strange, since OpenSSL doesn't use "gethostname" which the comments mention. Can you add the exact error message? And why only that one file? More strangeness. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listi

Re: [openssl-dev] [openssl.org #3934] [PATCH] test: use _DEFAULT_SOURCE with newer glibc versions

2015-07-11 Thread Salz, Rich via RT
Ah, that explains my confusion; I was looking at master. So we need to make this fix for 1.0.x Thanks. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #3955] [PATCH] Reduce stack usage in PKCS7_verify()

2015-07-23 Thread Salz, Rich via RT
How about 256 on the stack? ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #3956] SSL_accept() crashed in SSLv3 processing

2015-07-24 Thread Salz, Rich via RT
The first place to look is to see if your program has any pointers errors that are overwriting memory. Try something like valgrind or ASAN. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #3951] [RFC][PATCH] Allow certificate time checks to be disabled

2015-07-28 Thread Salz, Rich via RT
It seems that the simplest and most obvious thing is to indicate that you don't care about the dates, which is what this patch does. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #3951] [RFC][PATCH] Allow certificate time checks to be disabled

2015-07-30 Thread Salz, Rich via RT
> If requested, I can still provide a patch with the alternative variant of > using a > X509_V_FLAG_NO_CHECK_TIME flag if that's considered better than using a > 'special' time of (time_t)-1 with X509_VERIFY_PARAM_set_time(). Yes, please. ___ openss

Re: [openssl-dev] [openssl.org #3976] Bug report

2015-07-31 Thread Salz, Rich via RT
My feeling is that you should not be copying an EVP if data is NULL and that the earlier null checks are erroneous. But I could be wrong. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #3992] [PATCH] Allow RFC6962 Signed Certificate Timestamps to be disabled

2015-08-11 Thread Salz, Rich via RT
> Yes. But skimping on security features is not a good way to deal with > software/firmware bloat. And again, attacks on this layer are increasing in > quantity and sophistication. The current protection mechanisms appear > insufficient. Draw your own conclusions. But this isn't a general-purpose

Re: [openssl-dev] [openssl.org #4017] [PATCH] Implement Camellia GCM suites (RFC 6367)

2015-08-24 Thread Salz, Rich via RT
> May I ask one question: Why? Excellent question. "Because there is an RFC" is not a good enough reason any more, I think. > Does camellia offer any significant advantage in > any situation that would justify increasing support? Yes, I'd like to know who needs it. GOST is going to move to a

[openssl-dev] [openssl.org #4027] Return value in dh_pmeth.c

2015-09-03 Thread Salz, Rich via RT
A non-matching kdf_type moves from return 1 to return 0 if NO_CMS compiles out the KDF_X9_42 change - that is a different error return and that seems incorrect to be making that change as part of handling conditional compilation additions. Although it looks like that change is one that should be

Re: [openssl-dev] [openssl.org #4028] about the chipersuite for CoAP

2015-09-04 Thread Salz, Rich via RT
> so will v1.1 be released in this year? More likely early 2016. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4033] Unable to build openssl git master branch on NetBSD for > 24 hours

2015-09-10 Thread Salz, Rich via RT
Please do "grep rehash Makefile" at the toplevel. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] Update RE: [openssl.org #4033] Unable to build openssl git master branch on NetBSD for > 24 hours

2015-09-15 Thread Salz, Rich via RT
Yes, it has two main functions, based on #ifdef unix. Not sure why netBSD doesn't -Dunix. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] Update RE: [openssl.org #4033] Unable to build openssl git master branch on NetBSD for > 24 hours

2015-09-16 Thread Salz, Rich via RT
> Hmmm. It used to build and test OK, did the check for -Dunix change > recently? No. > Is the -Dunix test in config script? No, it's in apps/rehash.c > For a quick fix I added -Dunix to CFLAGS in Makefile and I am able to make > and run tests. Sounds like the netBSD config needs to add that.

Re: [openssl-dev] [openssl.org #4033] Unable to build openssl git master branch on NetBSD for > 24 hours

2015-09-17 Thread Salz, Rich via RT
Since email re-opens the ticket, let's use this one :) What's the output of this command: HARNESS_VERBOSE=yes make 'TESTS=test_rehash' test ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4033] Unable to build openssl git master branch on NetBSD for > 24 hours

2015-09-18 Thread Salz, Rich via RT
> YES! It's a one user box that I regularly update and install on, so rarely > run as > reduced/un-privileged user. > > If I switch to non-root, this passes. Glad we got it figured out. Perhaps we can add a warning to the test (running as root, expect to fail) or some such.

