[openssl.org #288] session reuse: getting old session cipher not returned errors

2002-09-18 Thread Steve Haslam via RT
Hi, I'm working on putting SSL/TLS session caching into Exim, and I've almost got it working, borrowing heavily from the mod_ssl dbm caching code. The problem I'm getting is that when I reuse a session from the client side, I get this: Initialised TLS DBM file record @192.168.254.1 suggests

Re: [openssl.org #288] session reuse: getting old session cipher not returned errors

2002-09-18 Thread Steve Haslam via RT
On Wed, Sep 18, 2002 at 02:58:53AM +0100, Steve Haslam wrote: So, according to ssldump, the cipherSuite entry in the ServerHello is the same the second time round. Is it a problem that the client seems to be in read server hello B state twice? OK, can anyone advise me? Is ssldump really

Re: [openssl.org #288] session reuse: getting old session cipher not returned errors

2002-09-18 Thread Lutz Jaenicke via RT
On Wed, Sep 18, 2002 at 09:09:41AM +0200, Steve Haslam via RT wrote: On Wed, Sep 18, 2002 at 02:58:53AM +0100, Steve Haslam wrote: So, according to ssldump, the cipherSuite entry in the ServerHello is the same the second time round. Is it a problem that the client seems to be in read

Re: SSL sniffer

2002-09-18 Thread Bear Giles
I'm developing an OpenSSL-based SSL sniffer that monitors decrypted SSL traffic using the webserver's private keys on real site traffic (similar to ssldump). For some reasons, part of the SSL traffic is not being decrypted. I'm looking for possible reasons for this. The ones I am

Re: [openssl.org #288] session reuse: getting old session cipher not returned errors

2002-09-18 Thread Steve Haslam via RT
On Wed, Sep 18, 2002 at 03:47:52AM +0100, Steve Haslam wrote: SSL DEBUG HACK: s-hit=1, c=0x815217c (EDH-DSS-DES-CBC3-SHA), s-session-cipher=(nil) ((NONE)) In fact.. (talking to myself again, sorry), I looked in d2i_SSL_SESSION(), and it sets cipher to NULL, although it sets cipher_id. So is

Re: [openssl.org #288] session reuse: getting old session cipher not returned errors

2002-09-18 Thread Steve Haslam via RT
On Wed, Sep 18, 2002 at 09:18:22AM +0200, Lutz Jaenicke via RT wrote: On Wed, Sep 18, 2002 at 09:09:41AM +0200, Steve Haslam via RT wrote: SSL DEBUG HACK: s-hit=1, c=0x815217c (EDH-DSS-DES-CBC3-SHA), s-session-cipher=(nil) ((NONE)) maybe there's a problem with deserialising the

Re: [openssl.org #288] session reuse: getting old session cipher not returned errors

2002-09-18 Thread Steve Haslam via RT
On Wed, Sep 18, 2002 at 04:03:26PM +0200, Steve Haslam via RT wrote: On Wed, Sep 18, 2002 at 09:18:22AM +0200, Lutz Jaenicke via RT wrote: Workaround: the problem is does not appear, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, which is part of SSL_OP_ALL (see man

Re: [openssl.org #288] session reuse: getting old session cipher not returned errors

2002-09-18 Thread Steve Haslam
On Wed, Sep 18, 2002 at 09:18:22AM +0200, Lutz Jaenicke via RT wrote: On Wed, Sep 18, 2002 at 09:09:41AM +0200, Steve Haslam via RT wrote: SSL DEBUG HACK: s-hit=1, c=0x815217c (EDH-DSS-DES-CBC3-SHA), s-session-cipher=(nil) ((NONE)) maybe there's a problem with deserialising the

d2i_PUBKEY question

2002-09-18 Thread Chris Brook
I notice when using d2i_PUBKEY() to convert a string RSA SubjectPublicKeyInfo to an EVP_PKEY struct that the string pointer ends up pointing to random memory. Is this deliberate (e.g. for security reasons) or a bug? I would like to have the public key string still available when the function

Naming of Shared Libraries

2002-09-18 Thread Daniel McLean
I use the OpenSSL libraries on Solaris and Linux and have recently hacked my copy of Makefile.org to create copies of the shared libraries libssl.so and libcrypto.so with different names (eg libxyzssl.so and libxyzcrypto.so) - note: the hack is minimal, just building _additional_ shared