Hanno Böck :
> I was wondering when exactly (the version) was the OpenSSL library
> > patched for the Bleichenbacher Vulnerability?
>
> It was probably fixed some time in the late 90s. However according to
> https://www.openssl.org/news/changelog.html
>
> the countermeasures were accidentally re
Florian Weimer :
The purpose of the option is to make totally broken applications a bit less
> secure (when they happen to certain servers).
I'd claim it's meant to make totally broken applications a bit *more*
secure :-)
> From my point of view, there is only one really good reason to have th
Jeffrey Walton :
> Is there a way to compile without the patch? I think I would rather
> 'config no=ssl3' and omit the additional complexity. Its additional
> protocol complexity and heartbleed is still fresh in my mind.
>
There's no way to compile without the patch, other than reverting it. It'
mancha :
> Bodo Moeller wrote:
>
> I certainly think that the claim that "new SCSV does not help with
> > [the SSL 3.0 protocol issue related to CBC padding] at all" is wrong,
> > and that my statement that TLS_FALLBACK_SCSV can be used to counter
> > CVE-2
Salz, Rich :
Disabling ssl3 is a good thing. But set the fallback because silently
> dropping from tls 1.2 to tls 1.1 is bad.
>
All this assumes that your client application *does* explicitly fall back
from TLS 1.2 to TLS 1.1, instead of just relying on automatic protocol
version negotiation. If
This is not quite the same discussion as in the TLS Working Group, but I
certainly think that the claim that "new SCSV does not help with [the SSL
3.0 protocol issue related to CBC padding] at all" is wrong, and that my
statement that TLS_FALLBACK_SCSV can be used to counter CVE-2014-3566 is
right.
mancha :
> Any reason for the s_client -fallback_scsv option check to be within an
> #ifndef OPENSSL_NO_DTLS1 block?
Thanks for catching this. No, there's no good reason for that; I should
move it elsewhere.
Bodo
Here's a patch for the OpenSSL 1.0.1 branch that adds support for
TLS_FALLBACK_SCSV, which can be used to counter the POODLE attack
(CVE-2014-3566; https://www.openssl.org/~bodo/ssl-poodle.pdf).
Note well that this is not about a bug in OpenSSL -- it's a protocol issue.
If SSL 3.0 is disabled in e
Good point, this doesn't look right; this is not how OpenSSL normally
reports details. The DTLS code hasn't received the same attention as the
SSL/TLS code yet, because it's used a lot less. Filing a report to
r...@openssl.org makes sense -- it doesn't look as if this has been reported
before.
Bod
jeff :
I keep getting some application crash in openssl module, I checked the
> dumps and stacks and found that although the stacks vary, the ssl_accept
> function is found on all of them, below are some of exmaples. I google the
> related information about this, looks like there is some problem w
> > (So we probably should use the current time in addition to the PID to
> get a
> > general solution to the PID wrap-around problem even on systems where
> > actual independent reseeding isn't possible.)
>
> The FIPS PRNG uses a combination of PID, a counter and a form of system
> timer
> for the
On Thu, Aug 22, 2013 at 4:50 AM, Bodo Moeller wrote:
>
> Most other libraries I've seen handle this by saving the pid in a static
>> variable, and then comparing the current pid to it. This has the advantage
>> of not needing pthreads, and also of only adding the entrop
> Most other libraries I've seen handle this by saving the pid in a static
> variable, and then comparing the current pid to it. This has the advantage
> of not needing pthreads, and also of only adding the entropy to the child
> if it is actually needed (i. e. it doesn't exec after fork).
>
We m
On Tue, Oct 9, 2012 at 12:29 PM, Rune K. Svendsen wrote:
> I've been researching if EC_GROUP_precompute_mult has any effect when
> verifying ECDSA signatures using ECDSA_verify, and my results are somewhat
> inconclusive. I see a small speedup, around 2-5%, but I'm not sure what the
> reason is f
On Tue, May 8, 2012 at 9:00 PM, Bin Lu wrote:
> If that is the case, why EC_KEY is exposed in ec.h, and how do I make
> use of the functions that requires this object, e.g.
