Re: cyphers and keys

2007-10-30 Thread egoitz
> On Tue, 30 Oct 2007, [EMAIL PROTECTED] wrote: > >> Hi >> >> I have one worrying question... I have generated my keys and ca and all >> with easy-rsa package and he has generated 1024 bit rsa keys... but as >> far >> as I have seen openvpn is using blowfish... blowfish in a symetric >> encription

Examples of blowfish.h code for C?

2007-10-30 Thread Joel Christner
Hello, Please pardon the newbie question. I was curious if anyone had any links or references that they could point me to for more details on how to use blowfish.h with C? I've gone through the man pages but was hoping for something more intuitive, step-by-step, or outlining when to use specific

Re: huge memory allocation on simultaneous ssl handshakes.

2007-10-30 Thread Kyle Hamilton
[...] On 10/30/07, Scott Gifford <[EMAIL PROTECTED]> wrote: > If this presents a real problem, the general solution is to use a > specialized malloc, which uses a memory allocation method that allows > returning memory to the OS, such as mmap. I'm not sure how to use a > custom malloc with OpenSSL

Re: huge memory allocation on simultaneous ssl handshakes.

2007-10-30 Thread Scott Gifford
Lutz Jaenicke <[EMAIL PROTECTED]> writes: [...] > Yes, only 100MB might be actually used but the 2GB would still be > reserved in memory. > To get an idea about this behavior you can write a simple program like And just to elaborate a little, if other processes need this memory, the OS will swap

Re: cyphers and keys

2007-10-30 Thread Gayathri S
On Tue, 30 Oct 2007, [EMAIL PROTECTED] wrote: Hi I have one worrying question... I have generated my keys and ca and all with easy-rsa package and he has generated 1024 bit rsa keys... but as far as I have seen openvpn is using blowfish... blowfish in a symetric encription cypher and rsa is an

ca server - unable to load CA private key

2007-10-30 Thread Frank Garber
Hey all, I'm very new to security and generating key files. I'm following the instructions I've found here: http://www.securityfocus.com/infocus/1677 and I'm having trouble generating the private / public key pair and certificate. In step 2 it asks: "Enter pass phrase for C:\CA\private\CAkey.pe

Re: OpenSSL How to redistribute as part of our application

2007-10-30 Thread Chris Clark
On 10/30/07, Dave Bound wrote: > >> Not everyone can use the default build of OpenSSL. > Can you point me at some docs which will allow me to ascertain whether I > fall into the 'not everyone' category? One thing to consider is if you want to include the patented ciphers in your build, such as RC

bad decrypt in EVP_CipherFinal_ex

2007-10-30 Thread Alex Queiroz
Hallo, I am using the symmetric cypher functions to encrypt and then decrypt a string. The cipher is "aes-256-cbc". When I try to decrypt the string, I get this error: error 06065064: digital envelope routines: EVP_DecryptFinal_ex: bad decrypt I am using the same key and same iv. The s

Re: OpenSSL How to redistribute as part of our application

2007-10-30 Thread Thomas J. Hruska
Dave Bound wrote: Not everyone can use the default build of OpenSSL. Can you point me at some docs which will allow me to ascertain whether I fall into the 'not everyone' category? -Original Message- From: Thomas J. Hruska [mailto:[EMAIL PROTECTED] Sent: Tuesday 30 October 2007 10:56

RE: OpenSSL How to redistribute as part of our application

2007-10-30 Thread Dave Bound
>> Not everyone can use the default build of OpenSSL. Can you point me at some docs which will allow me to ascertain whether I fall into the 'not everyone' category? -Original Message- From: Thomas J. Hruska [mailto:[EMAIL PROTECTED] Sent: Tuesday 30 October 2007 10:56 To: openssl-users@

RE: cyphers and keys

2007-10-30 Thread David Schwartz
> > Asymmetric ciphers like RSA are used on very small pieces of > > information, > > not on bulk data. In the case of encryption, the asymmetric algorithm is > > used to securely exchange a random small number that is then > > used as the key > > in a symmetric algorithm like blowfish or AES. >

