Re: [openssl-users] OpenSSL version 1.1.1 pre release 9 published

2018-08-27 Thread Robert Moskowitz



On 08/27/2018 04:55 PM, Benjamin Kaduk via openssl-users wrote:

On Mon, Aug 27, 2018 at 04:38:24PM -0400, Robert Moskowitz wrote:


On 08/27/2018 04:07 PM, Hubert Kario wrote:

On Monday, 27 August 2018 20:57:53 CEST Robert Moskowitz wrote:

On 08/27/2018 02:33 PM, Hubert Kario wrote:

On Thursday, 23 August 2018 16:35:01 CEST Robert Moskowitz wrote:

Over the years and in protocol design development, I have heard too many
we can't.  So I set about with, "here is one way."  Since then I have
had a few people actually thank me for making it possible for them to
build an ecdsa pki for their product testing needs.  Just one justifies
my effort.

well, I see nothing wrong with providing documentation and how-to's, I just
don't see that it should be elevated to an Internet Draft level...

Well, see https://datatracker.ietf.org/doc/draft-wkumari-not-a-draft/ .


Warren is a riot.  I really should have put in a typo comment to him 
about 'safely razor' which probably should be 'safety razor'.  But then 
kind of knowing Warren, this could have been intentional so I left it 
alone. :)





by its very nature it needs to be constantly updated, so having it in a static
RFC is contrary to that

that is the value of Internet Drafts that many of us IETFers have figured
out.  draft versions can just keep on going and the tools will take you to
the current draft.  IDs have become neat working documents, though there is
more github work coming along.  More workgroups are doing requirements docs
that will never be published as RFCs; they will stay as IDs.  Much better
source of why did the wg do? than plow through the old mailing list
archives.  The IESG is actually encouraging such a use of IDs.

Yup!  Internet-Draft is a fine terminus for some types of document.
Many TLS registries now have a registration policy that explicitly calls out
an internet-draft that is never published as anything else, as a valid 
specification
for getting a codepoint assignment.

-Ben


--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] OpenSSL version 1.1.1 pre release 9 published

2018-08-27 Thread Benjamin Kaduk via openssl-users
On Mon, Aug 27, 2018 at 04:38:24PM -0400, Robert Moskowitz wrote:
> 
> 
> On 08/27/2018 04:07 PM, Hubert Kario wrote:
> >On Monday, 27 August 2018 20:57:53 CEST Robert Moskowitz wrote:
> >>On 08/27/2018 02:33 PM, Hubert Kario wrote:
> >>>On Thursday, 23 August 2018 16:35:01 CEST Robert Moskowitz wrote:
> >>
> >>Over the years and in protocol design development, I have heard too many
> >>we can't.  So I set about with, "here is one way."  Since then I have
> >>had a few people actually thank me for making it possible for them to
> >>build an ecdsa pki for their product testing needs.  Just one justifies
> >>my effort.
> >well, I see nothing wrong with providing documentation and how-to's, I just
> >don't see that it should be elevated to an Internet Draft level...

Well, see https://datatracker.ietf.org/doc/draft-wkumari-not-a-draft/ .

> >by its very nature it needs to be constantly updated, so having it in a 
> >static
> >RFC is contrary to that
> 
> that is the value of Internet Drafts that many of us IETFers have figured
> out.  draft versions can just keep on going and the tools will take you to
> the current draft.  IDs have become neat working documents, though there is
> more github work coming along.  More workgroups are doing requirements docs
> that will never be published as RFCs; they will stay as IDs.  Much better
> source of why did the wg do? than plow through the old mailing list
> archives.  The IESG is actually encouraging such a use of IDs.

Yup!  Internet-Draft is a fine terminus for some types of document.
Many TLS registries now have a registration policy that explicitly calls out
an internet-draft that is never published as anything else, as a valid 
specification
for getting a codepoint assignment.

-Ben
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] OpenSSL version 1.1.1 pre release 9 published

2018-08-27 Thread Robert Moskowitz



On 08/27/2018 04:07 PM, Hubert Kario wrote:

On Monday, 27 August 2018 20:57:53 CEST Robert Moskowitz wrote:

On 08/27/2018 02:33 PM, Hubert Kario wrote:

On Thursday, 23 August 2018 16:35:01 CEST Robert Moskowitz wrote:

On 08/23/2018 09:00 AM, Tomas Mraz wrote:

On Wed, 2018-08-22 at 20:08 -0400, Robert Moskowitz wrote:

On 08/22/2018 11:48 AM, Matt Caswell wrote:

On 22/08/18 00:53, Robert Moskowitz wrote:

On 08/21/2018 06:31 PM, Matt Caswell wrote:

On 21/08/18 16:24, Robert Moskowitz wrote:

Thanks!

Once Fedora beta picks this up, I will run my scripts against
it and see
if all cases of hash with ED25519 are fixed.

Unfortunately the command line usability changes for this
didn't make it
into the beta. They should still be in the final release.

Sigh.  That means you will get it right.  Right?  :)

Change seems simple enough.

The relevant change has now been merged to master.

Fedora had already built pre9.1.  But on the off chance, I will look
at
it with tomorrow's build.