Re: [openssl-dev] [openssl.org #4061] [PATCH] Request for new API to get role of SSL

2015-09-27 Thread Salz, Rich via RT
> if so, any plan to backport it? No, it's a new feature; only fixes go into releases. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4060] AutoReply: a crash happened inside SSL_Connect function

2015-09-28 Thread Salz, Rich via RT
> I want to know how it's going with the ticket [openssl.org #4060]? Nobody's looked at it yet. You need to include a backtrace. And a way to reproduce it (sample code) before anyone will really be interested. ___ openssl-dev mailing list To unsubsc

Re: [openssl-dev] [openssl.org #3964] Fix OPENSSL_NO_STDIO build

2015-09-30 Thread Salz, Rich via RT
> If things like BIO_new_file() were inline, or macros, then the compiler could > *see* that they'd return NULL. And lots of code in the *calling* functions > (basically everything but the error path) could be elided from the compiled > result... Cool, will do that. _

Re: [openssl-dev] [openssl.org #3964] Fix OPENSSL_NO_STDIO build

2015-09-30 Thread Salz, Rich via RT
> OPENSSL_stderr() is such thing. Well, for a Unix person it's really > meaningless > function, but it was introduced to solve small but irritating problem in FIPS > module context on Windows. I removed it :) Since 1.1 doesn't support FIPS, that's okay. But we'll have something like that for

Re: [openssl-dev] [openssl.org #3964] Fix OPENSSL_NO_STDIO build

2015-09-30 Thread Salz, Rich via RT
> If you want to keep it can we make it return a BIO? Many platforms could use > it then for serial debug output etc. That's what I'm going to do. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4075] Enhancement request: Camellia ECDHE+GCM suites

2015-10-08 Thread Salz, Rich via RT
Also, note that the earliest this could happen is for 1.1 (it's a new feature), and it's not high on our priority list for that release right now. Patches that are regularly rebased against master would help. ___ openssl-dev mailing list To unsubscri

Re: [openssl-dev] [openssl.org #4088] RE: [Bug] Openssl caused CPU high to 100%

2015-10-10 Thread Salz, Rich via RT
More information is needed. But this is most likely not an OpenSSL bug, it's the FIPS setup-testing. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #3712] TLS Renegotiation with Java is broken

2015-10-12 Thread Salz, Rich via RT
> AFAICT if SSL_read returns between the first handshake and the second, you > don't get the problem. I think it should not matter when or what SSL_read returns. That should only be returning application-level data to the caller. All state manipulations, etc., should be done underneath and com

Re: [openssl-dev] [openssl.org #4091] Openssl make depends gives errors when no-md5 is specified

2015-10-12 Thread Salz, Rich via RT
Yes, the various no-options don't work well. Not a high priority for 1.0.2 unless patches are provided. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4094] Nonsensical pointer comparison in PACKET_buf_init

2015-10-15 Thread Salz, Rich via RT
> PACKET_buf_init. This code can assume that |len| is from a trusted source. > > The purpose of the sanity check is not then for security, but to guard against > programmer error. For a correctly functioning program this test should never > fail. I would say that the combination of these two thi

Re: [openssl-dev] [openssl.org #4103] Valgrind reported memory leak in X509_PUBKEY_get

2015-10-21 Thread Salz, Rich via RT
> I am trying figure out valgrind report leak. in openssl 1.0.1c. You don't have enough of the backtrace for us to reproduce it. Please add a simple demo program. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/op

Re: [openssl-dev] [openssl.org #4151] [PATCH] Function pop_info in crypto/mem_dbg.c returns a dangling pointer

2015-11-22 Thread Salz, Rich via RT
We have another internal cleanup in-progress that will fix this in a different way. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4165] 1.0.1q release busted, does not compile

2015-12-03 Thread Salz, Rich via RT
Also see as https://github.com/openssl/openssl/issues/492 ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4175] Add new macro or PKCS7 flag to disable the check for both data and content

