RMD160 with openssl

2007-02-01 Thread Sheshadri Sreenath
Hi,

I wanted to know the following information about
RMD160(ripemd160) in conjunction with openssl.

1) Can we use rmd160 along with ciphers in the calls
to SSL_CTX_set_cipher_list() 
   I found that there is no mention of rmd160 in MAC
algorithms supported. 
When we execute ./openssl ciphers -v ALL.  
It only has support for MD5,SHA etc. 

2) Basically I require SSL handshake(SSL_connect) to
seamlessly work at the client when the Server (and
CA)certificate is signed with ripemd160WithRSA. Also
the server should be authenticated successfully.
Can we do this using openSSL? 

Many Thanks in advance.

Regards,
SS



 

Now that's room service!  Choose from over 150,000 hotels
in 45,000 destinations on Yahoo! Travel to find your fit.
http://farechase.yahoo.com/promo-generic-14795097
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: RMD160 with openssl

2007-02-01 Thread Dr. Stephen Henson
On Thu, Feb 01, 2007, Sheshadri Sreenath wrote:

 Hi,
 
 I wanted to know the following information about
 RMD160(ripemd160) in conjunction with openssl.
 
 1) Can we use rmd160 along with ciphers in the calls
 to SSL_CTX_set_cipher_list() 
I found that there is no mention of rmd160 in MAC
 algorithms supported. 
 When we execute ./openssl ciphers -v ALL.  
 It only has support for MD5,SHA etc. 
 

There are no standard ciphersuites that use RMD160 so none are included.

 2) Basically I require SSL handshake(SSL_connect) to
 seamlessly work at the client when the Server (and
 CA)certificate is signed with ripemd160WithRSA. Also
 the server should be authenticated successfully.
 Can we do this using openSSL? 
 

Yes OpenSSL should handle certificates using the RM160 digest algorithm OK.

Steve.
--
Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
OpenSSL project core developer and freelance consultant.
Funding needed! Details on homepage.
Homepage: http://www.drh-consultancy.demon.co.uk
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: crlDistributionPoints in a certificate request

2007-02-01 Thread domi

Goetz wrote:

I think your security model is broken.
A CRL and with that the server clients can download it from is part of
the chain of security of the CA.
So theses servers must be on (best case) dedicated servers that are
specially hardened for this usage.

These servers are a (potentially outsourced) part of the CA.
So the CA needs this list anyway and can incorperate it into all
certificates.

Letting the client set the crlDistributionPoints may lead to something
like:

To check if the security of www.server.net is compromised,
go to www.server.net and download the CRL.
But if the security of this site is compromised, you can't trust
any data you downloaded from it.


What you can do is something like:
* The CA generates the CRLs.
* The CA sends the CRLs to a (fixed) known list of external servers
  clients can download them from.
* On signing the CA incorperates this list of CRL download servers
  into the certificates.
* Clients that want to download the CRL contact one of these servers.
  The server the client contacts to download the CRL is decided
  on the client.

Bye

Goetz




Hello Goetz,

Thank you for your comments and critics concerning my scenario. I’m
analysing and trying to built up this scenario by order of my professor. So
“it doesn’t make any sense” is an acceptable result as well ;)
--“I think your security model is broken….”
In this scenario the CRL shall be kept on the www.server.net. And this
server is NOT a part of the CA’s security chain. The CA creates, signs and
stores the CRL as usual. But in addition the CA also sends a copy of the CRL
to www.server.net, which stores the CRL wherever it wants. (Pushing or
pulling the CRL is not important to me.)
--“But if the security of this site is compromised, you can't trust any data
you downloaded from it.”
For this reason the CA has to sign the CRL before sending it to
www.server.net. When the site is compromised it won’t publish the current
CRL. And a missing up-to-date CRL tells everbody that this site is
compromised.

I hope this idea is not too strange and I’m not telling to much nonsense ;)
So I still have got the problem, that the certificate request shall include
the CRL distribution point and that the CA has to “copy” it when signing the
certificate without knowing the CRL DP in the forefront.

I’m looking forward to get more comments, critics and probably the solution
to my problem.

Greetings domi


-- 
View this message in context: 
http://www.nabble.com/crlDistributionPoints-in-a-certificate-request-tf3148251.html#a8749031
Sent from the OpenSSL - User mailing list archive at Nabble.com.

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


How is OpenSSL affected by changes to Daylight Saving Time (DST) in 2007?

2007-02-01 Thread durgaprasad jammula
Hi All,

   I have one question. How is OpenSSL affected by changes to Daylight Saving 
Time (DST) in 2007?
 
-
Durga Prasad Jammula
webpage : http://durgaprasad.wordpress.com





 

Do you Yahoo!?
Everyone is raving about the all-new Yahoo! Mail beta.
http://new.mail.yahoo.com
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


RE: Newbie question

2007-02-01 Thread Doug Kunzman
Unfortunately, I don't control the server and don't believe there is an SSL
connection to that component, but other components will require an SSL
connection.  So using SSL for everything is not possible.