I'm sorry but no, I am not updating Fedora with current git tree
checkout. You'll have to wait for the next prerelease or the final
version if there are no further prereleases.

Tomas,

Thanks for responding here.

I have been preparing an Internet Draft on how to build an ED25519 pki.
I know have the choice of:

building my own 1.1.1 pre9 for testing.
Wait to push the draft out until 1.1.1 is fully released.
Fudge the draft by adding yet another caveat (yes there is a caveat
section that I developed in creating the ECDSA pki draft) that the
commands are for how it is suppose to work in production 1.1.1, not what
I had to do in the prerelease.

Decisions decisions.  Thing is I want the draft out so I can push for
EDDSA support in IEEE 802.1AR with the next meeting early Sept.

I'm not sure if providing command line examples for one particular tool
are a good idea...

Example certificates, sure, but not commands to generate them...

"We can't test out the security part of the protocol because we cannot
get certificates"
"We ran our tests with security disable because we could not afford the
cost and time for a test pki."
"We did test with RSA certificates from vendor A." (and they were using
old libs that would not support ecdsa, but marketed it as such.)"

Over the years and in protocol design development, I have heard too many
we can't.  So I set about with, "here is one way."  Since then I have
had a few people actually thank me for making it possible for them to
build an ecdsa pki for their product testing needs.  Just one justifies
my effort.

well, I see nothing wrong with providing documentation and how-to's, I just
don't see that it should be elevated to an Internet Draft level...

by its very nature it needs to be constantly updated, so having it in a static
RFC is contrary to that


that is the value of Internet Drafts that many of us IETFers have 
figured out.  draft versions can just keep on going and the tools will 
take you to the current draft.  IDs have become neat working documents, 
though there is more github work coming along.  More workgroups are 
doing requirements docs that will never be published as RFCs; they will 
stay as IDs.  Much better source of why did the wg do? than plow through 
the old mailing list archives.  The IESG is actually encouraging such a 
use of IDs.



now, for generating testing certificates (and what's more important, the whole
PKI) we are using this script to provide sensible defaults and easy way to
generate certificates with just few options departing from those defaults:
https://github.com/redhat-qe-security/certgen


I will take a look at this.  It did not come up in my google searches a 
year ago.  Guess just not asking the right question or github is 
protected from google...



to get a PKI you run those commands:
source certgen/lib.sh
x509KeyGen ca
x509KeyGen server
x509SelfSign ca
x509CertSign --CA ca server

The private key file will be printed by use of:
x509Key server
to get certificate file name you run:
x509Cert server


In testing situations I have been in, intermediate CAs, revocation, the 
like are needed.


Plus getting more interest in 802.1AR certs with vendors (can't get 
certs to test out my product design).



(easy switches are also provided to get DER files or PKCS#12 files instead of
the default PEM format)


I will be interested to see how you handle DER, as I found cases where 
the command line was broken.  Read my caveat section.  In some cases you 
have to make the file in PEM then convert to DER.  Plus there is no DER 
way to handle cert chains as was discussed here a year ago.  So I will 
be interested to see how you handle cert chains non-PEM.



to get ecdsa certificate, you just need to change one of the above lines
with x509KeyGen to have `-t ecdsa` specified. Want RSA-PSS certificate? do `-t
rsa-pss`.

See runtest.sh for other examples.


I will take a look.


It is compatible with all versions of openssl since RHEL-4 (so 0.9.7), if a
given 

Re: [openssl-users] OpenSSL version 1.1.1 pre release 9 published

2018-08-27 Thread Hubert Kario
On Monday, 27 August 2018 20:57:53 CEST Robert Moskowitz wrote:
> On 08/27/2018 02:33 PM, Hubert Kario wrote:
> > On Thursday, 23 August 2018 16:35:01 CEST Robert Moskowitz wrote:
> >> On 08/23/2018 09:00 AM, Tomas Mraz wrote:
> >>> On Wed, 2018-08-22 at 20:08 -0400, Robert Moskowitz wrote:
>  On 08/22/2018 11:48 AM, Matt Caswell wrote:
> > On 22/08/18 00:53, Robert Moskowitz wrote:
> >> On 08/21/2018 06:31 PM, Matt Caswell wrote:
> >>> On 21/08/18 16:24, Robert Moskowitz wrote:
>  Thanks!
>  
>  Once Fedora beta picks this up, I will run my scripts against
>  it and see
>  if all cases of hash with ED25519 are fixed.
> >>> 
> >>> Unfortunately the command line usability changes for this
> >>> didn't make it
> >>> into the beta. They should still be in the final release.
> >> 
> >> Sigh.  That means you will get it right.  Right?  :)
> >> 
> >> Change seems simple enough.
> > 
> > The relevant change has now been merged to master.
>  
>  Fedora had already built pre9.1.  But on the off chance, I will look
>  at
>  it with tomorrow's build.
> >>> 
> >>> I'm sorry but no, I am not updating Fedora with current git tree
> >>> checkout. You'll have to wait for the next prerelease or the final
> >>> version if there are no further prereleases.
> >> 
> >> Tomas,
> >> 
> >> Thanks for responding here.
> >> 
> >> I have been preparing an Internet Draft on how to build an ED25519 pki.
> >> I know have the choice of:
> >> 
> >> building my own 1.1.1 pre9 for testing.
> >> Wait to push the draft out until 1.1.1 is fully released.
> >> Fudge the draft by adding yet another caveat (yes there is a caveat
> >> section that I developed in creating the ECDSA pki draft) that the
> >> commands are for how it is suppose to work in production 1.1.1, not what
> >> I had to do in the prerelease.
> >> 
> >> Decisions decisions.  Thing is I want the draft out so I can push for
> >> EDDSA support in IEEE 802.1AR with the next meeting early Sept.
> > 
> > I'm not sure if providing command line examples for one particular tool
> > are a good idea...
> > 
> > Example certificates, sure, but not commands to generate them...
> 
> "We can't test out the security part of the protocol because we cannot
> get certificates"
> "We ran our tests with security disable because we could not afford the
> cost and time for a test pki."
> "We did test with RSA certificates from vendor A." (and they were using
> old libs that would not support ecdsa, but marketed it as such.)"
> 
> Over the years and in protocol design development, I have heard too many
> we can't.  So I set about with, "here is one way."  Since then I have
> had a few people actually thank me for making it possible for them to
> build an ecdsa pki for their product testing needs.  Just one justifies
> my effort.

