How not to be vague and overbroad

2004-01-12 Thread Brian Hatch
you. Further identical requests will probably not get you any further until you've determined what problems you're having, and what your boss actually wants you to do with OpenSSL. -- Brian Hatch "Always plant a lie inside Systems anda truth, m

Re: RE : RAND_status always returns 1

2003-11-21 Thread Brian Hatch
. IIRC, the OpenSSL PRNG seeds itself as it is used anyway, so even if you wanted to seed it with constant data for testing purposes, over time it's going to start giving you different output anyway. -- Brian Hatch The roll of elder Systems andbrot

Re: RE : RAND_status always returns 1

2003-11-20 Thread Brian Hatch
th totaly unrandom junk if it needs to, and the list of offered ciphers is sorted by speed as measured on my 686, rather than by cipher strength. But then again, I can't think of any other valid reasons for doing things this way. It kinda hurt writing it, even though it was correct for the

Re: SSL_accept error

2003-11-13 Thread Brian Hatch
> One more thing. > > The error string is: > > "error:0002:lib(0):func(0):system lib" Suggest you call ERR_load_error_strings() and/or SSL_load_error_strings() so those become humanly readable... -- Brian Hatch Time fli

Re: openssl-based win32 programs

2003-10-15 Thread Brian Hatch
kernel, for what should > be fairly obvious reasons). Excellent explanation, it's all clear to me now, thanks. I don't use Wine often (I use Crossover's version on the unfortunate and rare occasion where I need native Word) but I wanted to make sure I wasn't missing any

Re: openssl-based win32 programs

2003-10-15 Thread Brian Hatch
data, or is it snagging true entropy from the underlying unix-like system (/dev/*random, etc) ? -- Brian Hatch "I don't mean to alarm Systems andyou, but your pants Security Engineer are talking to you." http://www.ifokr.org/br

Re: "Official" way to increment SSL_SESSION reference count

2003-09-08 Thread Brian Hatch
f it. > Oh, and thanks for making me look at this - I've just realised the locking > in ssl/ssl_sess.c is wrong ... commiting a fix shortly. :-) No prob. But while you've decreased my workload with your response, seems I've added to yours. Sorry. ;-) -- Br

"Official" way to increment SSL_SESSION reference count

2003-09-08 Thread Brian Hatch
it's not clean for the purpose in this case. (One section of code has a SSL_SESISON* and another needs to get a copy without having access to the underlying SSL*, but the code come from two products, so I wouldn't want to introduce a memory leak in the one that actually does t

Re: Reverse of @STRENGTH?

2003-08-25 Thread Brian Hatch
D. Since the order will differ based on hardware, accelerators, etc, this is probably impossible to define. I'll try to use 'openssl speed' to guestimate a proper order. Once I get the rest of it working... -- Brian Hatch "So Zathras talks to dirt.

Reverse of @STRENGTH?

2003-08-24 Thread Brian Hatch
an do, but it preferss 256 bit AES over 168 bit 3DES in the HIGH suit, for example. I want the worst crypto (fastest speed, since security is not a design goal at all) possible. I know you'd never want this in a secure setup, that's not what I'm working on. -- Brian Hatch

Re: FQDN

2003-07-25 Thread Brian Hatch
tion of MITM. The emails written by Rich, Geoff, David, and I have agreed on the facts of what SSL/TLS can do, what security (x509 usage) it offers and when it fails. It's only the definition of MITM in which we've divided into separate camps. Let's all agree to dissag

Re: FQDN

2003-07-25 Thread Brian Hatch
pond to the list, and I hope not to respond off the list either. [1] Yes, we all dissagree with the definition of 'MITM', which is why I just called this 'attacks'. -- Brian Hatch "Look, somebody's got to have Systems and

Re: FQDN

2003-07-25 Thread Brian Hatch
stworthy. What if I'm a verisign employee and can manage to generate a verisign-signed cert for www.microsoft.com? I can MITM, and no alerts will occur until/unless they figure out what happened and revoke my certificate, which requires that CRL checking is available in

