Re: [openssl-dev] Submitting new bugs to rt via mail broken?

2015-02-23 Thread Lutz Jaenicke
On Mon, Feb 23, 2015 at 11:53:17AM +0100, Rainer Jung wrote:
 Am 10.02.2015 um 21:30 schrieb Matt Caswell:
 
 On 10/02/15 19:23, Rainer Jung wrote:
 Hello everyone,
 
 I sent a mail to r...@openssl.org 3 days ago, subject OpenSSL 1.0.2 make
 test bus error in evp_test (Solaris 10 Sparc, sun4u).
 
 The mail didn't create a new ticket in RT, nor was it forwarded to the
 dev list.
 
 Should I resend or simply be more patient?
 
 Email to rt is manually moderated by Lutz. Sometimes it can take a few
 days to come through. Very occasionally a genuine email gets lost within
 the swamp of spam. I would be a little more patient, but if it doesn't
 arrive in a couple more days then try again.
 
 I tried again on Feb 14, about a week ago. Still nothing shows up in
 RT or on mailing lists. Other mails on the dev list also indicate
 problems with stalled RT communication.

Please don't send your original submissions as replies to other emails.
It just was sorted into the thread and I hence missed it.

Sorry,
Lutz
___
openssl-dev mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev


Re: [PATCH] Advance to the next state variant when reusing messages

2014-11-10 Thread Lutz Jaenicke
On Mon, Nov 10, 2014, Piotr Sikora wrote:

 (for some reason it was never received by rt@, so resending here)

Slipped through the moderation queue, sorry. It is in RT now.

Best regards,
Lutz
--
Lutz Jaenicke   jaeni...@openssl.org
OpenSSL Project http://www.openssl.org/~jaenicke/
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


OpenSSL mail server issues

2013-12-04 Thread Lutz Jaenicke
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi!

Due to a misunderstanding within the OpenSSL team we ran into trouble
with our mail and mailing service still hosted at the old server
(hopefully I will be able to complete the migration to the new server
over the Christmas break).

Caused by a software upgrade on Monday, Dec 2, 2013 around noon GMT the
following problems occured:
1 mail was not received due to software failure (which is ok as mail
  is queued at the sender)
2 a malfunction of the majordomo mailing list software lost mails
  received (which is not ok as these mails seem to be lost permanently).
As soon as issue 2 was noted the mail server was shut down again to
prevent further loss of mails.

As a consequence we seem to have lost mailing list contributions between
Monday noon GMT and Tuesday morning GMT.
If you have made any submissions that did not yet make it to the lists,
please resend them.

Most issues are fixed now except for minor effects (I have seen at least
one mail passing throught the moderation queue that only reached the
list truncated.

Sorry for any inconvenience caused,
Lutz
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Icedove - http://www.enigmail.net/

iQCVAwUBUp7qUniZOxScWKZtAQJmegP/ax8LfFbPsqg3JKDVQ4zokNBQcCg9v6Tg
Wy82nqeVDK+14SUgsDJcGDRiVkFYcMHoUANPSvfyprbt/sdbEFaF+1VpsA1Zlzxr
f4UM7TkXUhh+7be5wMorG1eQNHs8afQbvFjQ9tMxk84ESxNQ7FmAqAain4pVw7Bk
obNOqEy+8as=
=+QSD
-END PGP SIGNATURE-
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


OpenSSL server downtime

2013-03-15 Thread Lutz Jaenicke
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi!

The new server currently hosting the www, git, rt, ftp, and cvs
services is going to be moved within the installation of our hoster.
As a consequence, the system will be assigned a new IP address.
  Old: 178.16.220.54
  New: 185.9.166.106
The move is planned to happen around 12.30 UTC on Sunday, 17 Mar 2013.

Users are expected to see a short outage of the service. An additional
delay may be caused by the old IP address being cached in the DNS.

Best regards,
   Lutz
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/

iQCVAwUBUUNJd3iZOxScWKZtAQJlvwQAqZ6o8X70R5gElvX8929c5y+TtU7ViHr3
ClzteUdISun5zK1wCIhewCBEz92s8kCu0RtNk6t6D7g+LNOlAd9T2HO+wB0+WvC1
HMfTHJg3vNW5PgVaEzVEm69Nk4r3zfuXoginuQLHm3qIHopzrQMEy1DWxRD/Aysu
AfrtmWYs74A=
=TwV7
-END PGP SIGNATURE-
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


[openssl.org #2992] [PATCH] Fix POD errors to stop make install_docs dying with pod2man 2.5.0+

2013-02-15 Thread Lutz Jaenicke via RT
Applied.

