Re: OpenSSL Security Advisory

2014-04-09 Thread Alan Buxey
https://www.openssl.org/news/changelog.html

1.0.1 introduced the heartbeat support.

1.0.0 and earlier are fortunate in that they didnt have it.but then they 
didnt have things to stop you from being BEASTed so some you win, some you 
lose. ;)

alan

Re: OpenSSL Security Advisory

2014-04-09 Thread monloi perez
True. Thanks for the quick reply.


On Wednesday, April 9, 2014 3:33 PM, Alan Buxey a.l.m.bu...@lboro.ac.uk wrote:
 
https://www.openssl.org/news/changelog.html

1.0.1 introduced the heartbeat support.

1.0.0 and earlier are fortunate in that they didnt have it.but then they 
didnt have things to stop you from being BEASTed so some you win, some you 
lose. ;)

alan

Re: How to swap engines / register functionality on the fly

2014-04-09 Thread axisofevil
I call a EVP-based verify function (that works), I then call a
HSM/dynamic/OpenSC/pkcs11-based sign function ( works too ) , but then a
second call to my verify functions complains with 

ecc_ssl_gen_EC_KEY EC_KEY_generate_key FAIL error:2D06D075:FIPS
routines:fips_pkey_signature_test:test failure

I'm concluding something in the sign() is causing this but have no clue. I
do set fips off too. 

openssl version - OpenSSL 1.0.1e-fips 11 Feb 2013



--
View this message in context: 
http://openssl.6102.n7.nabble.com/How-to-swap-engines-register-functionality-on-the-fly-tp48982p49159.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Help me for ECDHE algorithm

2014-04-09 Thread chetan
 I am newer to this and i want to make ECDHE algorithm for cilient-server.
Can anyone tell me basic steps and functions to do this. all response are
acceptable.
  Thankss in advance



--
View this message in context: 
http://openssl.6102.n7.nabble.com/Help-me-for-ECDHE-algorithm-tp49168.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Re: SSL vs. SSH in the context of CVE 2014-0160

2014-04-09 Thread Chris Hill
Thanks Wim.


On Tue, Apr 8, 2014 at 10:36 PM, Wim Lewis w...@omnigroup.com wrote:


 On 8 Apr 2014, at 7:14 PM, Chris Hill wrote:
  Team, I am having a discussions with a few friends about why this
 OpenSSL vuln (CVE 2014-0160) does not affect SSH. This may be TOO basic for
 many of you (apologize in advance), but can't think of any other way to
 prove my point other than speaking to the folks who really know (that's u).
 Or maybe I am the one wrong, wouldn't be the first time ;).
 
  A quick response to my frieds could be simply diffing the files for the
 actual OpenSSL change, e.g. ssl/d1_both.c and ssl/t1_lib.c, but I want a
 more classy answer.
 
  Is the below ok or am I completely off?
 
  Thank you in advance
 
  SSH and SSL/TLS are simply different protocols (doh). They may share
 some similar underlying crypto implementations, but as of their respective
 RFCs, they are just different protocols. The TLS Heartbeat TLS extension
 would not apply to SSH. SSH may have its own way to keep alive, but that
 would be a different one.
 
  Chris.

 This is correct as I understand it. ssh uses openssl mostly for crypto
 operations, but the ssh protocol does not have anything in common with
 ssl/tls (other than some fairly general design aspects). The heartbeat bug
 is particular to the openssl implementation of the heartbeat feature in
 tls, and that code isn't used by openssh.


 __
 OpenSSL Project http://www.openssl.org
 User Support Mailing Listopenssl-users@openssl.org
 Automated List Manager   majord...@openssl.org



about ecdsa patent in openssl code

2014-04-09 Thread shixin
Hi all,
I have a question on openssl ECDSA code. Can ECDSA be safely used without 
infringing on patents? The ECDSA  implementation which is patent-free in 
openssl ?
I would like to make use of ECDSA in embedded system, so I porting code from 
openssl. Will there be any problem?


Best Wishes!






about ecdsa patent in openssl code

2014-04-09 Thread shixin
Hi all,
I have a question on openssl ECDSA code. Can ECDSA be safely used without 
infringing on patents? The ECDSA  implementation which is patent-free in 
openssl ?
I would like to make use of ECDSA in embedded system, so I porting code from 
openssl. Will there be any problem?


Best Wishes!



Error in `openssl': munmap_chunk(): invalid pointer: 0x00007ffffc1065af

2014-04-09 Thread Igor Sverkos
Hi,

when you set the -host parameter as last, you will get the following error:

 ~/cert-test/ $ openssl ocsp -CApath /etc/ssl/certs -no_nonce -issuer
issuer.crt -cert cert.crt -url http://ocsp2.globalsign.com/gsalphag2
-host ocsp2.globalsign.com