well, I see nothing wrong with providing documentation and how-to's, I just 
don't see that it should be elevated to an Internet Draft level...

by its very nature it needs to be constantly updated, so having it in a static 
RFC is contrary to that

now, for generating testing certificates (and what's more important, the whole 
PKI) we are using this script to provide sensible defaults and easy way to 
generate certificates with just few options departing from those defaults:
https://github.com/redhat-qe-security/certgen

to get a PKI you run those commands:
source certgen/lib.sh
x509KeyGen ca
x509KeyGen server
x509SelfSign ca
x509CertSign --CA ca server

The private key file will be printed by use of:
x509Key server
to get certificate file name you run:
x509Cert server

(easy switches are also provided to get DER files or PKCS#12 files instead of 
the default PEM format)

to get ecdsa certificate, you just need to change one of the above lines
with x509KeyGen to have `-t ecdsa` specified. Want RSA-PSS certificate? do `-t 
rsa-pss`.

See runtest.sh for other examples.

It is compatible with all versions of openssl since RHEL-4 (so 0.9.7), if a 
given feature is supported in that version of openssl.

(while ed25519 support is not yet there, it will be in few weeks, I was 
running just basic tests of it, without involving full PKI)
-- 
Regards,
Hubert Kario
Senior Quality Engineer, QE BaseOS Security team
Web: www.cz.redhat.com
Red Hat Czech s.r.o., Purkyňova 115, 612 00  Brno, Czech Republic

signature.asc
Description: This is a digitally signed message part.
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] OpenSSL version 1.1.1 pre release 9 published

2018-08-27 Thread Robert Moskowitz



On 08/27/2018 02:33 PM, Hubert Kario wrote:

On Thursday, 23 August 2018 16:35:01 CEST Robert Moskowitz wrote:

On 08/23/2018 09:00 AM, Tomas Mraz wrote:

On Wed, 2018-08-22 at 20:08 -0400, Robert Moskowitz wrote:

On 08/22/2018 11:48 AM, Matt Caswell wrote:

On 22/08/18 00:53, Robert Moskowitz wrote:

On 08/21/2018 06:31 PM, Matt Caswell wrote:

On 21/08/18 16:24, Robert Moskowitz wrote:

Thanks!

Once Fedora beta picks this up, I will run my scripts against
it and see
if all cases of hash with ED25519 are fixed.

Unfortunately the command line usability changes for this
didn't make it
into the beta. They should still be in the final release.

Sigh.  That means you will get it right.  Right?  :)

Change seems simple enough.

The relevant change has now been merged to master.

Fedora had already built pre9.1.  But on the off chance, I will look
at
it with tomorrow's build.

I'm sorry but no, I am not updating Fedora with current git tree
checkout. You'll have to wait for the next prerelease or the final
version if there are no further prereleases.

Tomas,

Thanks for responding here.

I have been preparing an Internet Draft on how to build an ED25519 pki.
I know have the choice of:

building my own 1.1.1 pre9 for testing.
Wait to push the draft out until 1.1.1 is fully released.
Fudge the draft by adding yet another caveat (yes there is a caveat
section that I developed in creating the ECDSA pki draft) that the
commands are for how it is suppose to work in production 1.1.1, not what
I had to do in the prerelease.

Decisions decisions.  Thing is I want the draft out so I can push for
EDDSA support in IEEE 802.1AR with the next meeting early Sept.

I'm not sure if providing command line examples for one particular tool are a
good idea...

Example certificates, sure, but not commands to generate them...

"We can't test out the security part of the protocol because we cannot 
get certificates"
"We ran our tests with security disable because we could not afford the 
cost and time for a test pki."
"We did test with RSA certificates from vendor A." (and they were using 
old libs that would not support ecdsa, but marketed it as such.)"