RE: cyphers and keys

2007-10-30 Thread Marek Marcola
On Tue, 2007-10-30 at 02:59 -0700, David Schwartz wrote: > > I have one worrying question... I have generated my keys and ca and all > > with easy-rsa package and he has generated 1024 bit rsa keys... but as far > > as I have seen openvpn is using blowfish... blowfish in a symetric > > encription c

Re: OpenSSL How to redistribute as part of our application

2007-10-30 Thread Thomas J. Hruska
Dave Bound wrote: Is there a way to use Win32 OpenSSL in silent mode? The installer is Innosetup-based. Read the docs for Innosetup on several command-line switches that Innosetup has for silent installs. You should make sure you display a compatible license agreement to your users when you

Re: huge memory allocation on simultaneous ssl handshakes.

2007-10-30 Thread Lutz Jaenicke
Steffen DETTMER wrote: > * Ramashish Baranwal wrote on Tue, Oct 30, 2007 at 15:06 +0530: > >>> The heap size will never be reduced again regardless of the >>> amount of "free()" calls, the memory can however be reused. >>> Therefore, if your application at one point in time needs a >>> lot of he

RE: huge memory allocation on simultaneous ssl handshakes.

2007-10-30 Thread Kukosa, Tomas
> Is openssl using some kind of memory > caching for its ssl handshake which is not getting released when the > handshake is over? Each established SSL/TLS connection allocates at least 58983 bytes. All those 3 buffers (18437 B, 18698 B, 21848 B) are allocated when the new connection is accepted w

RE: cyphers and keys

2007-10-30 Thread David Schwartz
> I have one worrying question... I have generated my keys and ca and all > with easy-rsa package and he has generated 1024 bit rsa keys... but as far > as I have seen openvpn is using blowfish... blowfish in a symetric > encription cypher and rsa is an asymetrical one... shouldn't match keys > an

Re: huge memory allocation on simultaneous ssl handshakes.

2007-10-30 Thread Steffen DETTMER
* Ramashish Baranwal wrote on Tue, Oct 30, 2007 at 15:06 +0530: > > The heap size will never be reduced again regardless of the > > amount of "free()" calls, the memory can however be reused. > > Therefore, if your application at one point in time needs a > > lot of heap space the memory consumptio

Re: huge memory allocation on simultaneous ssl handshakes.

2007-10-30 Thread Ramashish Baranwal
On 10/30/07, Lutz Jaenicke <[EMAIL PROTECTED]> wrote: > Ramashish Baranwal wrote: > > Hi, > > > > I have a server which accepts ssl connections. I have a client which > > does parallel ssl > > connections to this. After closing all connections the server has > > unfreed memory. This gets reused for

RE: OpenSSL How to redistribute as part of our application

2007-10-30 Thread Dave Bound
Is there a way to use Win32 OpenSSL in silent mode? -Original Message- From: Thomas J. Hruska [mailto:[EMAIL PROTECTED] Sent: Monday 29 October 2007 14:22 To: openssl-users@openssl.org Subject: Re: OpenSSL How to redistribute as part of our application Bernhard Froehlich wrote: > Dave Bo

Re: huge memory allocation on simultaneous ssl handshakes.

2007-10-30 Thread Lutz Jaenicke
Ramashish Baranwal wrote: > Hi, > > I have a server which accepts ssl connections. I have a client which > does parallel ssl > connections to this. After closing all connections the server has > unfreed memory. This gets reused for subsequent ssl connections, so no > issue there. > > My problem is

cyphers and keys

2007-10-30 Thread egoitz
Hi I have one worrying question... I have generated my keys and ca and all with easy-rsa package and he has generated 1024 bit rsa keys... but as far as I have seen openvpn is using blowfish... blowfish in a symetric encription cypher and rsa is an asymetrical one... shouldn't match keys and cyphe