> EVP_PKEY_get1_EC_KEY()?
>
To use functions like these, you don't need the struct details (you'd only
need those to peek
>
> My application requires me to constantly do things like:
>
> - return n, e, p from an openssl RSA key token
> - construct an openssl RSA public key token from n, e
> - construct an openssl RSA private key token from n, e, p
>
> I do this using the bignum-bin converters and knowledge of the RSA
> I noticed that EC_KEY (ec_key_st) is not defined in ec.h but in ec_lcl.h
> which is not a public header file, not like RSA(rsa_st) in rsa.h and DSA in
> dsa.h. Is that correct?
>
>
Yes, this is intentional - this intentionally prevents applications from
accessing ec_key_st fields directly, forc
On Fri, Apr 27, 2012 at 2:29 PM, Jack Bauer wrote:
> Currently I don't know, if the type of DH parameters can be configured
> in nginx. But I will investigate ..
>
> The only solution (for us, at the moment) seems to be to keep kEDH
> enabled and hope, that most browsers will use ECDHE_RSA in th
On Mon, Nov 21, 2011 at 10:51 AM, Marco Molteni wrote:
> The OpenSSL security advisory of 2011-09-06 (
> http://www.mail-archive.com/openssl-announce@openssl.org/msg00108.html),
> regarding "TLS ephemeral ECDH crashes in OpenSSL" states that the issue,
> for branch 0.9.8, applies to "OpenSSL 0.9
On Fri, Nov 4, 2011 at 5:23 PM, John Foley wrote:
> None of the ECDH-RSA cipher suites appear to work in 0.9.8r. Yet they
> work in 1.0.0. Is this expected?
>
Yes -- the OpenSSL 0.9.8 branch includes basic support for elliptic-curve
cryptography, but TLS integration wasn't finished. This is b
.
Neel Mehta (Google) identified the vulnerability. Adam Langley and
Bodo Moeller (Google) prepared the fix.
Which applications are affected
- ---
Applications are only affected if they act as a server and call
SSL_CTX_set_tlsext_status_cb on the server's SSL_CTX.
p4qKI7363uBnLgLGQIgS8BBar0n8QARYv4t6c7O+HR3Kn7VCix8cErUm5MkoL79n
C2YJVRKPmpuwoPkLGwC6beB1fBiwvUaJd/n+BSU5LO534QcSzF+u4UKczsGnPX72
HSA/Mzf8C6w=
=Rpu4
-END PGP SIGNATURE-
--
Bodo Moellerb...@openssl.org
OpenSSL Project http://www.openssl.org
.
Neel Mehta (Google) identified the vulnerability. Adam Langley and
Bodo Moeller (Google) prepared the fix.
Which applications are affected
- ---
Applications are only affected if they act as a server and call
SSL_CTX_set_tlsext_status_cb on the server's SSL_CTX.
p4qKI7363uBnLgLGQIgS8BBar0n8QARYv4t6c7O+HR3Kn7VCix8cErUm5MkoL79n
C2YJVRKPmpuwoPkLGwC6beB1fBiwvUaJd/n+BSU5LO534QcSzF+u4UKczsGnPX72
HSA/Mzf8C6w=
=Rpu4
-END PGP SIGNATURE-
--
Bodo Moellerb...@openssl.org
OpenSSL Project http://www.openssl.org
On Sep 4, 2009, at 12:29 AM, Will Bickford wrote:
In the following sample test case I get a false-positive from OpenSSL
1.0.0 Beta 3. Note that this tests specifically for a vector larger
than should be allowed (192/32 = 6 32-bit integers, but Qy requires
7). Other test cases succeed or fail a
On Sat, Jan 31, 2009 at 6:49 AM, wrote:
> I've not looked at the OpenSSL code for a few years now. Last time I looked
> the only way to do things was via a "BIO" and the BIO functions did the
> crypto.
