[openssl-users] How to get encryption strength?

2015-03-25 Thread Dirk Menstermann
Hello,

which API function can I use to obtain the bit strength of the key exchange
(size of the DH or ECDH parameters)?

There is the function SSL_get_cipher_bits, but this is only for the symmetric
cipher, not including the key exchange.

Thanks
Dirk
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


[openssl-users] Regarding server side sessions support

2015-03-25 Thread Sahib Jakhar
Hi,

I am trying to implement server side caching support for sessions by
using callback functions. However, the callback functions are never
being called, even though connection happens successfully without
session resumption. For your reference some of the sample code I am
pasting below:

ssl_session_ctx_id = 1;
SSL_CTX_set_session_id_context (c, (void *)ssl_session_ctx_id, sizeof
(ssl_session_ctx_id));
SSL_CTX_set_session_cache_mode(c, SSL_SESS_CACHE_SERVER |
SSL_SESS_CACHE_NO_INTERNAL);
SSL_CTX_sess_set_new_cb (c, custom_new_session_cb );
SSL_CTX_sess_set_remove_cb (c, custom_remove_session_cb );
SSL_CTX_sess_set_get_cb (c, custom_get_session_cb);


Can somebody kindly help me as to what I am missing out here? What
could be the reason behind the callback functions not being called?


Thanks
Sahib
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] How to get encryption strength?

2015-03-25 Thread Dr. Stephen Henson
On Wed, Mar 25, 2015, Dirk Menstermann wrote:

 Hello,
 
 which API function can I use to obtain the bit strength of the key exchange
 (size of the DH or ECDH parameters)?
 
 There is the function SSL_get_cipher_bits, but this is only for the symmetric
 cipher, not including the key exchange.
 

This is only supported in OpenSSL 1.0.2 and later. You can call
SSL_get_server_tmp_key() to get the peer temporary key. This returns an
EVP_PKEY structue which you can then analyse further.

Check out the function ssl_print_tmp_key() in apps/s_cb.c for a simple
example.

Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] Regarding server side sessions support

2015-03-25 Thread Dr. Stephen Henson
On Wed, Mar 25, 2015, Sahib Jakhar wrote:

 Hi,
 
 I am trying to implement server side caching support for sessions by
 using callback functions. However, the callback functions are never
 being called, even though connection happens successfully without
 session resumption. For your reference some of the sample code I am
 pasting below:
 
 ssl_session_ctx_id = 1;
 SSL_CTX_set_session_id_context (c, (void *)ssl_session_ctx_id, sizeof
 (ssl_session_ctx_id));
 SSL_CTX_set_session_cache_mode(c, SSL_SESS_CACHE_SERVER |
 SSL_SESS_CACHE_NO_INTERNAL);
 SSL_CTX_sess_set_new_cb (c, custom_new_session_cb );
 SSL_CTX_sess_set_remove_cb (c, custom_remove_session_cb );
 SSL_CTX_sess_set_get_cb (c, custom_get_session_cb);
 
 
 Can somebody kindly help me as to what I am missing out here? What
 could be the reason behind the callback functions not being called?
 

The client could be using session tickets which don't use a session cache. You
can try disabling them by setting SSL_OP_NO_TICKET.

Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] How to get encryption strength?

2015-03-25 Thread Dirk Menstermann
Very helpful. Thank you Steve.

Dirk

On 25.03.2015 16:35, Dr. Stephen Henson wrote:
 On Wed, Mar 25, 2015, Dirk Menstermann wrote:
 
 Hello,

 which API function can I use to obtain the bit strength of the key exchange
 (size of the DH or ECDH parameters)?

 There is the function SSL_get_cipher_bits, but this is only for the symmetric
 cipher, not including the key exchange.

 
 This is only supported in OpenSSL 1.0.2 and later. You can call
 SSL_get_server_tmp_key() to get the peer temporary key. This returns an
 EVP_PKEY structue which you can then analyse further.
 
 Check out the function ssl_print_tmp_key() in apps/s_cb.c for a simple
 example.
 