2015-12-08 Thread Salz, Rich via RT
I think that instead of the #ifdef being removed, the if() test should be removed. This was my mistake. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4178] [patch] OpenSSL 1.1.0 fails when configure with no-nextproto

2015-12-12 Thread Salz, Rich via RT
Should we support no-nextproto? The #ifdef's complicate the code, and the implementation is very small. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4187] [Patch] Secure memory subsystem does not report actual size

2015-12-18 Thread Salz, Rich via RT
This is good. I changed it to size_t and will merge it as part of other "secmem" API cleanups I have in progress. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4194] engine command regression in 1.1

2015-12-22 Thread Salz, Rich via RT
I don't know that I would call it a regression, but rather a difference. :) I'll fix the summary but not the old uncommon behavior. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4200] extra data for ec keys

2015-12-24 Thread Salz, Rich via RT
I fixed that, added docs. It's in code review now. Thanks! ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4202] RT link does not work

2015-12-26 Thread Salz, Rich via RT
This link is the right one, we'll fix the code, thanks: https://www.openssl.org/community/index.html#bugs ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4201] Feature Request: Support dumping session keys in NSS key log format

2015-12-28 Thread Salz, Rich via RT
Yes we would be interested in this but someone would almost definitely have to be provided as a complete patch because it seems unlikely anyone on the team will get around to doing it by 1.1 release. ___ openssl-dev mailing list To unsubscribe: https:

Re: [openssl-dev] [openssl.org #4194] engine command regression in 1.1

2015-12-29 Thread Salz, Rich via RT
Does this diff fix it? ; g diff apps/engine.c diff --git a/apps/engine.c b/apps/engine.c index c373df5..3c0ff96 100644 --- a/apps/engine.c +++ b/apps/engine.c @@ -312,12 +312,17 @@ int engine_main(int argc, char **argv) BIO *out; const char *indent = " "; OPTION_CHOICE o; -ch

Re: [openssl-dev] [openssl.org #4194] engine command regression in 1.1

2016-01-02 Thread Salz, Rich via RT
Please see this: https://github.com/openssl/openssl/compare/master...richsalz:rt4194?expand=1 ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4194] engine command regression in 1.1

2016-01-03 Thread Salz, Rich via RT
Tweaked, sigh. ; ./util/opensslwrap.sh engine - dynamic -pre engine: Cannot mix flags and engine names. engine: Use -help for summary. exit 1 ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-

Re: [openssl-dev] [openssl.org #4194] engine command regression in 1.1

2016-01-03 Thread Salz, Rich via RT
So you're saying just close this ticket? ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4194] engine command regression in 1.1

2016-01-03 Thread Salz, Rich via RT
The old style of complete intermix of flags and parameters is not going to happen. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4225] OpenSSL 1.1-pre2 EC_KEY_ex_data regression of functionality from 1.0.2 to 1.1

2016-01-08 Thread Salz, Rich via RT
There is a fix for this that is in the internal code-review phase. It's based on patches Roumen sent. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4201] Feature Request: Support dumping session keys in NSS key log format

2016-01-09 Thread Salz, Rich via RT
> SSLKEYLOGFILE env var is a good current standard, so I think openssl should > use it as well. Patches to implement all of this would be helpful, otherwise it will probably not make it into the next relese. ___ openssl-dev mailing list To unsubscrib

Re: [openssl-dev] [openssl.org #4225] OpenSSL 1.1-pre2 EC_KEY_ex_data regression of functionality from 1.0.2 to 1.1

2016-01-09 Thread Salz, Rich via RT
> Any idea when these will be in github? Hopefully in time for the next alpha 1.1 release, in a week or two. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4228] Feature request: Support AEAD ciphers in enc app

2016-01-11 Thread Salz, Rich via RT
> I have implemented it as a small part of my Master thesis, maybe I could > polish it and submit a PR. Please do this. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4227] openssl rand 10000000000 does not produce 10000000000 random bytes

2016-01-11 Thread Salz, Rich via RT
> I am a bit worried when I see C-beginner mistakes like this in a security > suite: > When using sscanf on data you have not produced yourself, you should > always assume they will be bigger that your largest buffer/variable and deal > correctly with that. That's a bit of an exaggeration here.