That's not right. The BIO functions don't do crypto (well, you can
use BIO structures to
On Wed, Jul 23, 2008 at 7:06 PM, Keith Ellul <[EMAIL PROTECTED]> wrote:
> Basically, I see that ECDH is part of openSSL. I have an ECC keypair, and I
> have someone else's ECC public key. I want to use ECDH to agree on some key
> material. Can I do this from the command line (ie, using the op
On Fri, Aug 24, 2007 at 01:33:17PM +0300, Arne Ansper wrote:
> On Mon, 26 Jun 2006, Darryl Miles wrote:
>> Bodo Moeller wrote:
>>> When using SSL_write() over a non-blocking transport channel, you may
>>> have to call SSL_write() multiple times until all your data ha
On Thu, Feb 22, 2007 at 03:30:12AM -0500, Victor Duchovni wrote:
> --- ssl/ssl_lib.c 2007-02-19 12:01:04.0 -0500
> +++ ssl/ssl_lib.c 2007-02-22 03:07:27.0 -0500
> @@ -1946,7 +1946,7 @@
> alg_k = s->s3->tmp.new_cipher->algorithm_mkey;
> alg_a = s->s3->tmp.new_cip
On Mon, Feb 19, 2007 at 03:22:44PM -0500, Victor Duchovni wrote:
> As far as the 0.9.9 patch is concerned, is it possible to cache the
> initial sorted order? Some applications process cipherlists for every
> connection (destination dependent cipher lists), and it would be nice to
> keep this effi
On Mon, Feb 19, 2007 at 02:19:27PM -0500, Victor Duchovni wrote:
> Regardless of the specific details, using a comparator makes the order
> more systematic. One can still quible over whether anonymous auth beats
> RSA auth, and I may not get my wish there, but I still think a sort based
> based on
On Mon, Feb 19, 2007 at 02:19:27PM -0500, Victor Duchovni wrote:
> [...] I
> think it is cleaner to put the anonymous kEECDH and kEDH ciphers first,
> they use the strongest key-exchange mechanisms available, and best meed
> the aut
On Sat, Feb 17, 2007 at 11:45:58PM -0500, Victor Duchovni wrote:
> Currently the OpenSSL "DEFAULT" cipherlist serves two functions:
>
> - Sort the cipherlist to put the strongest, most desirable algorithms
> first.
>
> - Exclude ciphers that most applications should not be exposed to
On Fri, Jun 30, 2006 at 09:41:08AM -0700, Chris Clark wrote:
>> It's not a bug that AES182 is classified as "HIGH", although it is a
>> missing feature that there is no class that encompasses only the
>> 256-bit ciphers. That's why there now is "@STRENGTH", which does
>> not add any ciphers and j
On Fri, Jun 30, 2006 at 07:29:04AM -0400, Victor Duchovni wrote:
>>> Currently I specify the group (HIGH/MEDIUM/LOW) and remove some ciphers
>>> from a group (IDEA and ADH). I also remove AES at the beginning (Shif
>>> +="-AES:") and add it later because if I don't remove AES there is no
>>> way t
On Mon, Jun 26, 2006 at 02:04:47PM +0100, Darryl Miles wrote:
> Bodo Moeller wrote:
>> On Mon, Jun 26, 2006 at 12:35:57PM +0100, Darryl Miles wrote:
>> Yes. During the first call to SSL_write(), OpenSSL may take as many
>> bytes as fit into one TLS record, and encrypt this f
On Mon, Jun 26, 2006 at 12:35:57PM +0100, Darryl Miles wrote:
> "Some of the calls to SSL_write() may read some of your data", I am
> still not such how the reading of data impacts the write operation. Are
> you saying that when WANT_READ is returned from SSL_write() the OpenSSL
> library has
On Mon, Jun 26, 2006 at 12:25:09PM +0200, Leon wrote:
> On Mon, 2006-06-26 at 11:44 +0200, Bodo Moeller wrote:
>> What is the file descriptor number that you observe during these
>> calls?