Over the years and in protocol design development, I have heard too many 
we can't.  So I set about with, "here is one way."  Since then I have 
had a few people actually thank me for making it possible for them to 
build an ecdsa pki for their product testing needs.  Just one justifies 
my effort.


If my making EDDSA certs easy for testing and I get one IoT product 
using certs that would otherwise claim that their product could not 
support the overhead of certs, it has been worth it.


I don't expect RFCs  from these draft.  Now Internet Drafts live forever 
(the drafts Yakov and I did for RFC 1597 are gone).  So my work will be 
around for others to use without a lot of pecking at google and this 
list to get it working.


And with eddsa, I did find one issue.  I was on the front side of things 
for a change.



--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] OpenSSL version 1.1.1 pre release 9 published

2018-08-27 Thread Blumenthal, Uri - 0553 - MITLL
Since this example would show how to generate certificates that people may not 
have a lot of experience dealing with - I think it would make a lot of sense to 
document as much as possible.

In short: yes please do include the examples of both what the certs should look 
like, and how to generate them.

On 8/27/18, 2:34 PM, "openssl-users on behalf of Hubert Kario" 
 wrote:

On Thursday, 23 August 2018 16:35:01 CEST Robert Moskowitz wrote:
> On 08/23/2018 09:00 AM, Tomas Mraz wrote:
> > On Wed, 2018-08-22 at 20:08 -0400, Robert Moskowitz wrote:
> >> On 08/22/2018 11:48 AM, Matt Caswell wrote:
> >>> On 22/08/18 00:53, Robert Moskowitz wrote:
>  On 08/21/2018 06:31 PM, Matt Caswell wrote:
> > On 21/08/18 16:24, Robert Moskowitz wrote:
> >> Thanks!
> >> 
> >> Once Fedora beta picks this up, I will run my scripts against
> >> it and see
> >> if all cases of hash with ED25519 are fixed.
> > 
> > Unfortunately the command line usability changes for this
> > didn't make it
> > into the beta. They should still be in the final release.
>  
>  Sigh.  That means you will get it right.  Right?  :)
>  
>  Change seems simple enough.
> >>> 
> >>> The relevant change has now been merged to master.
> >> 
> >> Fedora had already built pre9.1.  But on the off chance, I will look
> >> at
> >> it with tomorrow's build.
> > 
> > I'm sorry but no, I am not updating Fedora with current git tree
> > checkout. You'll have to wait for the next prerelease or the final
> > version if there are no further prereleases.
> 
> Tomas,
> 
> Thanks for responding here.
> 
> I have been preparing an Internet Draft on how to build an ED25519 pki. 
> I know have the choice of:
> 
> building my own 1.1.1 pre9 for testing.
> Wait to push the draft out until 1.1.1 is fully released.
> Fudge the draft by adding yet another caveat (yes there is a caveat
> section that I developed in creating the ECDSA pki draft) that the
> commands are for how it is suppose to work in production 1.1.1, not what
> I had to do in the prerelease.
> 
> Decisions decisions.  Thing is I want the draft out so I can push for
> EDDSA support in IEEE 802.1AR with the next meeting early Sept.

I'm not sure if providing command line examples for one particular tool are 
a 
good idea...

Example certificates, sure, but not commands to generate them...

-- 
Regards,
Hubert Kario
Senior Quality Engineer, QE BaseOS Security team
Web: www.cz.redhat.com
Red Hat Czech s.r.o., Purkyňova 115, 612 00  Brno, Czech Republic

-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] OpenSSL version 1.1.1 pre release 9 published

2018-08-27 Thread Hubert Kario
On Thursday, 23 August 2018 16:35:01 CEST Robert Moskowitz wrote:
> On 08/23/2018 09:00 AM, Tomas Mraz wrote:
> > On Wed, 2018-08-22 at 20:08 -0400, Robert Moskowitz wrote:
> >> On 08/22/2018 11:48 AM, Matt Caswell wrote:
> >>> On 22/08/18 00:53, Robert Moskowitz wrote:
>  On 08/21/2018 06:31 PM, Matt Caswell wrote:
> > On 21/08/18 16:24, Robert Moskowitz wrote:
> >> Thanks!
> >> 
> >> Once Fedora beta picks this up, I will run my scripts against
> >> it and see
> >> if all cases of hash with ED25519 are fixed.
> > 
> > Unfortunately the command line usability changes for this
> > didn't make it
> > into the beta. They should still be in the final release.
>  
>  Sigh.  That means you will get it right.  Right?  :)
>  
>  Change seems simple enough.
> >>> 
> >>> The relevant change has now been merged to master.
> >> 
> >> Fedora had already built pre9.1.  But on the off chance, I will look
> >> at
> >> it with tomorrow's build.
> > 
> > I'm sorry but no, I am not updating Fedora with current git tree
> > checkout. You'll have to wait for the next prerelease or the final
> > version if there are no further prereleases.
> 
> Tomas,
> 
> Thanks for responding here.
> 
> I have been preparing an Internet Draft on how to build an ED25519 pki. 
> I know have the choice of:
> 
> building my own 1.1.1 pre9 for testing.
> Wait to push the draft out until 1.1.1 is fully released.
> Fudge the draft by adding yet another caveat (yes there is a caveat
> section that I developed in creating the ECDSA pki draft) that the
> commands are for how it is suppose to work in production 1.1.1, not what
> I had to do in the prerelease.
> 
> Decisions decisions.  Thing is I want the draft out so I can push for
> EDDSA support in IEEE 802.1AR with the next meeting early Sept.