Error querying OCSP responsder
139638328587920:error:27076072:OCSP routines:PARSE_HTTP_LINE1:server
response error:ocsp_ht.c:250:Code=403,Reason=Forbidden
*** Error in `openssl': munmap_chunk(): invalid pointer: 0x7fff0b82859d ***
=== Backtrace: =
/lib64/libc.so.6(+0x741bf)[0x7f001440e1bf]
/lib64/libc.so.6(+0x79ace)[0x7f0014413ace]
/usr/lib64/libcrypto.so.1.0.0(CRYPTO_free+0x1d)[0x7f00148874cd]
openssl[0x45981b]
openssl[0x418e78]
openssl[0x418bc6]
/lib64/libc.so.6(__libc_start_main+0xf5)[0x7f00143bbb15]
openssl[0x418c4b]
=== Memory map: 
0040-00478000 r-xp  fe:03 303689
  /usr/bin/openssl
00678000-00679000 r--p 00078000 fe:03 303689
  /usr/bin/openssl
00679000-0067e000 rw-p 00079000 fe:03 303689
  /usr/bin/openssl
0067e000-0067f000 rw-p  00:00 0
025fb000-0263d000 rw-p  00:00 0  [heap]
7f0013d6a000-7f0013d7f000 r-xp  fe:03 192002
  /usr/lib64/gcc/x86_64-pc-linux-gnu/4.8.2/libgcc_s.so.1
7f0013d7f000-7f0013f7e000 ---p 00015000 fe:03 192002
  /usr/lib64/gcc/x86_64-pc-linux-gnu/4.8.2/libgcc_s.so.1
7f0013f7e000-7f0013f7f000 r--p 00014000 fe:03 192002
  /usr/lib64/gcc/x86_64-pc-linux-gnu/4.8.2/libgcc_s.so.1
7f0013f7f000-7f0013f8 rw-p 00015000 fe:03 192002
  /usr/lib64/gcc/x86_64-pc-linux-gnu/4.8.2/libgcc_s.so.1
7f0013f8-7f0013f95000 r-xp  fe:03 160220
  /lib64/libz.so.1.2.8
7f0013f95000-7f0014194000 ---p 00015000 fe:03 160220
  /lib64/libz.so.1.2.8
7f0014194000-7f0014195000 r--p 00014000 fe:03 160220
  /lib64/libz.so.1.2.8
7f0014195000-7f0014196000 rw-p 00015000 fe:03 160220
  /lib64/libz.so.1.2.8
7f0014196000-7f0014198000 r-xp  fe:03 667133
  /lib64/libdl-2.19.so
7f0014198000-7f0014398000 ---p 2000 fe:03 667133
  /lib64/libdl-2.19.so
7f0014398000-7f0014399000 r--p 2000 fe:03 667133
  /lib64/libdl-2.19.so
7f0014399000-7f001439a000 rw-p 3000 fe:03 667133
  /lib64/libdl-2.19.so
7f001439a000-7f0014539000 r-xp  fe:03 667200
  /lib64/libc-2.19.so
7f0014539000-7f0014739000 ---p 0019f000 fe:03 667200
  /lib64/libc-2.19.so
7f0014739000-7f001473d000 r--p 0019f000 fe:03 667200
  /lib64/libc-2.19.so
7f001473d000-7f001473f000 rw-p 001a3000 fe:03 667200
  /lib64/libc-2.19.so
7f001473f000-7f0014743000 rw-p  00:00 0
7f0014743000-7f00148ea000 r-xp  fe:03 301863
  /usr/lib64/libcrypto.so.1.0.0
7f00148ea000-7f0014aea000 ---p 001a7000 fe:03 301863
  /usr/lib64/libcrypto.so.1.0.0
7f0014aea000-7f0014b04000 r--p 001a7000 fe:03 301863
  /usr/lib64/libcrypto.so.1.0.0
7f0014b04000-7f0014b0f000 rw-p 001c1000 fe:03 301863
  /usr/lib64/libcrypto.so.1.0.0
7f0014b0f000-7f0014b13000 rw-p  00:00 0
7f0014b13000-7f0014b72000 r-xp  fe:03 301866
  /usr/lib64/libssl.so.1.0.0
7f0014b72000-7f0014d72000 ---p 0005f000 fe:03 301866
  /usr/lib64/libssl.so.1.0.0
7f0014d72000-7f0014d76000 r--p 0005f000 fe:03 301866
  /usr/lib64/libssl.so.1.0.0
7f0014d76000-7f0014d7d000 rw-p 00063000 fe:03 301866
  /usr/lib64/libssl.so.1.0.0
7f0014d7d000-7f0014d9e000 r-xp  fe:03 666577
  /lib64/ld-2.19.so
7f0014f8e000-7f0014f92000 rw-p  00:00 0
7f0014f9b000-7f0014f9d000 rw-p  00:00 0
7f0014f9d000-7f0014f9e000 r--p 0002 fe:03 666577
  /lib64/ld-2.19.so
7f0014f9e000-7f0014f9f000 rw-p 00021000 fe:03 666577
  /lib64/ld-2.19.so
7f0014f9f000-7f0014fa rw-p  00:00 0
7fff0b808000-7fff0b829000 rw-p  00:00 0  [stack]
7fff0b991000-7fff0b992000 r-xp  00:00 0  [vdso]
ff60-ff601000 r-xp  00:00 0
  [vsyscall]
Aborted (core dumped)


 $ openssl version
OpenSSL 1.0.1g 7 Apr 2014

gcc-4.8.2, glibc-2.19


-- 
Regards,
Igor
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


STORE support

2014-04-09 Thread Vladimir Zatsepin
Hi all,

Since 1.0.0 version the STORE functionallity has been removed from openssl
distirbutive by default.

We may see in CHANGES

  *) Removed effectively defunct crypto/store from the build.
 [Ben Laurie]

Does anybody know why the STORE support has been disabled?


Re: OpenSSL Security Advisory

2014-04-09 Thread Ted Byers
How do I determine whether or not the web servers I run are affected?  They
are Apache 2.4, built for 64 bit Windows and downloaded from Apachelounge.
I have no idea what version of openssl it was built with.  Does anyone here
know if the feature that introduces the risk can be turned off, without
introducing other risks?  If so, how?

Also, could the security keys we bought have been compromised?

Any advice on how I can protect my servers better would be appreciated.

Thanks

Ted

-- 
R.E.(Ted) Byers, Ph.D.,Ed.D.


On Mon, Apr 7, 2014 at 4:31 PM, OpenSSL open...@openssl.org wrote:

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA256

 OpenSSL Security Advisory [07 Apr 2014]
 

 TLS heartbeat read overrun (CVE-2014-0160)
 ==

 A missing bounds check in the handling of the TLS heartbeat extension can
 be
 used to reveal up to 64k of memory to a connected client or server.

 Only 1.0.1 and 1.0.2-beta releases of OpenSSL are affected including
 1.0.1f and 1.0.2-beta1.

