[openssl-users] Using an engine for supporting SSL/TLS session creation

2018-11-15 Thread Birch Jr, Johnnie L
Hi, I have a question that is maybe similar to this one asked about a year ago: https://mta.openssl.org/pipermail/openssl-users/2017-December/007050.html. I want to experiment with trying to hide the keys and certificates used during TLS session creation inside trusted hardware. I am not sure w

Re: [openssl-users] configuring OpenSSL to split handshake messages

2018-11-15 Thread Eugène Adell
Thanks for all of your answers. I tried Matt's quick hack, and I confirm it's quick and efficient. I compiled and ran an Apache server, locally (but I'll make more tests) I see what I wanted to see, with the server handshake records being sent one by one. Here is the capture info : No. Time

Re: [openssl-users] configuring OpenSSL to split handshake messages

2018-11-15 Thread Viktor Dukhovni
> On Nov 15, 2018, at 5:53 AM, Eugène Adell wrote: > > I am looking for a way to configure OpenSSL then it will send handshake > records one by one in their respective TCP packet, instead of sending one > big message containing several records. Typically, in my network captures > I see the server

Re: [openssl-users] Extracting decrypt key for AES from openssl on client side

2018-11-15 Thread Viktor Dukhovni
> On Nov 15, 2018, at 9:30 AM, Short, Todd via openssl-users > wrote: > > I have seen this done for hardware acceleration; where the crypto chip can do > everything except the handshake. > (In fact, this mechanism protected at least one device that I know of from > the Heartbleed debacle, sinc

Re: [openssl-users] Extracting decrypt key for AES from openssl on client side

2018-11-15 Thread Short, Todd via openssl-users
I have seen this done for hardware acceleration; where the crypto chip can do everything except the handshake. (In fact, this mechanism protected at least one device that I know of from the Heartbleed debacle, since the hardware crypto did not understand the record type.) Look at how the kernel

Re: [openssl-users] configuring OpenSSL to split handshake messages

2018-11-15 Thread Michael Wojcik
> From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf > Of Matt Caswell > Sent: Thursday, November 15, 2018 06:12 > > On 15/11/2018 10:53, Eugène Adell wrote: > > I am looking for a way to configure OpenSSL then it will send handshake > > records > > one by one in their respec

Re: [openssl-users] configuring OpenSSL to split handshake messages

2018-11-15 Thread Salz, Rich via openssl-users
You can do this by writing your own BIO (probably based on memory) that then dribbles data out to its own internal socket. -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Re: [openssl-users] configuring OpenSSL to split handshake messages

2018-11-15 Thread Matt Caswell
On 15/11/2018 11:17, Eugène Adell wrote: > This is mainly for experimental reason (client compliance checking, > performance > measurement). As the SSL/TLS protocol allows it, why not to test ? > If no other solution than modifying the source code, where should I look ? That involves messing wi

Re: [openssl-users] configuring OpenSSL to split handshake messages

2018-11-15 Thread Eugène Adell
This is mainly for experimental reason (client compliance checking, performance measurement). As the SSL/TLS protocol allows it, why not to test ? If no other solution than modifying the source code, where should I look ? Le jeu. 15 nov. 2018 à 12:12, Matt Caswell a écrit : > > > On 15/11/2018 1

Re: [openssl-users] configuring OpenSSL to split handshake messages

2018-11-15 Thread Matt Caswell
On 15/11/2018 10:53, Eugène Adell wrote: > Hello, > > I am looking for a way to configure OpenSSL then it will send handshake > records > one by one in their respective TCP packet, instead of sending one big message > containing several records. Typically, in my network captures I see the serve

[openssl-users] configuring OpenSSL to split handshake messages

2018-11-15 Thread Eugène Adell
Hello, I am looking for a way to configure OpenSSL then it will send handshake records one by one in their respective TCP packet, instead of sending one big message containing several records. Typically, in my network captures I see the server sending one message containing Server Hello + Certific