Re: FQDN

2003-07-25 Thread Brian Hatch
7;ve been saying above is that if something uses SSL, it is secure. I still say it must have SSL done *right* for it to be secure. All over the world, applications are being written by people with no crypto background, using third party libraries, who blindly piece together sample code until an SSL ha

Re: FQDN

2003-07-25 Thread Brian Hatch
eone interposes themselves in between you and the endpoint and you do not know that they are there? Is there not a generic term for it? Wouldn't that be oh never mind. I'm exiting this thread now. -- Brian Hatch "Ouch! That's really painful.&q

Re: FQDN

2003-07-25 Thread Brian Hatch
ITM attacks, but you need to do all the checks above, it doesn't just happen by itself. I'm going to shut up now - this thread's gone on far too long with no illumination in sight. [1] Assuming no one has the server's private key [2] Assuming your CA is trustworthy, and tha

Re: FQDN

2003-07-25 Thread Brian Hatch
e too Protecting the private key is your most important task. Period. Doesn't this make sense? -- Brian Hatch It compiles! Systems andLet's ship it! Security Engineer -- the Microsoft motto http://www.ifokr.org/bri/ Every message PGP signed pgp0.pgp Description: PGP signature

Re: Sample Code

2003-07-19 Thread Brian Hatch
rball, as well as the Viega 'network security with openssl' book. -- Brian Hatch Schizophrenia: Systems andit beats being alone. Security Engineer http://www.ifokr.org/bri/ Every message PGP signed pgp0.pgp Description: PGP signature

Re: unable to verify server.crt

2003-06-22 Thread Brian Hatch
ver.crt','r') > 1666:error:20074002:BIO routines:FILE_CTRL:system > lib:bss_file.c:261: My guess is that your server cert is called 'server.crt' and you're telling it to read 'sever.crt'. Spelling is important -- Brian Hatch &qu

Re: question about seeding the PRNG, plz help!

2003-06-19 Thread Brian Hatch
tty easy to guess anyway. > Source of randomness are available all around your program, you just need > to mine them. And distrust them appropriately. (IE give them an estimated 'bytes of entropy' value that's much lower than their actual byte count.) -- Brian Hatch

Re: question about seeding the PRNG, plz help!

2003-06-19 Thread Brian Hatch
ine is headless anyway) and the processes running are always the same (though characteristics such as CPU time change, etc) Worse yet, I just helped out in porting a bit of code to WinCE, and I have no idea what's available for it wrt randomness. -- Brian Hatch "H

Re: question about seeding the PRNG, plz help!

2003-06-19 Thread Brian Hatch
he amount of data I had available was more than sufficient to keep the pool stirred. At least, that's my method. -- Brian Hatch "Zathras work here. Zathras Systems andwere born here. You work up Security Engineer there, Zathras work down http

Re: SSL protocol packet format

2003-06-11 Thread Brian Hatch
a different connection, then the proxy my decide to discard or inline OOB packets, either of which could ruin your day. -- Brian Hatch A conclusion is Systems andthe place where Security Engineer you got tired http://www.ifokr.org/bri/ of thinking. E

Re: SSL protocol packet format

2003-06-10 Thread Brian Hatch
LS" book. (Eric's also the author of ssldump, which might be handy.) I recommend a copy of John Viega (et al)'s Network Security with OpenSSL as well. The former is geared more toward theory, the later is geared more toward implementation. They go very well together. -- Brian Hatch

Re: Error code?