 Thanks for Neel Mehta of Google Security for discovering this bug and to
 Adam Langley a...@chromium.org and Bodo Moeller bmoel...@acm.org for
 preparing the fix.

 Affected users should upgrade to OpenSSL 1.0.1g. Users unable to
 immediately
 upgrade can alternatively recompile OpenSSL with -DOPENSSL_NO_HEARTBEATS.

 1.0.2 will be fixed in 1.0.2-beta2.
 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.4.11 (GNU/Linux)

 iQIcBAEBCAAGBQJTQt1bAAoJENNXdQf6QOniGhkP/AjjZgV+g7ZyxnxdnvA2+sdV
 sxNso208Cod8DKnDONtXHuPTkTFfyHl72FM1ea99woe3X6JWj3PyiZGvSfeo4Jj/
 QiDJvvcHc5Xq00gAr6MIarhMJbRtYkM+Th6PPXyqODYcb/pDoqy5VWo/R9QkZTPn
 zaiXPyapJB/qSYo4UqXWerT9YTLdYmiro//kQN0U/SedF/fNz4CEBcMyz6z7YJAC
 LFoE6Vf54PAkNvxjcX9ugIKluBMk5YONRG8PB0X/UDwf9Kj4L6OTT51x1yeFw3Sg
 GzTqvKD+2JWzFDCcfJULRCSCEwHhKbjR7n3sI1RPaaEWp5E63+9HSMRYjVOFIwt/
 OTrMPbW1BEiX0A7NB7HSrrvddnYd3sz8A44v00oesr+XaW5nyu79IndQwLhPkKYF
 Dkb67quw/tfV6Y1r4sETqSd2FrM7MpFzltywMKzVKWNpMSwOAWSBGUl7VH0m84Ty
 zAufUSEnYIA3dMC2DnHie+ot4WnjJlTErBmfUb/QNbNYDt0vjhS60oydP1NJ8AlG
 aoUK7mslOlVCauAIeGNbi4PzJ+LvWYmyFFGT+M1/UOBZFFvG7jsReBjTIu9dg3Za
 S7NE7CeMvRRpOEm1+T9L8a26/c6C9dwF7JPQvMpTR3BeT2jjkYe8rdTCkT91g1sd
 J37YgDNuefzrsA+B5/o7
 =szjb
 -END PGP SIGNATURE-
 __
 OpenSSL Project http://www.openssl.org
 User Support Mailing Listopenssl-users@openssl.org
 Automated List Manager   majord...@openssl.org



Re: OpenSSL Security Advisory

2014-04-09 Thread Ali Jawad
http://filippo.io/Heartbleed/#www.unlocator.com


On Wed, Apr 9, 2014 at 2:05 PM, Ted Byers r.ted.by...@gmail.com wrote:

 How do I determine whether or not the web servers I run are affected?
 They are Apache 2.4, built for 64 bit Windows and downloaded from
 Apachelounge.  I have no idea what version of openssl it was built with.
 Does anyone here know if the feature that introduces the risk can be turned
 off, without introducing other risks?  If so, how?

 Also, could the security keys we bought have been compromised?

 Any advice on how I can protect my servers better would be appreciated.

 Thanks

 Ted

 --
 R.E.(Ted) Byers, Ph.D.,Ed.D.


 On Mon, Apr 7, 2014 at 4:31 PM, OpenSSL open...@openssl.org wrote:

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA256

 OpenSSL Security Advisory [07 Apr 2014]
 

 TLS heartbeat read overrun (CVE-2014-0160)
 ==

 A missing bounds check in the handling of the TLS heartbeat extension can
 be
 used to reveal up to 64k of memory to a connected client or server.

 Only 1.0.1 and 1.0.2-beta releases of OpenSSL are affected including
 1.0.1f and 1.0.2-beta1.

 Thanks for Neel Mehta of Google Security for discovering this bug and to
 Adam Langley a...@chromium.org and Bodo Moeller bmoel...@acm.org for
 preparing the fix.

 Affected users should upgrade to OpenSSL 1.0.1g. Users unable to
 immediately
 upgrade can alternatively recompile OpenSSL with -DOPENSSL_NO_HEARTBEATS.

 1.0.2 will be fixed in 1.0.2-beta2.
 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.4.11 (GNU/Linux)

 iQIcBAEBCAAGBQJTQt1bAAoJENNXdQf6QOniGhkP/AjjZgV+g7ZyxnxdnvA2+sdV
 sxNso208Cod8DKnDONtXHuPTkTFfyHl72FM1ea99woe3X6JWj3PyiZGvSfeo4Jj/
 QiDJvvcHc5Xq00gAr6MIarhMJbRtYkM+Th6PPXyqODYcb/pDoqy5VWo/R9QkZTPn
 zaiXPyapJB/qSYo4UqXWerT9YTLdYmiro//kQN0U/SedF/fNz4CEBcMyz6z7YJAC
 LFoE6Vf54PAkNvxjcX9ugIKluBMk5YONRG8PB0X/UDwf9Kj4L6OTT51x1yeFw3Sg
 GzTqvKD+2JWzFDCcfJULRCSCEwHhKbjR7n3sI1RPaaEWp5E63+9HSMRYjVOFIwt/
 OTrMPbW1BEiX0A7NB7HSrrvddnYd3sz8A44v00oesr+XaW5nyu79IndQwLhPkKYF
 Dkb67quw/tfV6Y1r4sETqSd2FrM7MpFzltywMKzVKWNpMSwOAWSBGUl7VH0m84Ty
 zAufUSEnYIA3dMC2DnHie+ot4WnjJlTErBmfUb/QNbNYDt0vjhS60oydP1NJ8AlG
 aoUK7mslOlVCauAIeGNbi4PzJ+LvWYmyFFGT+M1/UOBZFFvG7jsReBjTIu9dg3Za
 S7NE7CeMvRRpOEm1+T9L8a26/c6C9dwF7JPQvMpTR3BeT2jjkYe8rdTCkT91g1sd
 J37YgDNuefzrsA+B5/o7
 =szjb
 -END PGP SIGNATURE-
 __
 OpenSSL Project http://www.openssl.org
 User Support Mailing Listopenssl-users@openssl.org
 Automated List Manager   majord...@openssl.org







