Re: [openssl-users] Why openssl 1.0.1p accepts composite $q$ in DSA?

2015-09-09 Thread Georgi Guninski
On Wed, Sep 09, 2015 at 12:07:43PM +, Viktor Dukhovni wrote: > > > > Are you saying I can't sign the cert with another cert > > (the pubkey is easy to extract from the cert) with openssl? > > If you control a trusted root CA, or an intermediate CA issued > (possibly indirectly) by a trusted r

Re: [openssl-users] Why openssl 1.0.1p accepts composite $q$ in DSA?

2015-09-09 Thread Georgi Guninski
On Wed, Sep 09, 2015 at 11:55:36AM +, Viktor Dukhovni wrote: > > The expected time for this sort of check is when CAs sign certificates, > not when TLS handshake participants validate the certificates of > their peers (issued by trusted issuers, or else why bother). > Are you saying I can't s

Re: [openssl-users] Why openssl 1.0.1p accepts composite $q$ in DSA?

2015-09-09 Thread Georgi Guninski
On Wed, Sep 09, 2015 at 07:45:16AM -0400, Jeffrey Walton wrote: > Hi Georgi, > > Sorry to go offlist... > > Also keep in mind that the IETF has effectively deprecated the DH > parameters in PKIX certificates. In fact, they moved to fixed DH > groups to avoid the option dance between client and se

Re: [openssl-users] Why openssl 1.0.1p accepts composite $q$ in DSA?

2015-09-09 Thread Georgi Guninski
Ok, never mind. Is this ``issue'' real or imaginary according to developers, developers, developers(!) ? ___ openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Re: [openssl-users] Why openssl 1.0.1p accepts composite $q$ in DSA?

2015-09-09 Thread Georgi Guninski
On Wed, Sep 09, 2015 at 07:03:59AM -0400, Jeffrey Walton wrote: > On Wed, Sep 9, 2015 at 6:28 AM, Georgi Guninski wrote: > > In short openssl 1.0.1p accepts composite $q$ > > in DSA verify/SSL. > > > > If $q$ is backdoored in the DSA/DH group parameters, > > this

[openssl-users] Why openssl 1.0.1p accepts composite $q$ in DSA?

2015-09-09 Thread Georgi Guninski
In short openssl 1.0.1p accepts composite $q$ in DSA verify/SSL. If $q$ is backdoored in the DSA/DH group parameters, this breaks all private keys using it (see links at bottom). On linux: $./apps/openssl s_server -accept 8080 -cert /tmp/cacert2.pem -key /tmp/key-comp2.key $./apps/openssl s_clie