2003-06-04 Thread Brian Hatch
ND_bytes Error: error:24064064:lib(36):func(100):reason(100) > > How can i get the textual reason of the Error?? #include main() { ERR_load_crypto_strings(); ... ERR_free_strings(); } See also SSL_load_error_strings; -- Brian Hatch $ echo

Re: /dev/random and chroot()

2003-03-28 Thread Brian Hatch
at much code, is still something you'd be better off doing after you've already restricted your process as much as possible. -- Brian Hatch What do you want? Systems and Who are you? Security Engineer Why are you here? http://www.ifokr.org/bri/ Every m

Setting RSA_blinding_on via SSL_use_RSAPrivateKey_file

2003-03-20 Thread Brian Hatch
use_RSA_PrivateKEY_file s.t. I have access to the RSA struct before I send it to SSL_use_RSAPrivateKey. -- Brian Hatch Ask me about Systems andmicrowaving cats Security Engineer for fun and profit. http://www.ifokr.org/bri/ Every message PGP signed pgp0.pgp Description: PGP signature

Re: "PRNG_NOT_SEEDED", Even after calling RAND_add() in client

2003-03-18 Thread Brian Hatch
e (*p == '\0') > in rsa_pk1.c (code below)as buffer is all initilized > to '\0'.I dont see any data in p being filled when > RAND_bytes(p,j) is called. So your code tries to make j bytes of non \0 chars in p, yes? Seems to work for me, actually. I just copy/pasted it an

Re: "PRNG_NOT_SEEDED", Even after calling RAND_add() in client

2003-03-17 Thread Brian Hatch
dd with a non-zero final value, where that value accurately defines how much randomness you expect in the data. You might want to read the RAND_add man page. -- Brian Hatch "Don't give Systems andaway the homeworld." Security Engineer http://www

Proper way to encrypt and decrypt to/from socket BIO

2003-03-14 Thread Brian Hatch
cipher) in the chain to be sure that the data on the wire is the same data coming in my bio chains? Am I adding an encrypt and decrypt bio onto my socket in a totally brain dead manner? -- Brian Hatch Stupidity is Systems andnot a handicap. Security Engi

Re: Problem changing key/iv on a CIPHER bio

2003-03-14 Thread Brian Hatch
d to > retrieve the EVP_CIPHER_CTX structure from the BIO to do that, see the 0.9.7 > manual pages for precise details. Hmmn. Not a bad plan - I'll check into that. -- Brian Hatch "You don't frighten easily." Systems and "I work for Am

Problem changing key/iv on a CIPHER bio

2003-03-13 Thread Brian Hatch
any data to the client. Any quick ideas where my brain or code is failing me? -- Brian Hatch LLooccall EEcchhoo iiss Systems anduunnddeeaatteedd. Security Engineer http://www.ifokr.org/bri/ Every message PGP signed pgp0.pgp Description: PGP signature

Re: Stunnel 4.04 released

2003-01-22 Thread Brian Hatch
ompiling for WIN32, no main procedure is compiled. Did you use old openssl-0.9.6[a-g] libraries or 0.9.7? The version of stunnel-4.04.exe compiled by Mike requires 0.9.7. (New dlls available at both stunnel.mirt.net and stunnel.org) Followups should probably go to the Stunnel mailing list instea

Re: stunnel 4.00 released

2002-08-31 Thread Brian Hatch
going as fast as I can. Many thanks to Mike for his work making this new version that promises to make SSL tunnel configuration a lot easier for the Windows folks and those afraid of command lines with lots and lots of arguments. -- Brian Hatch I just got lost in Sys

Re: stunnel 4.00 released

2002-08-31 Thread Brian Hatch
> U, where can we get it? I'm trying to get it on stunnel.org right now. Takes a while to get those bits from Poland... -- Brian Hatch For Sale: Parachute Systems andUsed once. Security Engineer Never opened. http://www.ifokr

OpenSSL article at unixreview

2002-06-26 Thread Brian Hatch
There's an intro OpenSSL article at www.unixreview.com that folks might want to peruse. -- Brian Hatch "Fashion is what one Systems andwears oneself. What Security Engineer is unfashionable is http://www.ifokr.org/bri/ what ot