I'm not sure if providing command line examples for one particular tool are a 
good idea...

Example certificates, sure, but not commands to generate them...

-- 
Regards,
Hubert Kario
Senior Quality Engineer, QE BaseOS Security team
Web: www.cz.redhat.com
Red Hat Czech s.r.o., Purkyňova 115, 612 00  Brno, Czech Republic

signature.asc
Description: This is a digitally signed message part.
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] OpenSSL version 1.1.1 pre release 9 published

2018-08-23 Thread Matt Caswell


On 23/08/18 15:35, Robert Moskowitz wrote:
> building my own 1.1.1 pre9 for testing.

Note - you would have to build off of git master to get the usability
fixes since 1.1.1-pre9 was created prior them being merged.

Matt

> Wait to push the draft out until 1.1.1 is fully released.
> Fudge the draft by adding yet another caveat (yes there is a caveat
> section that I developed in creating the ECDSA pki draft) that the
> commands are for how it is suppose to work in production 1.1.1, not what
> I had to do in the prerelease.
> 
> Decisions decisions.  Thing is I want the draft out so I can push for
> EDDSA support in IEEE 802.1AR with the next meeting early Sept.
> 
> 
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] OpenSSL version 1.1.1 pre release 9 published

2018-08-23 Thread Robert Moskowitz



On 08/23/2018 09:00 AM, Tomas Mraz wrote:

On Wed, 2018-08-22 at 20:08 -0400, Robert Moskowitz wrote:

On 08/22/2018 11:48 AM, Matt Caswell wrote:

On 22/08/18 00:53, Robert Moskowitz wrote:

On 08/21/2018 06:31 PM, Matt Caswell wrote:

On 21/08/18 16:24, Robert Moskowitz wrote:

Thanks!

Once Fedora beta picks this up, I will run my scripts against
it and see
if all cases of hash with ED25519 are fixed.

Unfortunately the command line usability changes for this
didn't make it
into the beta. They should still be in the final release.

Sigh.  That means you will get it right.  Right?  :)

Change seems simple enough.

The relevant change has now been merged to master.

Fedora had already built pre9.1.  But on the off chance, I will look
at
it with tomorrow's build.

I'm sorry but no, I am not updating Fedora with current git tree
checkout. You'll have to wait for the next prerelease or the final
version if there are no further prereleases.


Tomas,

Thanks for responding here.

I have been preparing an Internet Draft on how to build an ED25519 pki.  
I know have the choice of:


building my own 1.1.1 pre9 for testing.
Wait to push the draft out until 1.1.1 is fully released.
Fudge the draft by adding yet another caveat (yes there is a caveat 
section that I developed in creating the ECDSA pki draft) that the 
commands are for how it is suppose to work in production 1.1.1, not what 
I had to do in the prerelease.


Decisions decisions.  Thing is I want the draft out so I can push for 
EDDSA support in IEEE 802.1AR with the next meeting early Sept.



--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] OpenSSL version 1.1.1 pre release 9 published

2018-08-23 Thread Tomas Mraz
On Wed, 2018-08-22 at 20:08 -0400, Robert Moskowitz wrote:
> 
> On 08/22/2018 11:48 AM, Matt Caswell wrote:
> > 
> > On 22/08/18 00:53, Robert Moskowitz wrote:
> > > 
> > > On 08/21/2018 06:31 PM, Matt Caswell wrote:
> > > > On 21/08/18 16:24, Robert Moskowitz wrote:
> > > > > Thanks!
> > > > > 
> > > > > Once Fedora beta picks this up, I will run my scripts against
> > > > > it and see
> > > > > if all cases of hash with ED25519 are fixed.
> > > > 
> > > > Unfortunately the command line usability changes for this
> > > > didn't make it
> > > > into the beta. They should still be in the final release.
> > > 
> > > Sigh.  That means you will get it right.  Right?  :)
> > > 
> > > Change seems simple enough.
> > 
> > The relevant change has now been merged to master.
> 
> Fedora had already built pre9.1.  But on the off chance, I will look
> at 
> it with tomorrow's build.

I'm sorry but no, I am not updating Fedora with current git tree
checkout. You'll have to wait for the next prerelease or the final
version if there are no further prereleases.

-- 
Tomáš Mráz
No matter how far down the wrong road you've gone, turn back.
  Turkish proverb
[You'll know whether the road is wrong if you carefully listen to your
conscience.]

-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] OpenSSL version 1.1.1 pre release 9 published

2018-08-22 Thread Robert Moskowitz



On 08/22/2018 11:48 AM, Matt Caswell wrote:


On 22/08/18 00:53, Robert Moskowitz wrote:


On 08/21/2018 06:31 PM, Matt Caswell wrote:

On 21/08/18 16:24, Robert Moskowitz wrote:

Thanks!