 Steve.
 --
 Dr Stephen N. Henson. OpenSSL project core developer.
 Commercial tech support now available see: http://www.openssl.org
 ___
 openssl-users mailing list
 To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
 

___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] Regarding server side sessions support

2015-03-25 Thread Viktor Dukhovni
On Wed, Mar 25, 2015 at 03:32:08PM +, Dr. Stephen Henson wrote:

  I am trying to implement server side caching support for sessions by
  using callback functions. However, the callback functions are never
  being called, even though connection happens successfully without
  session resumption. For your reference some of the sample code I am
  pasting below:
  
  ssl_session_ctx_id = 1;
  SSL_CTX_set_session_id_context (c, (void *)ssl_session_ctx_id, sizeof
  (ssl_session_ctx_id));
  SSL_CTX_set_session_cache_mode(c, SSL_SESS_CACHE_SERVER |
  SSL_SESS_CACHE_NO_INTERNAL);
  SSL_CTX_sess_set_new_cb (c, custom_new_session_cb );
  SSL_CTX_sess_set_remove_cb (c, custom_remove_session_cb );
  SSL_CTX_sess_set_get_cb (c, custom_get_session_cb);
  
  
  Can somebody kindly help me as to what I am missing out here? What
  could be the reason behind the callback functions not being called?
 
 The client could be using session tickets which don't use a session cache. You
 can try disabling them by setting SSL_OP_NO_TICKET.

I would NOT recommend disabling session tickets, they are better
than server-side caches.

That said, Postfix supports both, ahd the callbacks are called.  See lines
624-669 of:


https://github.com/vdukhovni/postfix/blob/master/postfix/src/tls/tls_server.c

-- 
Viktor.

line 165:
static const char server_session_id_context[] = Postfix/TLS;

lines 624-669:

if (cachable || ticketable || props-set_sessid) {

/*
 * Initialize the session cache.
 * 
 * With a large number of concurrent smtpd(8) processes, it is not a
 * good idea to cache multiple large session objects in each process.
 * We set the internal cache size to 1, and don't register a
 * remove_cb so as to avoid deleting good sessions from the
 * external cache prematurely (when the internal cache is full,
 * OpenSSL removes sessions from the external cache also)!
 * 
 * This makes SSL_CTX_remove_session() not useful for flushing broken
 * sessions from the external cache, so we must delete them directly
 * (not via a callback).
 * 
 * Set a session id context to identify to what type of server process
 * created a session. In our case, the context is simply the name of
 * the mail system: Postfix/TLS.
 */
SSL_CTX_sess_set_cache_size(server_ctx, 1);
SSL_CTX_set_session_id_context(server_ctx,
   (void *) server_session_id_context,
   sizeof(server_session_id_context));
SSL_CTX_set_session_cache_mode(server_ctx,
   SSL_SESS_CACHE_SERVER |
   SSL_SESS_CACHE_NO_AUTO_CLEAR);
if (cachable) {
app_ctx-cache_type = mystrdup(props-cache_type);

SSL_CTX_sess_set_get_cb(server_ctx, get_server_session_cb);
SSL_CTX_sess_set_new_cb(server_ctx, new_server_session_cb);
}

/*
 * OpenSSL ignores timed-out sessions. We need to set the internal
 * cache timeout at least as high as the external cache timeout. This
 * applies even if no internal cache is used.  We set the session
 * lifetime to twice the cache lifetime, which is also the issuing
 * and retired key validation lifetime of session tickets keys. This
 * way a session always lasts longer than the server's ability to
 * decrypt its session ticket.  Otherwise, a bug in OpenSSL may fail
 * to re-issue tickets when sessions decrypt, but are expired.
 */
SSL_CTX_set_timeout(server_ctx, 2 * scache_timeout);
}
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] ChaCha20/Poly1305 in OpenSSL?

2015-03-25 Thread Jeffrey Walton
On Mon, Mar 23, 2015 at 10:36 AM, Salz, Rich rs...@akamai.com wrote:
 It's unlikely to appear in 1.0.2 as it's a new feature.

 CloudFlare has posted patches that seem like they would drop in easily, for 
 folks that want to do it; see 
 https://blog.cloudflare.com/do-the-chacha-better-mobile-performance-with-cryptography/

Thanks Rich.

I see Adam Langley's patch here:
https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9a8646510b

Any ideas why it was not accepted or not merged? (I'm assuming it was
not merged because it was rejected for some reason).