Doug 

-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Bertram Scharpf
Sent: Wednesday, January 31, 2007 7:44 PM
To: openssl-users@openssl.org
Subject: Re: Newbie question

Hi,

Am Mittwoch, 31. Jan 2007, 13:02:13 -0500 schrieb Doug Kunzman:
 Can openssl be used for HTTP communication without using SSL if in the 
 future we are going to SSL communication to our project?

You should consider using SSL right from the start. There are loads of key
generation howtos on the web. I'm running Apache on Gentoo here and it
worked right from the start.
Just say openssl s_client ... instead of telnet ... on the client side.

I experienced handling sensitive data comes earlier than you might reckon
and it's no mistake to be prepared in time.

Bertram


--
Bertram Scharpf
Stuttgart, Deutschland/Germany
http://www.bertram-scharpf.de
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: crlDistributionPoints in a certificate request

2007-02-01 Thread Goetz Babin-Ebell
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

domi wrote:
 Goetz wrote:
 
 I think your security model is broken.
 A CRL and with that the server clients can download it from is part of
 the chain of security of the CA.
 So theses servers must be on (best case) dedicated servers that are
 specially hardened for this usage.
 
 These servers are a (potentially outsourced) part of the CA.
 So the CA needs this list anyway and can incorperate it into all
 certificates.


 Hello Goetz,
 
 Thank you for your comments and critics concerning my scenario. I’m
 analysing and trying to built up this scenario by order of my professor. So
 “it doesn’t make any sense” is an acceptable result as well ;)

In the security context (and especially with certificates)
the question is not Is it possible to do something ? but it is
Is it adviseable to do something ?
What do you gain ? What risks do you get ?

 --“I think your security model is broken….”
 In this scenario the CRL shall be kept on the www.server.net. And this
 server is NOT a part of the CA’s security chain. The CA creates, signs and
 stores the CRL as usual. But in addition the CA also sends a copy of the CRL
 to www.server.net, which stores the CRL wherever it wants. (Pushing or
 pulling the CRL is not important to me.)

The crlDistributionPoints extension (roundabout) says:
I (the CA) declare that certificates issued by me can be verified with
 CRLs that can be loaded from the following addresses:...
The server MUST in some way be part of the CA infrastructure.
It MAY be a server that is not at the same location than the CA is.

 --“But if the security of this site is compromised, you can't trust any data
 you downloaded from it.”
 For this reason the CA has to sign the CRL before sending it to
 www.server.net. When the site is compromised it won’t publish the current
 CRL. And a missing up-to-date CRL tells everbody that this site is
 compromised.

Only in your context.
In general it only says that there is (at the moment) no CRL available.

Imagine the following situation:

For some reason the CA is unable to issue a new CRL.
(Administrator forgot the passphrase, network connection to CA is down,
 CA is on fire, a plane crashed into the CA,...)

With the moment the last CRL expires all sites the CA issued
certificates for become compromised (in the eyes of the clients).


 I hope this idea is not too strange and I’m not telling to much nonsense ;)

In general:
It is definitively a bad idea to let the client set a
crlDistributionPoints extension with data from the request.
The client may only set a very small subset of the possible extensions
in a certificate.
The subjectAltName extension would be a possible extension
the client may set in the request.
Guys/Girls: Any other idea what the client may set ?

 So I still have got the problem, that the certificate request shall include
 the CRL distribution point and that the CA has to “copy” it when signing the
 certificate without knowing the CRL DP in the forefront.

What you can do is to generate the extension section in
the openssl config on the fly with the crlDistributionPoint extension
parsed from the request.
This will require a small script and no change of the openssl binary.

But again:
do this only if you really know what you are doing
and only after a carefull analysis of the security requirements
of the special situation.

As far as I see it:
+ storing CRLs on each server reduces load on the CA infrastructure.
  But:
  * CRLs need only to be loaded once in the lifetime of a CRL
and this lifetime should be in the range of days
  * as long you aren't operating a big CA CRLs are small
  so the load is small.
  If the lifetime of the CRL is shorter than a day or CRLs become
  big you need something like OCSP.
- - assuming a server is compromised if it hasn't an actual CRL will
  invalidate all certificates the moment the CA can't generate and
  distribute the CRLs to the servers.


Bye

Goetz
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.2 (GNU/Linux)
Comment: Using GnuPG with SUSE - http://enigmail.mozdev.org

iD8DBQFFwiB12iGqZUF3qPYRArKgAJoCrS/ruxsacM9j8eOoJBLfiAPnigCdHNDl
Cmo/qYhrX+0kvF/XdBIWDtU=
=AXIJ
-END PGP SIGNATURE-
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]