RE: OpenSSL Security Advisory

2014-04-09 Thread Eisenacher, Patrick
Hi Ted,

 -Original Message-
 From: owner-openssl-us...@openssl.org [mailto:owner-openssl-
 
 How do I determine whether or not the web servers I run are affected?
 They are Apache 2.4, built for 64 bit Windows and downloaded from
 Apachelounge.  I have no idea what version of openssl it was built with.  Does
 anyone here know if the feature that introduces the risk can be turned off,
 without introducing other risks?  If so, how?

you can check for yourself:
- http://filippo.io/Heartbleed/
- http://possible.lv/tools/hb/
- https://github.com/noxxi/p5-scripts/blob/master/check-ssl-heartbleed.pl

 Also, could the security keys we bought have been compromised?

Certainly yes. You should replace them. I read today that some CAs offer free 
replacements.


HTH,
Patrick Eisenacher
:��IϮ��r�m
(Z+�K�+1���x��h[�z�(Z+���f�y���f���h��)z{,���

RE: OpenSSL Security Advisory

2014-04-09 Thread Salz, Rich
Ø  How do I determine whether or not the web servers I run are affected?

Here's a simple way:
echo B | openssl s_client -connect $HOST:$PORT
if you see heartbeating at the end, then $HOST is vulnerable.

How can you tell if private keys have been taken?  You can't, really. You can 
estimate the likelihood by looking closely at how OpenSSL_Malloc() return 
values are used and layed out.  The risk is that an allocated ssl-record buffer 
is right up against a private key being stored.

/r$

--
Principal Security Engineer
Akamai Technology
Cambridge, MA



CVE 2014-0160 and FIPS 140-2 module

2014-04-09 Thread Chris Bare
Can anyone confirm my understanding that the FIPS 140-2 certified module is
NOT affected by the CVE 2014-0160 vulnerability?

-- 
Chris Bare


Re: OpenSSL Security Advisory

2014-04-09 Thread Ted Byers
Thanks Rich,

I have obtained the new, patched, release of Apache from Apache lounge, and
applied the patch to one server, which the online services say fix the
problem on it, but your simple way of checking still says heartbeating at
the end.  Does that mean that the patch didn't truly work?

I get the heartbeating message on both unpatched and patched servers.
Should that make me worry about the patched machines?

Thanks

Ted


-- 
R.E.(Ted) Byers, Ph.D.,Ed.D.


On Wed, Apr 9, 2014 at 9:54 AM, Salz, Rich rs...@akamai.com wrote:

 Ø  How do I determine whether or not the web servers I run are affected?



 Here's a simple way:

 echo B | openssl s_client -connect $HOST:$PORT

 if you see heartbeating at the end, then $HOST is vulnerable.



 How can you tell if private keys have been taken?  You can't, really. You
 can estimate the likelihood by looking closely at how OpenSSL_Malloc()
 return values are used and layed out.  The risk is that an allocated
 ssl-record buffer is right up against a private key being stored.



 /r$



 --

 Principal Security Engineer

 Akamai Technology

 Cambridge, MA





Re: OpenSSL Security Advisory

2014-04-09 Thread Ted Byers
Thanks Patrick.

Apache lounge already has a patched release released.  So, once I deploy
that, and get my certificates reissued, I ought to be OK.

Thanks

Ted



-- 
R.E.(Ted) Byers, Ph.D.,Ed.D.

On Wed, Apr 9, 2014 at 8:37 AM, Eisenacher, Patrick 
patrick.eisenac...@bdr.de wrote:

 Hi Ted,

  -Original Message-
  From: owner-openssl-us...@openssl.org [mailto:owner-openssl-
 
  How do I determine whether or not the web servers I run are affected?
  They are Apache 2.4, built for 64 bit Windows and downloaded from
  Apachelounge.  I have no idea what version of openssl it was built with.
  Does
  anyone here know if the feature that introduces the risk can be turned
 off,
  without introducing other risks?  If so, how?

 you can check for yourself:
 - http://filippo.io/Heartbleed/
 - http://possible.lv/tools/hb/
 - https://github.com/noxxi/p5-scripts/blob/master/check-ssl-heartbleed.pl

  Also, could the security keys we bought have been compromised?

 Certainly yes. You should replace them. I read today that some CAs offer
 free replacements.


 HTH,
 Patrick Eisenacher



Re: CVE 2014-0160 and FIPS 140-2 module

2014-04-09 Thread ag@gmail
It is not.

-ag

--
sent via 100% recycled electrons from my mobile command center.

 On Apr 9, 2014, at 7:22 AM, Chris Bare chris.b...@gmail.com wrote:
 
 Can anyone confirm my understanding that the FIPS 140-2 certified module is 
 NOT affected by the CVE 2014-0160 vulnerability?
 
 -- 
 Chris Bare
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Reading an otherName value from a subjectAltName certificate extension

2014-04-09 Thread Dustin Oprea
It looks like OpenSSL always shows unsupported for a subjectAltName of
otherName.