Re: PRNG not seeded ERROR

2001-04-06 Thread Brian Hatch
something *random* for your RAND_seed. If you don't have /dev/urandom, then grab egd/prgd and use it as a source instead. Or worst case use a file with RAND_load_file which you overwrite each time with new random info via RAND_write_file. And no, current system time/pid/ppid/num procs/etc is *n

Re: random generator on solaris

2000-09-21 Thread Brian Hatch
> and then invokes gcc. It should work like a charm. Really? I was told by numerous folks, including some from sun that it wouldn't work. I'm going to high-tail it over and give this a try. -- Brian Hatch"Funny thing about retiring: you no Systems and

Re: random generator on solaris

2000-09-21 Thread Brian Hatch
^^^ > Duh. Solaris 8 ships with a perl that was compiled with Sun cc. Thus to install modules/etc that require compilation, you must use Sun cc. Even if you install gcc, you cannot compile code that will link correctly with sun's supplied perl. Answer: Buy sun&#

Re: Stupid question (or not) ?

2000-09-17 Thread Brian Hatch
> I never got an answer so let's try again... > > Now that RSA released it's patent to the public, how do we compile > openssl without RSARef ??? ./configure Unless you take steps to link against RSARef, you won't. In fact, go delete the damned thing from your

Re: stunnel configuration !

2000-09-12 Thread Brian Hatch
i get an error message : Don't use the '-v' unless you want to verify certs. My guess is that you don't. '-v' doesn't mean verbose for stunnel. > I don't have any certificates under /usr/local/ssl/certs to verify !!! then don't specify '-v'

Re: OT: STunnel

2000-07-05 Thread Brian Hatch
me individually though, it doesn't belong on openssl until it's an openssl problem. -- Brian HatchNostalgia isn't Systems and what it used to be. Security Engineer http://www.ifokr.org/bri/ Every message PGP signed PGP signature

Re: Bug relating to /dev/urandom and RAND_egd in libcrypto.a

2000-06-30 Thread Brian Hatch
time. But you must not seed the PRNG with the same data ever (for example the 3000 '0' bytes in my code above) or you make it easy for folks to narrow down the possibilities they must try to break your connection(s). -- Brian HatchEveryone is entitled Systems and

Re: Bug relating to /dev/urandom and RAND_egd in libcrypto.a

2000-06-30 Thread Brian Hatch
better from stunnel.org. stunnel 3.8 is broken. It will only work with older versions of openssl because it -- stunnel -- is broken. Don't blame the openssl folks for keeping application programers honest. -- Brian Hatch"But not denying it doesn't Systems and

Re: problem with genrsa

2000-06-28 Thread Brian Hatch
t; somefile openssl genrsa -rand somefile -out . (yeah, the -20 is totaly arbitrary, and it probably generates 5000 characters or so, but you're rather assured it'll be enough for openssl) -- Brian HatchSchizophrenia: Systems and it beats b

Re: Bug relating to /dev/urandom and RAND_egd in libcrypto.a

2000-06-28 Thread Brian Hatch
stunnel still unpatched, I started a new branch (the 3.8pX patch set) which addresses this and other patches for stunnel. Thus it's not truely the official site, but I'm incorporating all info I have and anything folks give me. Oh, and nods to Ralf S. Engelschall and the Ope

SSL_CTX_set_default_verify_paths info

2000-06-23 Thread Brian Hatch
reading s.t. users can know which missing files may be the culprit, rather than making them use truss/strace/etc. -- Brian HatchI've finally learned Systems and to honk. It's the hatred. Security Engineer-- me http://www.ifokr.org/bri/ Every m

Re: stunnel and client certificates for Netscape and

1999-01-03 Thread Brian Hatch
> I have installed stunnel and it seems to be working reasonably well. I have > also installed OpenSSL and I also seem to have the certificates working well > on that. I have compiled stunnel to use OpenSSL. I can get stunnel to work > when I set -v1 (requires only server certificate) but I h