Re: [openssl-dev] [openssl.org #4227] openssl rand 10000000000 does not produce 10000000000 random bytes

2016-01-11 Thread Salz, Rich via RT
And also opt_int and opt_long in apps/opt.c are useful. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4227] openssl rand 10000000000 does not produce 10000000000 random bytes

2016-01-11 Thread Salz, Rich via RT
> The worry is not about this particular case (where it does not seem to be > possible to abuse), but as a general observation: If the rest of the code has > the same quality, then we will be screwed. Shrug. We do the best we can. We try to do a good job. Almost everyone would agree that the

Re: [openssl-dev] [openssl.org #4227] openssl rand 10000000000 does not produce 10000000000 random bytes

2016-01-12 Thread Salz, Rich via RT
> May I suggest the bug also becomes a wish for support for > 2GB numbers, > as that is what the user originally wanted? Unlikely to happen in 1.1 because of portability issues. Call it multiple times or, better, write a small program to generate a PRNG stream.

Re: [openssl-dev] [openssl.org #4231] bug openssl rc4 overflow

2016-01-13 Thread Salz, Rich via RT
The output of encryption is not a string, it is an array of binary bytes. I don't think there is a bug here. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] 转发: [openssl.org #4231] bug openssl rc4 overflow

2016-01-13 Thread Salz, Rich via RT
Are you sure that your application is built with the same -march, etc., flags that the library is built with? ___ openssl-bugs-mod mailing list openssl-bugs-...@openssl.org https://mta.openssl.org/mailman/listinfo/openssl-bugs-mod __

Re: [openssl-dev] 答复: [openssl.org #4231] bug openssl rc4 overflow

2016-01-13 Thread Salz, Rich via RT
There is something unusual in your local environment. ; cat a.c #include #include #include int main() { char code[64]={0}; char outbuffer[64]; int codelen = sizeof (code); RC4_KEY rc4_key; strcpy(code,"This is secrect"); RC4_set_key(&rc4_key,7,(unsigned char *)"zenraoli"

Re: [openssl-dev] [openssl.org #4193] AutoReply: Minor Issue with X509_STORE_CTX_init and it's callers.

2016-01-14 Thread Salz, Rich via RT
You can't, only someone one the team can. I'll close it. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

[openssl-dev] [openssl.org #4245] OpenSSL-1.1-pre2 e_oss.h and inline conflicts

2016-01-15 Thread Salz, Rich via RT
e_os.2 line 327:: # if !defined(inline) && !defined(__cplusplus) Should this be: # if !defined(ossl_inline) && !defined(__cplusplus) The purpose of this section is to end up with a good definition for ossl_inline If some preceding header file (and I have run across this) does a #define

Re: [openssl-dev] [openssl.org #4115] [PATCH] Remove remaining FIPS code

2016-01-17 Thread Salz, Rich via RT
> What about to remove declaration of FIPS_mode and FIPS_mode_set? > Those functions could be used by external packages at configure time to > detect that fips is not supported at all. > Note 1.0.0 does not declare both functions. For various reasons, the team wants them there.

Re: [openssl-dev] [openssl.org #4226] FIX: ADD IPv6 support for OCSP Responder

2016-01-25 Thread Salz, Rich via RT
Yes, the 1.1.0 release will have ipv6 support (down at the BIO layer). ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4271] Enhancement Request: Support TCP Fast Open

2016-01-26 Thread Salz, Rich via RT
TFO is interesting because it lets UDP-style attacks happen at the TCP level. Normally you can't do a TCP attack unless you have a valid client IP address. Imagine connecting once and then sending the syncookie to the botnet. This might be outside the scope of things OpenSSL cares about and I k

Re: [openssl-dev] [openssl.org #4271] Enhancement Request: Support TCP Fast Open

2016-01-27 Thread Salz, Rich via RT
> This suggests that you have on-path capabilities between each of the > reflectors and the victim, right? I don't think so: you need the first attacker to get the cookie, then you spread it out. > If you have on-path capabilities, couldn't you do a similar attack against a > live > TCP sess

Re: [openssl-dev] [openssl.org #4281] [PATCH] Allow downgrading when reusing sessions on client

2016-01-30 Thread Salz, Rich via RT
I closed the first ticket, so everything is okay. If you want to do GitHub pull requests and just open an RT to refer to that, that is also okay. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4290] HMAC_Init_ex() return bug