The string that was written (both via M2Crypto, and directly at the
commandline via openssl.cnf):

1.2.3.4;UTF8:some other identifier

Dumped (openssl x509 -in test.crt -noout -text):

c3:88:36:93:82:58:0c:08:7f
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Subject Alternative Name:
othername:unsupported
Signature Algorithm: sha1WithRSAEncryption
05:76:d5:fc:d0:44:50:af:39:76:05:b4:cb:b6:99:9f:7c:c0:

Grepping through the OpenSSL source for otherName, this stood out to me
(in v3_alt.c):

1:

STACK_OF(CONF_VALUE) *i2v_GENERAL_NAME(X509V3_EXT_METHOD *method,
GENERAL_NAME *gen, STACK_OF(CONF_VALUE) *ret)
{
unsigned char *p;
char oline[256], htmp[5];
int i;
switch (gen-type)
{
case GEN_OTHERNAME:
X509V3_add_value(othername,unsupported, ret);
break;

case GEN_X400:
X509V3_add_value(X400Name,unsupported, ret);
break;

case GEN_EDIPARTY:
X509V3_add_value(EdiPartyName,unsupported, ret);
break;

2:

int GENERAL_NAME_print(BIO *out, GENERAL_NAME *gen)
{
unsigned char *p;
int i;
switch (gen-type)
{
case GEN_OTHERNAME:
BIO_printf(out, othername:unsupported);
break;

case GEN_X400:
BIO_printf(out, X400Name:unsupported);
break;

case GEN_EDIPARTY:
/* Maybe fix this: it is supported now */
BIO_printf(out, EdiPartyName:unsupported);
break;

So, I'm willing to bet that both this and the empirical knowledge coming
from my attempts above mean that I shouldn't ever expect that the
otherName values will *ever* be properly rendered via the command-line or
library calls. This might be because they're actual, encoded ASN.1 strings.
So, how can I do it? How do people extract these values? If they are actual
ASN.1 strings, is it up to the developer to decode them?



Dustin


Re: OpenSSL Security Advisory

2014-04-09 Thread Viktor Dukhovni
On Wed, Apr 09, 2014 at 10:55:23AM -0400, Ted Byers wrote:

 I get the heartbeating message on both unpatched and patched servers.
 Should that make me worry about the patched machines?

No, unfortunately both patched and unpatched systems respond the
same way to valid heartbeat requests as send by s_client(1).

To detect a difference, you need to send invalid heartbeat requests
whose payload is shorter than promised.  If you patch a copy of the
source code for OpenSSL 1.0.1 as below, and build statically linked
and run ./apps/openssl s_client ... from the build tree:

--- a/ssl/t1_lib.c
+++ b/ssl/t1_lib.c
@@ -2702,7 +2702,7 @@ tls1_heartbeat(SSL *s)
/* Message Type */
*p++ = TLS1_HB_REQUEST;
/* Payload length (18 bytes here) */
-   s2n(payload, p);
+   s2n(0x4000, p);
/* Sequence number */
s2n(s-tlsext_hb_seq, p);
/* 16 random bytes */

then you can detect the difference.  Patched systems won't respond
to the malformed heartbeat request.  Replace echo B |  with something
like:

(sleep 10; echo B; sleep 10) | ...

to make sure that the handshake is complete by the time the request is sent,
and the client does not disconnect too quickly.

-- 
Viktor.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


RE: OpenSSL Security Advisory

2014-04-09 Thread Salz, Rich
Ø  I get the heartbeating message on both unpatched and patched servers.  
Should that make me worry about the patched machines?
Not necessarily.  If they updated to the 'g' release, then they are doing 
buffer-overrun checking and you're safe.  You can probably find out by 
connecting to your server (via s_client again) and seeing what it says in the 
server line, as in
echo HEAD / HTTP/1.0 | openssl s_client -connect $HOST:$PORT
The server usually says things like apache/2.0 openssl/1.0.1g ... and other 
modules that are bundled in.

To be safest, heartbeats should just be disabled.  Nobody really uses them.
/r$

--
Principal Security Engineer
Akamai Technology
Cambridge, MA


Re: Help me for ECDHE algorithm

2014-04-09 Thread Matt Caswell
On 9 April 2014 08:39, chetan chet...@neominds.in wrote:
  I am newer to this and i want to make ECDHE algorithm for cilient-server.
 Can anyone tell me basic steps and functions to do this. all response are
 acceptable.
   Thankss in advance


Its unclear from your question whether you are looking to
programatically use openssl's ECDHE capabilities directly, or whether
you are looking to set up an SSL/TLS communication using ECDHE based
ciphersuites. Assuming the former, then this page is a good start:

http://wiki.openssl.org/index.php/Elliptic_Curve_Diffie_Hellman


Matt
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Re: OpenSSL Security Advisory

2014-04-09 Thread Matthias Apitz
 - Forwarded message from Salz, Rich rs...@akamai.com -
 
 Date: Wed, 9 Apr 2014 09:54:25 -0400
 From: Salz, Rich rs...@akamai.com
 To: openssl-users@openssl.org openssl-users@openssl.org
 Subject: RE: OpenSSL Security Advisory
 
 Ø  How do I determine whether or not the web servers I run are affected?
 
 Here's a simple way:
 echo B | openssl s_client -connect $HOST:$PORT
 if you see heartbeating at the end, then $HOST is vulnerable.
 
 How can you tell if private keys have been taken?  You can't, really. You can 
 estimate the likelihood by looking closely at how OpenSSL_Malloc() return 
 values are used and layed out.  The risk is that an allocated ssl-record 
 buffer is right up against a private key being stored.
 
 /r$

Hello Rich,

Can you please post a good and a bad server example. I have tested a
lot of servers, including 'akamai.com', and they all show HEARTBEATING
at the end:

$ echo B | openssl s_client -connect akamai.com:https
...
Verify return code: 20 (unable to get local issuer certificate)
---
HEARTBEATING
675358796:error:1413B16D:SSL routines:SSL_F_TLS1_HEARTBEAT:peer does
not accept

heartbearts:/usr/src/secure/lib/libssl/../../../crypto/openssl/ssl/t1_lib.c:2562:

Thanks for clarification.

matthias

-- 
Sent from my FreeBSD netbook

Matthias Apitz, g...@unixarea.de, http://www.unixarea.de/ f: +49-170-4527211
UNIX since V7 on PDP-11, UNIX on mainframe since ESER 1055 (IBM /370)
UNIX on x86 since SVR4.2 UnixWare 2.1.2, FreeBSD since 2.2.5
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


RE: OpenSSL Security Advisory

2014-04-09 Thread Salz, Rich
 Can you please post a good and a bad server example. I have tested a lot 
 of servers, including 'akamai.com', and they all show HEARTBEATING at the end:

Look at Victor's recent post about how to patch openssl/s_client to make your 
own test.  That's the simplest.  My example tests only for those who have 
disabled TLs heartbeats, which is the safest thing, but not necessarily the 
only thing, to do.