Jeff
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


[openssl-users] FIPS: Which DRBG is default ?

2015-03-25 Thread jonetsu
Hello,

  When an application does not define OPENSSL_DRBG_DEFAULT_TYPE nor 
OPENSSL_DRBG_DEFAULT_FLAGS nor any compilation options (if applicable), is the 
default DRBG the 256 bit CTR AES (+ deviation function) in FIPS mode ?

Regards.



___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] ChaCha20/Poly1305 in OpenSSL?

2015-03-25 Thread Salz, Rich
 I see Adam Langley's patch here:
 https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9a8646510b
 
 Any ideas why it was not accepted or not merged? (I'm assuming it was not
 merged because it was rejected for some reason).

I thought his patch came before the IETF final doc, which changed some things.

___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] FIPS Linux kernel documentation ?

2015-03-25 Thread Jeffrey Walton
On Wed, Mar 25, 2015 at 4:12 PM, jonetsu jone...@teksavvy.com wrote:
 Hello,

   This is not about OpenSSL, although from experience, maybe some know the 
 answer. Does anyone know if actual documentation exists for the Linux kernel 
 FIPS mode apart from the source itself ?  There is nothing in Documentation/ 
 as per 3.18.2.  - thanks.

NIST should have a security policy on file. The security policy is
required documentation.

Jeff
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


[openssl-users] FIPS Linux kernel documentation ?

2015-03-25 Thread jonetsu
Hello,

  This is not about OpenSSL, although from experience, maybe some know the 
answer. Does anyone know if actual documentation exists for the Linux kernel 
FIPS mode apart from the source itself ?  There is nothing in Documentation/ as 
per 3.18.2.  - thanks.

Regards.


___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] FIPS Linux kernel documentation ?

2015-03-25 Thread Steve Marquess
On 03/25/2015 04:12 PM, jonetsu wrote:
 Hello,
 
 This is not about OpenSSL, although from experience, maybe some know
 the answer. Does anyone know if actual documentation exists for the
 Linux kernel FIPS mode apart from the source itself ?  There is
 nothing in Documentation/ as per 3.18.2.  - thanks.

I wasn't aware the Linux kernel (the real one, not proprietary
commercial derivatives) had a FIPS mode. Please enlighten me.

-Steve M.

-- 
Steve Marquess
OpenSSL Software Foundation, Inc.
1829 Mount Ephraim Road
Adamstown, MD  21710
USA
+1 877 673 6775 s/b
+1 301 874 2571 direct
marqu...@opensslfoundation.com
marqu...@openssl.com
gpg/pgp key: http://openssl.com/docs/0x6D1892F5.asc
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] FIPS Linux kernel documentation ?

2015-03-25 Thread jone...@teksavvy.com
On Wed, 25 Mar 2015 17:03:04 -0400
Steve Marquess marqu...@openssl.com wrote:

 I wasn't aware the Linux kernel (the real one, not proprietary
 commercial derivatives) had a FIPS mode. Please enlighten me.

It could very well be that the word 'mode' is not the right one.
'option' would perhaps be better.  This article from 2009 sets the
foundation:

http://www.guerilla-ciso.com/archives/793

I wonder, 6 years later, what the kernel fips option implies.  Maybe I
could try to contact Neil Horman andéor look into the sources.

___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


[openssl-users] Is RC4-MD5 disabled on Openssl-1.0.1h

2015-03-25 Thread Mukesh Yadav
HI,

I have a query for SSl cipher on Openssl-1.0.1h
Have an application which is using library compiled with openssl-1.0.1h.

Application is failing in func SSL_CTX_set_cipher_list() when input is 
RC4-MD5+RC4-SHA and it gets succeed when input is RC4-SHA.
Not sure whether RC4-MD5 is disabled by default on openssl-1.0.1h.
Earlier application was using openssl-0.9.8d.
There it used to work fine..
If that is the case, is there a way to enable RC4-MD5 on openssl-1.0.1h.

Tried looking opensource link, couldn't find a way to explicitly enable
this algorithm or even if it is diabled by default.
Any Inputs for same will be appreciated..


Thanks
Mukesh
___
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users