> The file descriptor is 1507 which seems correct since each thread opened
> a soc
On Mon, Jun 26, 2006 at 08:49:19AM +0200, Leon wrote:
> I tracked the bug with gdb and found that it fails in RAND_poll(),
> called from SSL_accept(), when a new session key is generated. The
> strange thing is that after the file descriptor set is zeroed
> [(FD_ZERO(&fset)] the call [FDSET(fd,&fs
On Thu, Jun 22, 2006 at 10:41:14PM +0100, Darryl Miles wrote:
> SSL_CTX_set_mode(3)
>
> SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER
> Make it possible to retry SSL_write() with changed buffer
> location (the buffer contents must stay the same). This is not the
> default to avoid the mis-
>
On Sat, Jun 10, 2006 at 06:25:33AM -0600, The Doctor wrote:
[...]
> making all in crypto/evp...
> make: don't know how to make e_camellia.o. Stop
> *** Error code 1
Oops ... a new file that I forgot to add to the CVS. This will be
fixed in the next snapshot (20060611).
_
On Sun, May 29, 2005 at 03:43:33PM +0200, Nadav Golombick wrote:
> If I am using only 2 threads with each thread containing its own SSL_CTX
> object, do I still need to use locking functions?
Yes! This is very important because OpenSSL uses some global data
structures that will be shared by all
On Mon, Jun 23, 2003 at 11:46:57AM +0530, Wilson wrote:
> Im facing a problem with SSL_write(). I have a server and client
> communicating over TLS. Initial handshaking is done successfully. But as I
> increase the load on server (Connecting more clients[5 to 10 ] and increaded
> the message size)
Christopher Fowler <[EMAIL PROTECTED]> in epsilon.openssl.users:
> I'm using the openssl source and not redhat packages. I recently got an
> email from Red Hat that had this header:
>
> Security Advisory - RHSA-2003:062-11
> Since I'm on source and not rpm, I'm looking for a patch. Is there a
On Thu, Feb 06, 2003 at 01:38:11PM +, Séamus O'Toole wrote:
> I have recently downloaded the latest version of OpenSSL and I am using it
> in the development of a Secure Voice over IP Project.
>
> Is there a way to extract the session key from the SSL session and use it to
> encrypt the dat
On Fri, Feb 07, 2003 at 03:57:17PM +0100, Alexander Biehl wrote:
> but, is there no way to use blocking sockets and to use poll() or
> select()?
When select() or poll() indicate that *some* data is available for
reading, there is no guarantee that it is enough data for OpenSSL to
continue without
On Fri, Feb 07, 2003 at 12:15:31PM -0800, David Schwartz wrote:
> On Fri, 7 Feb 2003 20:42:50 +0100, Jasper Spit wrote:
>> My point was to make clear that your statement that 'it is almost always
>> an error to use select() with non blocking sockets' is simply not true.
>> I think that might be re
On Fri, Feb 07, 2003 at 01:10:30PM +0100, Alexander Biehl wrote:
> is there any function "SSL_poll()"?
> i would like to see, if there is data I can read.
You can use SSL_pending(ssl) to check if data is available for
immediate reading. However, this will just report on data that has
already rea
On Thu, Jan 30, 2003 at 11:02:33AM +0100, Martin Witzel wrote:
> This refers to 0.9.7. I have not verified it with earlier versions
>
> When I setup the build process with the 'config no-err' option, I get a lot
> of _link_ errors in the apps directory, because the complete crypto/err
> directory
On Thu, Jan 30, 2003 at 10:41:08AM -, Nigel Spowage wrote:
> my client app calls SSL_renegotiate() and gets a return value of 1
> (success i presume, as i cann't find a man page for this
> function). this sets up internal flags in ssl ready to negotiate the
> connection.
>
> i call SSL_do_han
On Mon, Jan 27, 2003 at 03:21:45PM -, Nigel Spowage wrote:
> okay, so the proper way to renegotiate a connection is :
>
> 1 - call SSL_renegotiate()
> 2 - call SSL_do_handshake()
> 3 - wait for either
> 3a- SSL_renegotiate_pending() to return 0, or
> 3b- an acceptable amount of time (which
On Mon, Jan 27, 2003 at 10:33:44AM -, Nigel Spowage wrote:
> i'm currently trying to implement ssl renegotiation for an
> application which uses openssl in a non-blocking mode.