Once Fedora beta picks this up, I will run my scripts against it and see
if all cases of hash with ED25519 are fixed.

Unfortunately the command line usability changes for this didn't make it
into the beta. They should still be in the final release.

Sigh.  That means you will get it right.  Right?  :)

Change seems simple enough.

The relevant change has now been merged to master.


Fedora had already built pre9.1.  But on the off chance, I will look at 
it with tomorrow's build.




Matt



Matt



On 08/21/2018 08:36 AM, OpenSSL wrote:

  OpenSSL version 1.1.1 pre release 9 (beta)
  ===

  OpenSSL - The Open Source toolkit for SSL/TLS
  https://www.openssl.org/

  OpenSSL 1.1.1 is currently in beta. OpenSSL 1.1.1 pre release 9
has now
  been made available. For details of changes and known issues see
the
  release notes at:

   https://www.openssl.org/news/openssl-1.1.1-notes.html

  Note: This OpenSSL pre-release has been provided for testing ONLY.
  It should NOT be used for security critical purposes.

  The beta release is available for download via HTTP and FTP from
the
  following master locations (you can find the various FTP mirrors
under
  https://www.openssl.org/source/mirror.html):

    * https://www.openssl.org/source/
    * ftp://ftp.openssl.org/source/

  The distribution file name is:

   o openssl-1.1.1-pre9.tar.gz
     Size: 8411103
     SHA1 checksum: 01a42e93a34746340974b9fafe960226f7d10ff7
     SHA256 checksum:
95ebdfbb05e8451fb01a186ccaa4a7da0eff9a48999ede9fe1a7d90db75ccb4c

  The checksums were calculated using the following commands:

   openssl sha1 openssl-1.1.1-pre9.tar.gz
   openssl sha256 openssl-1.1.1-pre9.tar.gz

  Please download and check this beta release as soon as possible.
  To report a bug, open an issue on GitHub:

   https://github.com/openssl/openssl/issues

  Please check the release notes and mailing lists to avoid duplicate
  reports of known issues. (Of course, the source is also available
  on GitHub.)

  Yours,

  The OpenSSL Project Team.




--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] OpenSSL version 1.1.1 pre release 9 published

2018-08-22 Thread Matt Caswell


On 22/08/18 00:53, Robert Moskowitz wrote:
> 
> 
> On 08/21/2018 06:31 PM, Matt Caswell wrote:
>>
>> On 21/08/18 16:24, Robert Moskowitz wrote:
>>> Thanks!
>>>
>>> Once Fedora beta picks this up, I will run my scripts against it and see
>>> if all cases of hash with ED25519 are fixed.
>> Unfortunately the command line usability changes for this didn't make it
>> into the beta. They should still be in the final release.
> 
> Sigh.  That means you will get it right.  Right?  :)
> 
> Change seems simple enough.

The relevant change has now been merged to master.

Matt


> 
>>
>> Matt
>>
>>
>>> On 08/21/2018 08:36 AM, OpenSSL wrote:
>>>
>>>  OpenSSL version 1.1.1 pre release 9 (beta)
>>>  ===
>>>
>>>  OpenSSL - The Open Source toolkit for SSL/TLS
>>>  https://www.openssl.org/
>>>
>>>  OpenSSL 1.1.1 is currently in beta. OpenSSL 1.1.1 pre release 9
>>> has now
>>>  been made available. For details of changes and known issues see
>>> the
>>>  release notes at:
>>>
>>>   https://www.openssl.org/news/openssl-1.1.1-notes.html
>>>
>>>  Note: This OpenSSL pre-release has been provided for testing ONLY.
>>>  It should NOT be used for security critical purposes.
>>>
>>>  The beta release is available for download via HTTP and FTP from
>>> the
>>>  following master locations (you can find the various FTP mirrors
>>> under
>>>  https://www.openssl.org/source/mirror.html):
>>>
>>>    * https://www.openssl.org/source/
>>>    * ftp://ftp.openssl.org/source/
>>>
>>>  The distribution file name is:
>>>
>>>   o openssl-1.1.1-pre9.tar.gz
>>>     Size: 8411103
>>>     SHA1 checksum: 01a42e93a34746340974b9fafe960226f7d10ff7
>>>     SHA256 checksum:
>>> 95ebdfbb05e8451fb01a186ccaa4a7da0eff9a48999ede9fe1a7d90db75ccb4c
>>>
>>>  The checksums were calculated using the following commands:
>>>
>>>   openssl sha1 openssl-1.1.1-pre9.tar.gz
>>>   openssl sha256 openssl-1.1.1-pre9.tar.gz
>>>
>>>  Please download and check this beta release as soon as possible.
>>>  To report a bug, open an issue on GitHub:
>>>
>>>   https://github.com/openssl/openssl/issues
>>>
>>>  Please check the release notes and mailing lists to avoid duplicate
>>>  reports of known issues. (Of course, the source is also available
>>>  on GitHub.)
>>>
>>>  Yours,
>>>
>>>  The OpenSSL Project Team.
>>>
>>>
> 
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] OpenSSL version 1.1.1 pre release 9 published

2018-08-21 Thread Robert Moskowitz



On 08/21/2018 06:31 PM, Matt Caswell wrote:


On 21/08/18 16:24, Robert Moskowitz wrote:

Thanks!

