RE: Secure storage of private (RSA) keys

2014-04-15 Thread Salz, Rich
In our haste to help, the secure memory allocation patch we posted last week had two issues. First, it wasn’t easy to use. We knew that, and tried to set expectations accordingly. Second, it wasn’t really secure enough. We didn’t know that, and we thank everyone who brought it to our attention.

Re: Heart bleed with 0.9.8 and 1.0.1

2014-04-15 Thread ag@gmail
Yes, your client is vulnerable. Which ip to connect to is governed by your application, and IP addresses can be falsified, so it is very much possible your client connects to a malicious server. -ag -- sent via 100% recycled electrons from my mobile command center. > On Apr 11, 2014, at 8:32 A

Re: Heart bleed with 0.9.8 and 1.0.1

2014-04-15 Thread Dave Thompson
Possibly too Postelian, OpenSSL answers a received heartbeat request (and thus before the fix answers a malicious request with leaked data) even if the heartbeat extension was negotiated off. Only the build option to exclude the code stops it. OpenSSL will *send* hb request only if/after nego

RE: Help me for ECDHE algorithm

2014-04-15 Thread Dave Thompson
> From: owner-openssl-us...@openssl.org On Behalf Of chetan > Sent: Monday, April 14, 2014 00:42 > xxx.c is my program file. > So, i'm compile simply like "cc xxx.c ". > I am Gettting [undefined reference] This is basic C programming. Whenever you link (not just compile) a C program that uses a

Re: Re: Converting a root certificate from md5 to sha1

2014-04-15 Thread Kyle Hamilton
Stephan, It depends on how pedantic your clients are. If you aren't rekeying, it shouldn't matter, though. X.509 has a "Subject" and an "Issuer". The Issuer of a certificate is the Subject of the certificate which private key was used to sign it. If the Issuer doesn't change, then the matching

Re: RSA Private key extract using Heartbleed

2014-04-15 Thread Luis Rocha
Ok, sorry about the spam the keys have a different header and googling it arround found that: "BEGIN RSA PRIVATE KEY is PKCS#1 and is just an RSA key. It is essentially just the key object from PKCS#8, but without the version or algorithm identifier in front. BEGIN PRIVATE KEY is PKCS#8 and

RSA Private key extract using Heartbleed

2014-04-15 Thread Luis Rocha
Hello All, Please bare with me but could someone explain the following exercise result? How can a different private key generate the same public key? Basically I started a new VM and installed Ubuntu 13. Configured SSL and run the heartbleed script that is available in the wild. After a few pac

RE: New and bleeding - Install Win64 problems

2014-04-15 Thread Aaron Bahmer
Call me wimpy, but after six hours of fighting the compiling process, I went with the slproweb binary. New certificates are also in place. Thanks for the help--I'm no longer bleeding! == Aaron Bahmer Director, Instructional Technology Eastern Wyoming College http://ewc.wy.edu | (307) 532-8284 1-

CVE-2010-5298 and 0.9.8

2014-04-15 Thread no_spam_98
It appears that the NIST NVD entry for CVE-2010-5298 may be incorrect.  This issue seems to affect 1.0.0+.  Nothing earlier - specifically 0.9.8, correct? Thanks for the sanity check. __ OpenSSL Project

RE: SSL_ERROR_SYSCALL errno=0

2014-04-15 Thread Carl Young
This thread have any relevance to you? http://stackoverflow.com/questions/12885680/pem-read-rsaprivatekey-returns-illegal-seek-when-decrypting-using-openssl-libs From: owner-openssl-us...@openssl.org [owner-openssl-us...@openssl.org] on behalf of hhachem

RE: help upgrading to 1.0.1g

2014-04-15 Thread Ricardo Villegas
First of all, what system are you using? _ From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] On Behalf Of laxminarayana.ganes...@maersk.com Sent: Tuesday, April 15, 2014 1:40 AM To: openssl-users@openssl.org Subject: help upgrading to 1.0.1g Hi Team,