> SSL_renegotiate(ssl);
> result = SSL_do_handshake(ssl);
> /* result is okay at this point */
>
> /* my app waits
Claus Assmann <[EMAIL PROTECTED]>:
>> Ed Kasky <[EMAIL PROTECTED]>:
>>> 27781:error:140890E9:SSL routines:SSL3_GET_CLIENT_CERTIFICATE:tls peer did
>>> not respond with certificate list:s3_srvr.c:1638:
> AFAIK the client can respond with an empty list (RFC 2246, section
> 7.4.6). This is what sen
On Wed, Jul 24, 2002 at 04:07:46PM +0100, Haikel MEJRI wrote:
> I'm trying openssl-0.9.7-beta2, I want to know why the elliptic curve
> module is not included in the openssl command line tool?
0.9.7 includes just a library for elliptic curve arithmetic, but no
further ECC support. This will cha
Gregg Andrew <[EMAIL PROTECTED]>:
> That being said, are the fixes in 0.9.6g reliavant to upgrading
> 0.9.6e on unix/solaris platform,
Unless you have already installed 0.9.6f, you may want to upgrade to
0.9.6g. Most problems are fixed in 0.9.6e, but there's at least a
possibility of denial of
On Fri, Jun 14, 2002 at 04:17:58PM +0200, Martin Sjögren wrote:
> I'm having a few delicate problems, and I think at least one of them
> adheres to non-blocking sockets, which is what I use.
>
> 1) Is it possible to get a WANT_WRITE error when I actually don't have
> anything to send (on my high
On Tue, Jun 11, 2002 at 11:16:49AM +0200, Joerg Bartholdt wrote:
> trying the 0.9.7-beta1 I came across a problem with a OpenSSL097 server
> (e.g. openssl s_server) and a iSaSiLk 3.03 client (demo.basic.SSLClient).
> When the Handshake took place, and the client send some initial data
> (e.g. a
On Fri, Jun 07, 2002 at 05:18:06PM +0200, Bodo Moeller wrote:
> On Wed, Jun 05, 2002 at 07:27:15PM -0400, Shekhar Mahadevan wrote:
>> I'm trying to connect to https://secure01.principal.com/ using OpenSSL.
>> Three other SSL toolkits (including JSSE) work OK, but OpenSSL resu
Magnus Kulke <[EMAIL PROTECTED]>:
> i'm writing an ssl client application for encrypted ftp. (i use SSL_set_fd
> for IO) however i have the problem that performing an SSL_read, it delivers
> only parts of the text. i have to perform SSL_read three times to (output
> looks like this: 'break!200
On Thu, Mar 14, 2002 at 01:00:46PM -0800, John Hughes wrote:
> Since s->rstate is set to SSL_ST_READ_HEADER prior to record
> decryption and decompression, wouldn't SSL_pending() still
> incorrectly indicate that there is data ready to be read in cases
> where either of these fail?
I guess so, b
John Hughes <[EMAIL PROTECTED]>:
> I can confirm: There is a discrepancy between the SSL_pending()
> manpage and the source. SSL_pending() returns rrec.length in
> ssl3_pending() (as of 0.9.6a, we also verify that the SSL record
> being processed is application data, else zero is returned). Thi
Lutz Jaenicke <[EMAIL PROTECTED]>:
> On Wed, Feb 20, 2002 at 12:29:03PM +0200, Yoram Zahavi wrote:
>> My server application is using SSL_clear to reuse the SSL object, instead of
>> allocating a new one on every new connection. On first connection the client
>> succeeds to connect the server, and
On Mon, Jan 28, 2002 at 06:02:32PM -0600, Phil Howard wrote:
> Does OpenSSL integrate installation paths into its installed files?