Once Fedora beta picks this up, I will run my scripts against it and see
if all cases of hash with ED25519 are fixed.

Unfortunately the command line usability changes for this didn't make it
into the beta. They should still be in the final release.


Sigh.  That means you will get it right.  Right?  :)

Change seems simple enough.



Matt



On 08/21/2018 08:36 AM, OpenSSL wrote:

 OpenSSL version 1.1.1 pre release 9 (beta)
 ===

 OpenSSL - The Open Source toolkit for SSL/TLS
 https://www.openssl.org/

 OpenSSL 1.1.1 is currently in beta. OpenSSL 1.1.1 pre release 9
has now
 been made available. For details of changes and known issues see the
 release notes at:

  https://www.openssl.org/news/openssl-1.1.1-notes.html

 Note: This OpenSSL pre-release has been provided for testing ONLY.
 It should NOT be used for security critical purposes.

 The beta release is available for download via HTTP and FTP from the
 following master locations (you can find the various FTP mirrors
under
 https://www.openssl.org/source/mirror.html):

   * https://www.openssl.org/source/
   * ftp://ftp.openssl.org/source/

 The distribution file name is:

  o openssl-1.1.1-pre9.tar.gz
Size: 8411103
SHA1 checksum: 01a42e93a34746340974b9fafe960226f7d10ff7
SHA256 checksum:
95ebdfbb05e8451fb01a186ccaa4a7da0eff9a48999ede9fe1a7d90db75ccb4c

 The checksums were calculated using the following commands:

  openssl sha1 openssl-1.1.1-pre9.tar.gz
  openssl sha256 openssl-1.1.1-pre9.tar.gz

 Please download and check this beta release as soon as possible.
 To report a bug, open an issue on GitHub:

  https://github.com/openssl/openssl/issues

 Please check the release notes and mailing lists to avoid duplicate
 reports of known issues. (Of course, the source is also available
 on GitHub.)

 Yours,

 The OpenSSL Project Team.




--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] OpenSSL version 1.1.1 pre release 9 published

2018-08-21 Thread Matt Caswell



On 21/08/18 16:24, Robert Moskowitz wrote:
> Thanks!
> 
> Once Fedora beta picks this up, I will run my scripts against it and see
> if all cases of hash with ED25519 are fixed.

Unfortunately the command line usability changes for this didn't make it
into the beta. They should still be in the final release.

Matt


> 
> On 08/21/2018 08:36 AM, OpenSSL wrote:
> 
> OpenSSL version 1.1.1 pre release 9 (beta)
> ===
> 
> OpenSSL - The Open Source toolkit for SSL/TLS
> https://www.openssl.org/
> 
> OpenSSL 1.1.1 is currently in beta. OpenSSL 1.1.1 pre release 9
> has now
> been made available. For details of changes and known issues see the
> release notes at:
> 
>  https://www.openssl.org/news/openssl-1.1.1-notes.html
> 
> Note: This OpenSSL pre-release has been provided for testing ONLY.
> It should NOT be used for security critical purposes.
> 
> The beta release is available for download via HTTP and FTP from the
> following master locations (you can find the various FTP mirrors
> under
> https://www.openssl.org/source/mirror.html):
> 
>   * https://www.openssl.org/source/
>   * ftp://ftp.openssl.org/source/
> 
> The distribution file name is:
> 
>  o openssl-1.1.1-pre9.tar.gz
>Size: 8411103
>SHA1 checksum: 01a42e93a34746340974b9fafe960226f7d10ff7
>SHA256 checksum:
> 95ebdfbb05e8451fb01a186ccaa4a7da0eff9a48999ede9fe1a7d90db75ccb4c
> 
> The checksums were calculated using the following commands:
> 
>  openssl sha1 openssl-1.1.1-pre9.tar.gz
>  openssl sha256 openssl-1.1.1-pre9.tar.gz
> 
> Please download and check this beta release as soon as possible.
> To report a bug, open an issue on GitHub:
> 
>  https://github.com/openssl/openssl/issues
> 
> Please check the release notes and mailing lists to avoid duplicate
> reports of known issues. (Of course, the source is also available
> on GitHub.)
> 
> Yours,
> 
> The OpenSSL Project Team.
> 
> 
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


Re: [openssl-users] OpenSSL version 1.1.1 pre release 9 published

2018-08-21 Thread Robert Moskowitz

Thanks!

Once Fedora beta picks this up, I will run my scripts against it and see 
if all cases of hash with ED25519 are fixed.


On 08/21/2018 08:36 AM, OpenSSL wrote:

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512


OpenSSL version 1.1.1 pre release 9 (beta)
===

OpenSSL - The Open Source toolkit for SSL/TLS
https://www.openssl.org/

OpenSSL 1.1.1 is currently in beta. OpenSSL 1.1.1 pre release 9 has now
been made available. For details of changes and known issues see the
release notes at:

 https://www.openssl.org/news/openssl-1.1.1-notes.html

Note: This OpenSSL pre-release has been provided for testing ONLY.
It should NOT be used for security critical purposes.