--  
Principal Security Engineer
Akamai Technology
Cambridge, MA

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Re: OpenSSL version 1.0.1g release signed with unauthorized key???

2014-04-09 Thread Jakob Bohm
Attention: The .asc file I downloaded directly from openssl.org for the 
1.0.1g tarball was signed with a key NOT authorized by the 
fingerprints.txt file distributed in previous tarballs, nor by the 
(unverifiable) fingerprints.txt available from


   http://www.openssl.org/docs/misc/

Specifically, it was signed by a PGP key purporting to belong to Dr. 
Henson, but with a different identifier and a different e-mail address

than the authorized key listed for him in fingerprints.txt.

I suspect this is just a mixup at your end, but one cannot feel too
sure without a valid file signature consistent with the securely 
distributed signature list.


For now, I will have to avoid installing this critical security update
and try the workaround instead.

On 4/7/2014 7:38 PM, OpenSSL wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256


OpenSSL version 1.0.1g released
===

OpenSSL - The Open Source toolkit for SSL/TLS
http://www.openssl.org/

The OpenSSL project team is pleased to announce the release of
version 1.0.1g of our open source toolkit for SSL/TLS. For details
of changes and known issues see the release notes at:

 http://www.openssl.org/news/openssl-1.0.1-notes.html

OpenSSL 1.0.1g is available for download via HTTP and FTP from the
following master locations (you can find the various FTP mirrors under
http://www.openssl.org/source/mirror.html):

  * http://www.openssl.org/source/
  * ftp://ftp.openssl.org/source/

The distribution file name is:

 o openssl-1.0.1g.tar.gz
   Size: 4509047
   MD5 checksum: de62b43dfcd858e66a74bee1c834e959
   SHA1 checksum: b28b3bcb1dc3ee7b55024c9f795be60eb3183e3c

The checksums were calculated using the following commands:

 openssl md5 openssl-1.0.1g.tar.gz
 openssl sha1 openssl-1.0.1g.tar.gz

Yours,

The OpenSSL Project Team.

-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.11 (GNU/Linux)
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=lxo1
-END PGP SIGNATURE-
__
OpenSSL Project http://www.openssl.org
Announcement Mailing List openssl-annou...@openssl.org
Automated List Manager   majord...@openssl.org




Enjoy

Jakob
--
Jakob Bohm, CIO, Partner, WiseMo A/S.  http://www.wisemo.com
Transformervej 29, 2730 Herlev, Denmark.  Direct +45 31 13 16 10
This public discussion message is non-binding and may contain errors.
WiseMo - Remote Service Management for PCs, Phones and Embedded
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Re: OpenSSL version 1.0.1g release signed with unauthorized key???

2014-04-09 Thread Dustin Oprea
On Apr 9, 2014 7:30 PM, Jakob Bohm jb-open...@wisemo.com wrote:

 Attention: The .asc file I downloaded directly from openssl.org for the
1.0.1g tarball was signed with a key NOT authorized by the fingerprints.txt
file distributed in previous tarballs, nor by the (unverifiable)
fingerprints.txt available from

http://www.openssl.org/docs/misc/

 Specifically, it was signed by a PGP key purporting to belong to Dr.
Henson, but with a different identifier and a different e-mail address
 than the authorized key listed for him in fingerprints.txt.

 I suspect this is just a mixup at your end, but one cannot feel too
 sure without a valid file signature consistent with the securely
distributed signature list.

 For now, I will have to avoid installing this critical security update
 and try the workaround instead.

Not great timing.

Dustin


 On 4/7/2014 7:38 PM, OpenSSL wrote:

 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA256


 OpenSSL version 1.0.1g released
 ===

 OpenSSL - The Open Source toolkit for SSL/TLS
 http://www.openssl.org/

 The OpenSSL project team is pleased to announce the release of
 version 1.0.1g of our open source toolkit for SSL/TLS. For details
 of changes and known issues see the release notes at:

  http://www.openssl.org/news/openssl-1.0.1-notes.html

 OpenSSL 1.0.1g is available for download via HTTP and FTP from the
 following master locations (you can find the various FTP mirrors
under
 http://www.openssl.org/source/mirror.html):

   * http://www.openssl.org/source/
   * ftp://ftp.openssl.org/source/

 The distribution file name is:

  o openssl-1.0.1g.tar.gz
Size: 4509047
MD5 checksum: de62b43dfcd858e66a74bee1c834e959
SHA1 checksum: b28b3bcb1dc3ee7b55024c9f795be60eb3183e3c

 The checksums were calculated using the following commands:

  openssl md5 openssl-1.0.1g.tar.gz
  openssl sha1 openssl-1.0.1g.tar.gz

 Yours,

 The OpenSSL Project Team.