>
> If the answer is NO, then that should mean it is safe to move the
> library files from /usr/lib to /lib, right?
The answer is yes, but it usually should be safe
Steve Shanks <[EMAIL PROTECTED]>:
> We have a situation with a non-openssl server (version 2 of SSL,
> SSL_CK_RC4_128_EXPORT40_WITH_MD5) under development interfacing into an
> openssl client (I downloaded a windows binary of openssl 0.9.6b). Everything
> goes good until the server_finished is se
On Mon, Jan 07, 2002 at 06:58:07PM +0100, Tomas Svensson wrote:
> 1) Non-blocking SSL_accept()
>
> SSL_accept() always returns -1 and SSL_ERROR_WANT_READ (via
> SSL_get_error()) but when I do SSL_read() in response to the first
> error, [...]
Why do you do that? Please read the SSL_get_error m
Rob Beckers <[EMAIL PROTECTED]>:
[...]
> I'm glad you can reproduce the problem, that's half the battle. I'm using
> OpenSSL's internal cache (single threaded program using async sockets, so
> no need for external cache), and as stated it's not re-using.
>
> There's no particular hurry to get
On Mon, Nov 26, 2001 at 05:47:16PM -, Andy Schneider wrote:
> If I don't renogiate, can I put a read () and write () down in an
> SSL_connection in two different threads at the same time?
No.
--
Bodo Möller <[EMAIL PROTECTED]>
PGP http://www.informatik.tu-darmstadt.de/TI/Mitarbeiter/moel
On Mon, Nov 26, 2001 at 11:39:26AM +0100, Rygg Christian Ingemann wrote:
> I'm making a few objects that are communicating with eachother using SSL. It
> almost works now, but I want my client to read from the connection until
> there are no more to read, without knowing how much the server is se
Per F. <[EMAIL PROTECTED]>:
> Is it really that simple?
No.
> I'm asking because the Configure script told me that it configured
> without threads support, see the command output below. Isn't something
> like "-threads" or "-D_REENTRANT" needed in CFLAGS for thread support?
Many systems need
On Fri, Sep 21, 2001 at 04:59:17PM +0300, Marko Asplund wrote:
> has anyone done an analysis of the OpenSSL PRNG which would be available
> for public? i've read the Random Number Generation chapter of Peter
> Gutmann's PhD thesis (The Design and Verification of a Cryptographic
> Security Archite
On Fri, Sep 21, 2001 at 10:09:37AM +0100, Andy Schneider wrote:
> This patch works. However it is also worth noting that my tests expose a
> minor caveat. If a client and server request handshakes thus:
>
> Server:
> Read
> Renegotiate
> Read
> Write
>
> Client:
>
Bodo moeller <[EMAIL PROTECTED]>:
> Andy Schneider <[EMAIL PROTECTED]>:
>> I applied the patch and it has allowed me to perform a handshake even
>> when there are writes in-flight. [...]
> Please try the following patch instead. This should remove the cause
> o
Andy Schneider <[EMAIL PROTECTED]>:
> I applied the patch and it has allowed me to perform a handshake even
> when there are writes in-flight. For the record then (and those who have
> wrestled with SSL_renegotiate and have found this through a search):
>
> 1) I use SSL_renegotiate () and SSL_re
Lutz Jaenicke <[EMAIL PROTECTED]>:
> There exists an address "[EMAIL PROTECTED]", but in fact the
> email is just forwarded to openssl-dev. Therefore, please send bug
> bug reports to [EMAIL PROTECTED]
No, to openssl-bugs please (which can be treated specially by programs
such as procmail).
On Fri, Sep 07, 2001 at 11:06:06AM +0300, Andrew Popov wrote:
> We need to set timeout on SSL_accept()
> Seting with SSL_CTX_set_timeout(SSL_CTX *ctx, long t) has no effect
No, this function is not about connection timeouts (it is about the
session cache).
To impose a timeout on SSL_accept, use
On Wed, Aug 29, 2001 at 03:57:07PM +0200, Peter Sommerlad wrote:
> How do I ensure browsers with both export grade and non-export grade
> ciphers connect using stronger encryption? Or is that done
> automatically today?