The beta release is available for download via HTTP and FTP from the
following master locations (you can find the various FTP mirrors under
https://www.openssl.org/source/mirror.html):

  * https://www.openssl.org/source/
  * ftp://ftp.openssl.org/source/

The distribution file name is:

 o openssl-1.1.1-pre9.tar.gz
   Size: 8411103
   SHA1 checksum: 01a42e93a34746340974b9fafe960226f7d10ff7
   SHA256 checksum: 
95ebdfbb05e8451fb01a186ccaa4a7da0eff9a48999ede9fe1a7d90db75ccb4c

The checksums were calculated using the following commands:

 openssl sha1 openssl-1.1.1-pre9.tar.gz
 openssl sha256 openssl-1.1.1-pre9.tar.gz

Please download and check this beta release as soon as possible.
To report a bug, open an issue on GitHub:

 https://github.com/openssl/openssl/issues

Please check the release notes and mailing lists to avoid duplicate
reports of known issues. (Of course, the source is also available
on GitHub.)

Yours,

The OpenSSL Project Team.

-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEhlersmDwVrHlGQg52cTSbQ5gRJEFAlt8Ah8ACgkQ2cTSbQ5g
RJGYTAgAm4xPeNBGKAsmA9eoRm8FkQHew1zhf9G2P677n26+JKwoUBx7O6c/zhKV
c9wP5xjvDl3KlUNw3gga2URIE95wj4RGMOcLUxWEVci+oR7luRXDocJKcAfppLcl
50T4OKL/5tqtAodI700t42SlA4EWyZIv+Kt5YMzQnkbbelGqFA8Loi1yDks+JwWU
2xlx4ukAvCNUuHvKIs85QaRi5PSWRZHE4o49ijP+ynUSxSqjGTLpeW+Ij6pHOH+e
2rKAScmx1Ll3ZK50dVnlWif6H7hjftWclqbNXrGy76SUQjmmzi1vxAm8ftmgUZEP
qXxGwJpfpCirNBHPSXeaMSe4thZeCw==
=etGy
-END PGP SIGNATURE-


--
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users


[openssl-users] OpenSSL version 1.1.1 pre release 9 published

2018-08-21 Thread OpenSSL
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512


   OpenSSL version 1.1.1 pre release 9 (beta)
   ===

   OpenSSL - The Open Source toolkit for SSL/TLS
   https://www.openssl.org/

   OpenSSL 1.1.1 is currently in beta. OpenSSL 1.1.1 pre release 9 has now
   been made available. For details of changes and known issues see the
   release notes at:

https://www.openssl.org/news/openssl-1.1.1-notes.html

   Note: This OpenSSL pre-release has been provided for testing ONLY.
   It should NOT be used for security critical purposes.

   The beta release is available for download via HTTP and FTP from the
   following master locations (you can find the various FTP mirrors under
   https://www.openssl.org/source/mirror.html):

 * https://www.openssl.org/source/
 * ftp://ftp.openssl.org/source/

   The distribution file name is:

o openssl-1.1.1-pre9.tar.gz
  Size: 8411103
  SHA1 checksum: 01a42e93a34746340974b9fafe960226f7d10ff7
  SHA256 checksum: 
95ebdfbb05e8451fb01a186ccaa4a7da0eff9a48999ede9fe1a7d90db75ccb4c

   The checksums were calculated using the following commands:

openssl sha1 openssl-1.1.1-pre9.tar.gz
openssl sha256 openssl-1.1.1-pre9.tar.gz

   Please download and check this beta release as soon as possible.
   To report a bug, open an issue on GitHub:

https://github.com/openssl/openssl/issues

   Please check the release notes and mailing lists to avoid duplicate
   reports of known issues. (Of course, the source is also available
   on GitHub.)

   Yours,

   The OpenSSL Project Team.

-BEGIN PGP SIGNATURE-

iQEzBAEBCgAdFiEEhlersmDwVrHlGQg52cTSbQ5gRJEFAlt8Ah8ACgkQ2cTSbQ5g
RJGYTAgAm4xPeNBGKAsmA9eoRm8FkQHew1zhf9G2P677n26+JKwoUBx7O6c/zhKV
c9wP5xjvDl3KlUNw3gga2URIE95wj4RGMOcLUxWEVci+oR7luRXDocJKcAfppLcl
50T4OKL/5tqtAodI700t42SlA4EWyZIv+Kt5YMzQnkbbelGqFA8Loi1yDks+JwWU
2xlx4ukAvCNUuHvKIs85QaRi5PSWRZHE4o49ijP+ynUSxSqjGTLpeW+Ij6pHOH+e
2rKAScmx1Ll3ZK50dVnlWif6H7hjftWclqbNXrGy76SUQjmmzi1vxAm8ftmgUZEP
qXxGwJpfpCirNBHPSXeaMSe4thZeCw==
=etGy
-END PGP SIGNATURE-
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users