 -BEGIN PGP SIGNATURE-
 Version: GnuPG v1.4.11 (GNU/Linux)

 iQIcBAEBCAAGBQJTQtiiAAoJENNXdQf6QOniC/EQALRkau9Gx+qzyp1nx1FDTJI1
 ox93n7SKC3QIjX4veVuFjpaPymNQXVRM8IbgET5tE4GPT5w+PrscpyGSJJr8yvWN
 TKy48JSKl13GVMODnEC6nEffsS/sci5o2PHXhDYa7aC+xRF6UUSMa8tqXnhGJP7e
 uv7a1tYjtgE8Ix9tdoK32UkPOM0Z1qr11lPFDdG0GrIs+mbjPirdKSgvQm22w4IU
 jyn5AmmReA6ZnIpffOHGQY5OgpGTg4yg+aaFKenisOfIL80raNZlVuWrzDkTUS9k
 +gikqtBRg1pFMd1UGpl0S7sIXZNm01yv4K4aO3a9aykXqPQLOc8WmvfDgf99+8HR
 zUrowh7Xf1CvHsgIs4s0XaggZdXhkXpMpSWdWpVh7ZVm/TPInoPWwyj8Zp/TL8XF
 N/GrNHRLuWvSgCuyA7qhkee33FmtCblnYTHSLyGQrVpfq/cVEzvpznsZnObjFG+/
 4Gss0qUVQZ0LJUUKZHx5cGvHliXYEeZQaBz/VLJ7J8fvy6Fsp0vKFjbrobG6srB6
 pa6NYQKjHhobx+eEW380j3r60iBiz1GjdMSOdLvnSOA9dOcWmXFxl5GLcASnM+F0
 kGtZBjLXsaImnp749V50sme+bNgQ/ErUvikTLXefk0rtUnfjCmJec44Kn5Gh7J1k
 iI/CjhJrI2B83C48m2kE
 =lxo1
 -END PGP SIGNATURE-
 __
 OpenSSL Project http://www.openssl.org
 Announcement Mailing List openssl-annou...@openssl.org
 Automated List Manager   majord...@openssl.org



 Enjoy

 Jakob
 --
 Jakob Bohm, CIO, Partner, WiseMo A/S.  http://www.wisemo.com
 Transformervej 29, 2730 Herlev, Denmark.  Direct +45 31 13 16 10
 This public discussion message is non-binding and may contain errors.
 WiseMo - Remote Service Management for PCs, Phones and Embedded
 __
 OpenSSL Project http://www.openssl.org
 User Support Mailing Listopenssl-users@openssl.org
 Automated List Manager   majord...@openssl.org


OpenSSL version 1.0.1g fails to link on Win32

2014-04-09 Thread Geoffrey Coram
Hi -
I just compiled OpenSSL 1.0.1g for Win32 using Visual Studio 2005; my 
application failed to link because of an unresolved external 
_check_winnt

In crypto/rand/rand_win.c, function readscreen, this line:
  if (GetVersion()  0x8000  OPENSSL_isservice()0)

was changed to
  if (check_winnt()  OPENSSL_isservice()0)


And also in crypto/cryptlib.c, function OPENSSL_showfatal, this line:
if (GetVersion()  0x8000  OPENSSL_isservice()  0)

was changed to
if (check_winnt()  OPENSSL_isservice()  0)


I can't seem to find where check_winnt() is declared/defined.  So, I 
just changed it back.  This seems to work for me, but I thought I 
should mention it for other users.

-Geoffrey
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Re: OpenSSL version 1.0.1g fails to link on Win32

2014-04-09 Thread Steven Kneizys
I just compiled 32 bit with ntdll.mak with nasm 2.11.02 and Visual
Studio Express 2013 with no issues, with and without the
DOPENSSL_NO_HEARTBEATS option.  I was making it to drop the keys files
into Apache 2.2.26:
openssl.exe
ssleay32.dll
libeay32.dll

I am doing this to compile:
  perl Configure VC-WIN32 --prefix=C:\ApacheSoftware\Apache22\bin
--openssldir=C:\ApacheSoftware\Apache22\conf
  ms\do_nasm
  nmake -f ms\ntdll.mak

I know this is in the docs and such but so many people are working in this
right now I just thought I'd post that it can work OK with a newer VS
version.

Steve...


On Wed, Apr 9, 2014 at 9:36 PM, Geoffrey Coram gjco...@gmail.com wrote:

 Hi -
 I just compiled OpenSSL 1.0.1g for Win32 using Visual Studio 2005; my
 application failed to link because of an unresolved external
 _check_winnt

 In crypto/rand/rand_win.c, function readscreen, this line:
   if (GetVersion()  0x8000  OPENSSL_isservice()0)

 was changed to
   if (check_winnt()  OPENSSL_isservice()0)


 And also in crypto/cryptlib.c, function OPENSSL_showfatal, this line:
 if (GetVersion()  0x8000  OPENSSL_isservice()  0)

 was changed to
 if (check_winnt()  OPENSSL_isservice()  0)


 I can't seem to find where check_winnt() is declared/defined.  So, I
 just changed it back.  This seems to work for me, but I thought I
 should mention it for other users.

 -Geoffrey
 __
 OpenSSL Project http://www.openssl.org
 User Support Mailing Listopenssl-users@openssl.org
 Automated List Manager   majord...@openssl.org




-- 
Steve Kneizys
Senior Business Process Engineer
Voice: (610) 256-1396  [For Emergency Service (888)864-3282]
Ferrilli Information Group -- Quality Service and Solutions for Higher
Education
web: http://www.ferrilli.com/ http://www.figsolutions.com/

Making you a success while exceeding your expectations.


Re: OpenSSL version 1.0.1g fails to link on Win32

2014-04-09 Thread Geoffrey Coram
Thanks for the report.  Is check_winnt() in the Windows libraries or
in OpenSSL?  I tried Googling it, but didn't come up with anything, 
and I didn't find a declaration in the OpenSSL source code.

I do nmake -f ntlib.mak, which makes some static libraries for me, 
using only code in crypto/ and ssl/  I suppose if check_winnt() is in 
a different directory, that would be my problem (and my fault for not 
re-running perl Configure).