Yes, this should always happen automatically. The client presents its
list
On Tue, Jul 31, 2001 at 08:26:42PM -0700, Yongdae Kim wrote:
> I think my question is basically "how much more expensive modular
> exponentiation is compared to modular multiplication for the given
> parameters using OpenSSL library?"... And my simulation shows that it is
> around 80 times...
Jamshid Shoghli <[EMAIL PROTECTED]> in epsilon.openssl.dev:
> I am trying to generate certificates with public exponent of the public key
> with value 244 or higher,
>
>RSA_generate_key(bits, exp, NULL, NULL);
> where bits is 1024, and exp is 244.
>
> But this call never comes back. I tri
On Wed, Mar 28, 2001 at 11:48:31AM +, Paulo Matos wrote:
> Changes between 0.9.7 and 0.9.6 (from CVS)
> *) Fix 'openssl passwd -1'.
> [Bodo Moeller]
>
> Changes between 0.9.6 and 0.9.5a
> *) Add BSD-style MD5-based passwords to 'openssl passw
On Mon, Mar 19, 2001 at 11:13:22PM -0700, Nathan Parker wrote:
> How can I poll the SSL layer to see if it has data I can read? I want to
> implement a function to read N bytes with a time limit, but using select()
> messes me up -- it doesn't know if there is data available within SSL.
SSL_p
On Mon, Mar 19, 2001 at 01:54:46PM -0500, ackka ackka wrote:
> [...] When looking into this more I found that the infinite loop is caused
> on a SSL_peek call.
Please try the beta for OpenSSL 0.9.6a (available from ftp.openssl.org
or one of the mirrors, http://www.openssl.org/source/mirror.html
On Fri, Mar 09, 2001 at 10:19:47AM -0800, Marcos Mensalvas wrote:
> When I tried to install openssl on my solaris 5.8 box it responded with a
> error during the
> 'make' command was executed:
>
> Error code 1
> make:Fatal error: Command failed for target 'cryptlib.o'
>
> Error code 1
> make: Fa
On Fri, Mar 09, 2001 at 09:30:10AM -0600, John Pliam wrote:
> I was trying to download the latest openSSL *and* check it's integrity.
> But I could not find a signature or find a website that served the source
> from an https URL. (https://www.openssl.org/ redirects to a secure site
> mainta
Dan Kegel <[EMAIL PROTECTED]>:
>>> The symptom was, SSL_write returned -1. SSL_get_error returned 1 (SSL_ERROR_SSL).
>>> ERR_error_string returned "error::lib(255):func(4095):reason(4095)".
>> Use ERR_error_string() on the return value of ERR_get_error(), not on the
>> return value of S
Dan Kegel <[EMAIL PROTECTED]>:
> Bodo Moeller:
>> Dan Kegel <[EMAIL PROTECTED]>:
>>> I just realized I have to accept either SSLV2 or SSLV3 (or TLS)
>>> connections, so I switched from SSLv3_server_method() to
>>> SSLv23_server_method(). But oops,
Michael Sierchio <[EMAIL PROTECTED]>:
> FreeBSD's implementation of /dev/random allows one to specify
> which interrupts stir the entropy pool. This, from the /etc/rc.conf
>
> and_irqs="4 6 7 9 10 11 12 14 15"
>
> I haven't found anything similar on Linux, and would be grateful
> for sug
On Mon, Dec 04, 2000 at 04:34:52PM -0800, Jeffrey Ricks wrote:
[...]
> If I use my java client with the DES-CBC3-SHA cipher, everything works
> fine. It's when I use that cipher with any openssl-based apps
> (including s_client) that things don't work. If I run this:
>
> openssl s_client -conn
On Tue, Nov 28, 2000 at 09:13:43AM -0800, Bill Browning wrote:
> Has anyone done a Solaris64 compile with openssl 0.9.6 ? I have tried to do
> so (commands & errors listed below) but am at a bit of a loss as to why this
> compile type works with the 0.9.5a tar file and not with the 0.9.6 tar file
On Sun, Nov 05, 2000 at 10:17:08PM -0600, Scott Goodwin wrote:
> The behavior:
>
> 1. First hit from browser: session id is generated
> and stored in cache.