Re: SSL_ERROR_SYSCALL errno=0

2014-04-15 Thread hhachem
Strace shows the following before the error: ioctl(10, TCGETS, 0x7fffe068) = 0 mmap(NULL, 4096, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0) = 0x300 26000 _llseek(0xa, 0, 0, 0x7fffe2f8, 0x1) = -1 ESPIPE (Illegal seek) -- View this message in context: http://openssl.6

SSL_ERROR_SYSCALL errno=0

2014-04-15 Thread hhachem
Hello, I have an issue, that I've been trying to resolve for weeks now. I have 2 devices. The major different between them is the linux Kernel version. On Linux 2.6.24.6, ssl_connect() works flawlessly. On 2.4.21 it returns -1. The SSL_get_error() returns SSL_ERROR_SYSCALL but errno is 0 (perror()

help upgrading to 1.0.1g

2014-04-15 Thread Laxminarayana.Ganeshan
Hi Team, Please provide me steps to download and upgrade to 1.0.1g. Thanks in advance Regards, LaxmiNarayana System Specialist, MDS - Operations Maersk Drilling IT Maersk Drilling, Maersk FPSOs, Maersk Supply Service A.P. Moller - Maersk A/S 286/1, Prince Infocity, 7th Floor, Old Mahabalipuram ro

Aw: Re: Converting a root certificate from md5 to sha1

2014-04-15 Thread steffo76
>You need to generate a new certificate with the same data (except a >different serial number and a reference to sha1WithRSAEncryption), >containing the same public key, and signed with the same private key. > >I'd recommend sha256WithRSAEncryption, but that's possibly not an >option for you. > >Ma

Re: Could openssl foundation give itself rules not to accept money from intelligence agencies?

2014-04-15 Thread Steve Marquess
On 04/14/2014 03:01 PM, Benjamin Schulz wrote: > > Hello, > The openssl foundation writes here: > > https://www.openssl.org/support/acknowledgments.html > > ... > > So I think the openssl foundation should take some measures that perhaps may > help to scare intelligence agencies away from o

RE: Could openssl foundation give itself rules not to accept money from intelligence agencies?

2014-04-15 Thread Michael Wojcik
> From: owner-openssl-us...@openssl.org [mailto:owner-openssl- > us...@openssl.org] On Behalf Of Benjamin Schulz > Sent: Monday, 14 April, 2014 15:01 > > Could the openssl foundation add official rules that This list is probably not the place to discuss this at any length, but I for one find the

Re: Help me for ECDHE algorithm

2014-04-15 Thread Matt Caswell
On 15 April 2014 05:40, chetan wrote: > Thanks to you...it's working. > Now i have one last query for you. > I'm generating public and private key files using command line openssl. I > generated 2 .PEM files each for public and private key. > Now i want to generate shared secret from that files us

Re: Converting a root certificate from md5 to sha1

2014-04-15 Thread Kyle Hamilton
You need to generate a new certificate with the same data (except a different serial number and a reference to sha1WithRSAEncryption), containing the same public key, and signed with the same private key. I'd recommend sha256WithRSAEncryption, but that's possibly not an option for you. Make sure

Re: Converting a root certificate from md5 to sha1

2014-04-15 Thread Hanno Böck
I don't know the answer to your main question, but: On Tue, 15 Apr 2014 10:41:20 +0200 steff...@gmx.de wrote: > I need to change this do sha1 because I have clients that do not > accept md5 anymore. If you use SHA256 you won't have to do this again in a few years. (Microsoft announced to depreca

Converting a root certificate from md5 to sha1

2014-04-15 Thread steffo76
Hello world, I am running my own little CA and the root certificate was created using md5: Signature Algorithm: md5WithRSAEncryption I need to change this do sha1 because I have clients that do not accept md5 anymore. Is there any way to convert the existing cert from md5 to sha1 ? I tried co