2016-02-03 Thread Salz, Rich via RT
> I’m running OS X 10.11.3 and OpenSSL 1.0.206 I cannot reproduce this. Did you build from source, or is that a vendor-provided version? The ".206" isn't part of our release naming. Did you mean 1.0.2f? Do you have a sample program to show the error? ___

Re: [openssl-dev] [openssl.org #4289] OpenSSL 1.0.2f serious bug in Win32 makefiles, easy to fix, solution provided

2016-02-03 Thread Salz, Rich via RT
> The diff works perfectly on master, but exposed a new bug (bare snprintf). > The following patch fixes it. I can make a PR (or add it to my existing PR > #512) > if you'd like. Please do as a separate PR. Thanks. ___ openssl-dev mailing list To un

Re: [openssl-dev] [openssl.org #3203] Normalize PFS key exchange labels

2016-02-03 Thread Salz, Rich via RT
> do you think there are pieces that aren't yet merged? have you tried using > the common names with 1.0.2 and they don't work? Nope, I was just reading through all the tickets to do some basic triage. I will close this one. Thanks ! ___ openssl-de

Re: [openssl-dev] [openssl.org #3528] [PATCH] ssl: SSL_MODE_ASYNC_KEY_EX

2016-02-03 Thread Salz, Rich via RT
It’s late and my response was incomplete. The other part has already landed in master, and that's the "async engine" support. ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4075] Enhancement request: Camellia ECDHE+GCM suites

2016-02-04 Thread Salz, Rich via RT
> That's all we get, a one-liner, no explanation, no rationale, response? Take a look at some of the discussion here: https://github.com/openssl/openssl/pull/374 https://github.com/openssl/openssl/pull/154 https://github.com/openssl/openssl/pull/148 I would suggest that i

Re: [openssl-dev] [openssl.org #4075] Enhancement request: Camellia ECDHE+GCM suites

2016-02-04 Thread Salz, Rich via RT
I missed a link: https://github.com/openssl/openssl/issues/320 Nobody is pressuring us. I am sure you mean that in a kind and concerned way, and are not trying to be insulting. If you can find someone on the openssl-dev team who is willing to take on the work, then it could go into OpenSSL. O

Re: [openssl-dev] [openssl.org #2460] OCSP server uses only IP6

2016-02-04 Thread Salz, Rich via RT
> I'm not sure what you think. But all the apps currently only create 1 socket, > which on some OSes could mean that it's IPv6 (or > IPv4) only. It needs more work. Yes, I meant to close the window not the ticket :) Re-opened. -

Re: [openssl-dev] [openssl.org #2712] Be more liberal when trying to recognize the XMPP starttls headers

2016-02-04 Thread Salz, Rich via RT
> Doesn't seem that way. Not present on VMS, and I can't find it on MDSN > either. So what I'd have to do is downcase the string and do strstr on all lowercase. Might be reasonable - http://rt.openssl.org/Ticket/Displa

Re: [openssl-dev] [openssl.org #4175] Add new macro or PKCS7 flag to disable the check for both data and content

2016-02-05 Thread Salz, Rich via RT
And update the PR to say that it also closes this ticket :) -- Ticket here: http://rt.openssl.org/Ticket/Display.html?id=4175 Please log in as guest with password guest if prompted -- openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

Re: [openssl-dev] [openssl.org #4075] Enhancement request: Camellia ECDHE+GCM suites

2016-02-08 Thread Salz, Rich via RT
> over 40% of Alexa top 1 million TLS enabled servers enable Camellia That's different than actual use, as you know. > I don't see it mentioned anywhere in documentation, especially not in > ciphers(1) man page. So, is it not so severe, or should the Camellia be > removed from DEFAULT? It prob

Re: [openssl-dev] [openssl.org #4075] Enhancement request: Camellia ECDHE+GCM suites

2016-02-08 Thread Salz, Rich via RT
> I said I would be willing to help, but got no reply on how best to ramp up on > developing a stable addition likely to be accepted by the dev team. There's no hard-and-fast rules. We recently added some text: https://openssl.org/community/getting-started.html But again, for the specific requ

<    5   6   7   8   9   10   11   12   >