-Geoffrey




On 04/09/2014 21:58, Steven Kneizys sknei...@ferrilli.com wrote:

 I just compiled 32 bit with ntdll.mak with nasm 2.11.02 and 
 Visual Studio Express 2013 with no issues, with and without the
 DOPENSSL_NO_HEARTBEATS option.  I was making it to drop the keys 
 files
 into Apache 2.2.26:
 openssl.exe
 ssleay32.dll
 libeay32.dll
 
 I am doing this to compile:
   perl Configure VC-WIN32 --prefix=C:\ApacheSoftware\Apache22\bin
 --openssldir=C:\ApacheSoftware\Apache22\conf
   ms\do_nasm
   nmake -f ms\ntdll.mak
 
 I know this is in the docs and such but so many people are working 
 in this right now I just thought I'd post that it can work OK with a
 newer VS version.
 
 Steve...
 
 
 On Wed, Apr 9, 2014 at 9:36 PM, Geoffrey Coram gjco...@gmail.com 
 wrote:
 
  Hi -
  I just compiled OpenSSL 1.0.1g for Win32 using Visual Studio 2005;
 my
  application failed to link because of an unresolved external
  _check_winnt
 
  In crypto/rand/rand_win.c, function readscreen, this line:
if (GetVersion()  0x8000  OPENSSL_isservice()0)
 
  was changed to
if (check_winnt()  OPENSSL_isservice()0)
 
 
  And also in crypto/cryptlib.c, function OPENSSL_showfatal, this 
 line:
  if (GetVersion()  0x8000  OPENSSL_isservice()  0)
 
  was changed to
  if (check_winnt()  OPENSSL_isservice()  0)
 
 
  I can't seem to find where check_winnt() is declared/defined.  So,
  I just changed it back.  This seems to work for me, but I thought 
  I should mention it for other users.
 
  -Geoffrey
  
 
 __
  OpenSSL Project 
 http://www.openssl.org
  User Support Mailing List
 openssl-users@openssl.org
  Automated List Manager   
 majord...@openssl.org
 
 
 
 
 -- 
 Steve Kneizys
 Senior Business Process Engineer
 Voice: (610) 256-1396  [For Emergency Service (888)864-3282]
 Ferrilli Information Group -- Quality Service and Solutions for 
 Higher
 Education
 web: http://www.ferrilli.com/ http://www.figsolutions.com/
 
 Making you a success while exceeding your expectations.

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Re: OpenSSL version 1.0.1g release signed with unauthorized key???

2014-04-09 Thread Wim Lewis

On 9 Apr 2014, at 4:12 PM, Jakob Bohm wrote:
 Attention: The .asc file I downloaded directly from openssl.org for the 
 1.0.1g tarball was signed with a key NOT authorized by the fingerprints.txt 
 file distributed in previous tarballs, nor by the (unverifiable) 
 fingerprints.txt available from
 
   http://www.openssl.org/docs/misc/
 
 Specifically, it was signed by a PGP key purporting to belong to Dr. Henson, 
 but with a different identifier and a different e-mail address
 than the authorized key listed for him in fingerprints.txt.
 
 I suspect this is just a mixup at your end, but one cannot feel too
 sure without a valid file signature consistent with the securely distributed 
 signature list.

I also noticed this--- previous tarballs were all signed by the F295C759 key 
(fingerprint ending in D57EE597), but this announcement and the 1.0.1g tarball 
were both signed by the FA40E9E2 key. However, the new key (all three of its 
userids) *is* signed by the old key, so there is I think some assurance that 
the new key also belongs to Dr Stephen Henson and that the release is 
legitimate.


__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


RE: OpenSSL version 1.0.1g fails to link on Win32

2014-04-09 Thread Jeremy Farrell
Googling check_winnt suggests openssl/e_os.h.

 From: Geoffrey Coram [mailto:gjco...@gmail.com]
 Sent: Thursday, April 10, 2014 3:27 AM
 
 Thanks for the report.  Is check_winnt() in the Windows libraries or
 in OpenSSL?  I tried Googling it, but didn't come up with anything,
 and I didn't find a declaration in the OpenSSL source code.
 
 I do nmake -f ntlib.mak, which makes some static libraries for me,
 using only code in crypto/ and ssl/  I suppose if check_winnt() is in
 a different directory, that would be my problem (and my fault for not
 re-running perl Configure).
 
 -Geoffrey
 
 On 04/09/2014 21:58, Steven Kneizys sknei...@ferrilli.com wrote:
 
  I just compiled 32 bit with ntdll.mak with nasm 2.11.02 and
  Visual Studio Express 2013 with no issues, with and without the
  DOPENSSL_NO_HEARTBEATS option.  I was making it to drop the keys
  files
  into Apache 2.2.26:
  openssl.exe
  ssleay32.dll
  libeay32.dll
 
  I am doing this to compile:
perl Configure VC-WIN32 --prefix=C:\ApacheSoftware\Apache22\bin
  --openssldir=C:\ApacheSoftware\Apache22\conf
ms\do_nasm
nmake -f ms\ntdll.mak
 
  I know this is in the docs and such but so many people are working
  in this right now I just thought I'd post that it can work OK with a
  newer VS version.
 
  Steve...
 
 
  On Wed, Apr 9, 2014 at 9:36 PM, Geoffrey Coram gjco...@gmail.com
  wrote:
 
   Hi -
   I just compiled OpenSSL 1.0.1g for Win32 using Visual Studio 2005;
  my
   application failed to link because of an unresolved external
   _check_winnt
  
   In crypto/rand/rand_win.c, function readscreen, this line:
 if (GetVersion()  0x8000  OPENSSL_isservice()0)
  
   was changed to
 if (check_winnt()  OPENSSL_isservice()0)
  
  
   And also in crypto/cryptlib.c, function OPENSSL_showfatal, this
  line:
   if (GetVersion()  0x8000  OPENSSL_isservice()  0)
  
   was changed to
   if (check_winnt()  OPENSSL_isservice()  0)
  
  
   I can't seem to find where check_winnt() is declared/defined.  So,
   I just changed it back.  This seems to work for me, but I thought
   I should mention it for other users.
  
   -Geoffrey
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org