>
> 2. Second hit: session id is found in the cache
> and used as expected.
>
> 3. Third hit: session id is found, but *not* used
On Wed, Nov 08, 2000 at 12:00:57PM +0100, Frédéric Gariador wrote:
> I'd like to use Openssl to generate a RSA key pair on Window NT.
>
> I wonder about some issues :
>
> - I use the -rand option to specify files used to seed the random number
> generator.
> According to the number of these fil
On Tue, Aug 29, 2000 at 02:17:24PM +0200, Andreas Jungmaier wrote:
[...]
> After looking through the openssl-source code I figured (since there
> are BIO-class implementations for memory i/o, socket i/o as well as
> remote procedure call-based i/o and a BIO-null class template) that
> it s
On Thu, Nov 02, 2000 at 03:34:07PM -0500, Gregory Nicholls wrote:
> I'm using the State Threads package to implement an SSL
> server. State Threads are non-preemptive and only context switch at
> defined API boundaries (specifically when performing network
> IO). This means that multiple thre
On Thu, Nov 02, 2000 at 08:46:15AM -0800, Geoff Thorpe wrote:
> On Thu, 2 Nov 2000, Alex Bourov wrote:
>> If you have multiple network cards on the system with various IP addresses
>> or you assigned several IP addresses to this server, then you can
>> distinguished between then by using . If yo
On Thu, Oct 19, 2000 at 06:03:02PM +0200, Thomas Leyer wrote:
> I want to use this in kernel mode, so I think the
> exclusion of ssl2 should take place while I build the
> libs...
Try compiling with -DNO_SSL2. If this does not work out of the box,
send patches to openssl-dev.
__
On Wed, Sep 20, 2000 at 05:45:52PM +0200, Nick De Roeck wrote:
> Anyway, I'll try the test-run as you suggested (SSL_set_cipher_list(ctx
> *,"RC4-SHA) I presume ;-)). also, some tests I did today seem to show that
> the error disapears when using SSLv2_server_method.
..._client_method, presumabl
On Wed, Sep 20, 2000 at 04:48:39PM +0800, Michael Lee wrote:
[...]
> I have encountered exactly the same "bad mac decode" error before, although
> I am using VC++6 on Windows 98. My HTTPS client application attempts to
> connect to its.bocgroup.com (210.177.52.102) using SSLv23_method, but fails
On Fri, Sep 15, 2000 at 09:22:24AM +0800, Michael Lee wrote:
> Bodo Moeller wrote:
>> Note that SSLv2_method will fail for some servers because they
>> no longer support SSL 2.0 (and stopping to support it is a good
>> thing because of its deficiencies). I suggest using
>
On Sat, Sep 09, 2000 at 09:19:34AM +0800, Fung wrote:
> If you look at the source code, you will see the following
> static int ssl3_get_record(SSL *s)
> [...skipped]
> n=ssl3_read_n(s,SSL3_RT_HEADER_LENGTH,
>SSL3_RT_MAX_PACKET_SIZE,0);
> if (n <= 0) return(n); /* error or non-blocking */
On Fri, Sep 08, 2000 at 05:44:35PM +0800, Fung wrote:
> I have found that there is a serious bug located in the static
> function ssl3_get_record in s3_pkt.c. The fault is that the function
> NEVER gets the version number of SSL and MUST returns "wrong version
> number" error. That means if I cre
On Fri, Sep 08, 2000 at 11:10:23AM +0800, Fung wrote:
> Do anyone know what is the diff. between SSLv2_method and
> SSLv23_method?? Once I used SSLv23_method to create SSL_CTX for my
> client program, handshake failure returned when connected to some
> web server. When I changed to use SSLv2_meth
1 - 100 of 322 matches
Mail list logo