Re: SSL/TLS with server names picked from DNS

2010-08-12 Thread Jakob Bohm
On 12-08-2010 05:36, sandeep kiran p wrote: Hi, Ours is an LDAP client application that fetches LDAP server names on the fly using DNS SRV Resource Records. We then randomly pick one the servers returned from DNS, establish an SSL/TLS connection with that server and then perform a bind

Re: Initialization Vectors

2010-08-12 Thread Jakob Bohm
On 11-08-2010 17:40, cmkastn wrote: With regards to initialization vectors for CBC-mode block ciphers, how does one extract the vector? Is it merely the first X bytes of data after the record header, where X is the block size? No, the IV is computed according to a formula in the protocol.

How to build libosslfips.dll(windows) In openssl-0.9.8o or openssl-fips-1.2

2010-08-12 Thread 홍성일
Hi. Umm.. I'm so sorry .. I can't speak English Well.!! I want to build libosslfips.dll (Windows) in openssl-0.9.8o or openssl-fips-1.2 But This is build(link) error (LNK2001)!! In UserGuide-1.2 (http://www.openssl.org/docs/fips/UserGuide-1.2.pdf)

Re: SSL/TLS with server names picked from DNS

2010-08-12 Thread Scott Gifford
On Wed, Aug 11, 2010 at 11:36 PM, sandeep kiran p sandeepkir...@gmail.comwrote: [ ... ] Client would then blindly establish an SSL/TLS connection with that server and would end up handing over the user credentials to it. Note that, as part of the SSL handshake, the malicious serve would

Re: SSL/TLS with server names picked from DNS

2010-08-12 Thread sandeep kiran p
We dont have any control on how the server generates its certificates. As said earlier, we only control the client portion of SSL/TLS. Sites where our client application runs, is handed over the location where trusted CA certs are stored and thats all we have. Secondly, as you pointed out, if we

Re: Cipher selection

2010-08-12 Thread Michael S. Zick
On Wed August 11 2010, Tim Cloud wrote: Let's pretend for a moment that an out of the box application uses openssl to provide access not through a browser, but rather through a SOAP client like Eclipse. And let's also say that you have no access to the code internal to that application.

RE: Cipher selection

2010-08-12 Thread Erik Tkal
Many applications have a configuration for that, either via a range (high/medium/low security), or by explicitly listing the cipher suites. The configuration may be in a file, Windows registry, or anywhere; it's completely up to the application implementation. Remember that the client offers

openssl-fips-1.2.crossbuild.diff.gz signature incorrect

2010-08-12 Thread David Stafford
When attempting to verify the hmac signature of the file openssl-fips-1.2.crossbuild.diff.gz I get a wrong value. At least it's wrong when compared with the Security Policy document. Also, the file when retrieved from the web is not compressed as the file name might imply, but merely a text

Re: How to build libosslfips.dll(windows) In openssl-0.9.8o or openssl-fips-1.2

2010-08-12 Thread Bryan
2010/8/12 홍성일 remip...@gmail.com: Hi. Umm.. I'm so sorry .. I can't speak English Well.!! I want to build libosslfips.dll (Windows) in openssl-0.9.8o or openssl-fips-1.2 But This is build(link) error (LNK2001)!! In UserGuide-1.2 (http://www.openssl.org/docs/fips/UserGuide-1.2.pdf)

RE: Cipher selection

2010-08-12 Thread Tim Cloud
Q: I am a bit confused by the limits to your question, the two parts: have no access to the code internal to that application A: Meaning that I'm working with a commercial pre-compiled application that was designed to use OpenSSL.exe, but does not allow you to edit how that application

Re: Cipher selection

2010-08-12 Thread Michael S. Zick
On Thu August 12 2010, Tim Cloud wrote: That is EXACTLY what I want to do. But having a background as a SQL DBA, I have no idea how to do that. Is there an easy answer? The server will be running Windows 2003 32-Bit, and I just want to compile it with only the FIPS compliant strong

key management

2010-08-12 Thread krishnamurthy santhanam
Hi, I am able to generate RSA key using RSA_generate_key(). i need to know how to manage these keys...is there any doucment available for key management? Thanks for your time, Krishnamurthy

RE: openssl-fips-1.2.crossbuild.diff.gz signature incorrect

2010-08-12 Thread Dave Thompson
From: owner-openssl-us...@openssl.org On Behalf Of David Stafford Sent: Thursday, 12 August, 2010 11:31 To: openssl-users Subject: openssl-fips-1.2.crossbuild.diff.gz signature incorrect When attempting to verify the hmac signature of the file openssl-fips-1.2.crossbuild.diff.gz I get a

Unable to configure verify locations for client authentication

2010-08-12 Thread Bill Moseley
I am not trying to set up client auth on Apache, just install a new SSL certificate. The instructions[1] for the new certificate says to install and intermediate certificate: SSLCACertificateFile /usr/local/ssl/crt/intermediate.crt I've done that, confirmed the paths and the certificate, but

Re: Unable to configure verify locations for client authentication

2010-08-12 Thread aerowolf
You're looking at a couple of issues here. (First, please be aware that this is the OpenSSL users list, not necessary a mod_ssl support list; however, since they're intertwined, we do have some knowledge of mod_ssl.) What you need to do is change that from 'SSLCACertificateFile' to

Re: openssl-fips-1.2.crossbuild.diff.gz signature incorrect

2010-08-12 Thread Tim Hudson
On 13/08/2010 5:12 AM, Dave Thompson wrote: I'm not sure why they even used an HMAC in the Policy. Probably the 'priests' just liked it. It doesn't add anything. Any actual security comes from having the digest, *or* HMAC, protected by a different means than the subject data. And unfortunately

Re: Unable to configure verify locations for client authentication

2010-08-12 Thread Bill Moseley
On Thu, Aug 12, 2010 at 1:56 PM, aerow...@gmail.com wrote: You're looking at a couple of issues here. (First, please be aware that this is the OpenSSL users list, not necessary a mod_ssl support list; however, since they're intertwined, we do have some knowledge of mod_ssl.) Plus,

RE: SSL/TLS with server names picked from DNS

2010-08-12 Thread David Schwartz
Sandeep Kiran P wrote: We dont have any control on how the server generates its certificates. As said earlier, we only control the client portion of SSL/TLS. Sites where our client application runs, is handed over the location where trusted CA certs are stored and thats all we have.  

Re: Unable to configure verify locations for client authentication

2010-08-12 Thread aerowolf
On first glance, it's rather stupid, but Apache (partly due to baggage from the underlying OpenSSL, but this baggage was unavoidable) requires the end-entity certificate (the certificate which contains the public key for which you have the private key) to be loaded separately from the chain

Re: SSL/TLS with server names picked from DNS

2010-08-12 Thread sandeep kiran p
We will have to check if all our sites are ready to accommodate the list of servers file which will be fetched securely. They should also be ready to update that list each time a server is added or removed from DNS SRV records. I am not sure if I got your second option. You said that I should be

Re: SSL/TLS with server names picked from DNS

2010-08-12 Thread aerowolf
In the case of a DNS attack, the only information that your users can rely upon is information which comes out of the PKI. If your attackers can attack both DNS and the PKI, then you're 0wned, game over. Otherwise, if DNS is completely attacked but you can still have some trust in the PKI,