Thanks,
Lutz

__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


Re: access to git repository from behind a proxy

2013-02-11 Thread Lutz Jaenicke
On 02/07/2013 03:35 PM, Vladimir Kotal wrote:
 
 Hi all,
 
 I am trying to follow the steps for cloning the git repository found on
 http://www.openssl.org/source/repos.html from behind a proxy. The proxy
 does not allow connections to the git port 9418.
 
 I tried http/https which both fail:
 
 fatal: https://git.openssl.org/openssl.git/info/refs not found: did you
 run git update-server-info on the server?
 
 which is basically saying there is no repository on the remote end.
 
 SSH access is mentioned on the page but it fails too:
 
 Cloning into openssl...
 The authenticity of host 'git.openssl.org (178.16.220.54)' can't be
 established.
 RSA key fingerprint is 59:c5:9c:b9:94:39:59:b6:da:59:3b:9d:22:3b:39:9d.
 Are you sure you want to continue connecting (yes/no)? yes
 Warning: Permanently added 'git.openssl.org,178.16.220.54' (RSA) to the
 list of known hosts.
 Permission denied (publickey).
 fatal: The remote end hung up unexpectedly
 
 
 Would it be possible to configure the git repos on git.openssl.org to
 allow http/https just like on github.com ?

A mirror allowing all of githubs protocols is available at github:
  https://github.com/openssl/openssl
I have also updated the Source-Repository page to reflect this fact :-)

Best regards,
Lutz


__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


OpenSSL infrastructure migration

2013-01-15 Thread Lutz Jaenicke
Hi!

As you will already have noted, the OpenSSL project is currently moving
its infrastructure to a new server. This migration is combined with a
change and/or upgrade of the tools (CVS - GIT, RT 3.x - 4.x, ...) so
we have decided to set up the new server first and to perform a step by
step migration. Most of the porting work is now done and I will now
start to redirect the DNS entries (one at a time) such that the new
services will be enabled.

Current status is:
* CVS has been retired and is now replaced by git. The last CVS commit
was in December.
  The git repository is available for cloning via
git clone git://git.openssl.org/openssl.git
  and for browsing via
http://git.openssl.org/ or https://git.openssl.org/
  All commits to the source code in 2013 have already been made using
git and the commit
  mails in the respective new format have been sent via the already
existing openssl-cvs mailing list.
  For obvious reasons we encourage contributors to provide patch and
extension proposals using
  git format...
* RT has been upgrade from an outdated version of the 3.x series to 4.0
and is now (again) available via
 http://rt.openssl.org/ and https://rt.openssl.org/
  with the guest account being guest with password guest like before.

The other services (web, ftp, mail) are still provided by the old server
but will also be migrated soon. I will not update the old web pages to
reflect the new setup as I do not intend to keep this state for long.

Best regards on behalf of the OpenSSL team,
Lutz

 
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


Re: OpenSSL infrastructure migration

2013-01-15 Thread Lutz Jaenicke
On 01/15/2013 12:50 PM, Lutz Jaenicke wrote:
 Hi!

 As you will already have noted, the OpenSSL project is currently moving
 its infrastructure to a new server. This migration is combined with a
 change and/or upgrade of the tools (CVS - GIT, RT 3.x - 4.x, ...) so
 we have decided to set up the new server first and to perform a step by
 step migration. Most of the porting work is now done and I will now
 start to redirect the DNS entries (one at a time) such that the new
 services will be enabled.

 Current status is:
 * CVS has been retired and is now replaced by git. The last CVS commit
 was in December.
   The git repository is available for cloning via
 git clone git://git.openssl.org/openssl.git
   and for browsing via
 http://git.openssl.org/ or https://git.openssl.org/
   All commits to the source code in 2013 have already been made using
 git and the commit
   mails in the respective new format have been sent via the already
 existing openssl-cvs mailing list.
   For obvious reasons we encourage contributors to provide patch and
 extension proposals using
   git format...
 * RT has been upgrade from an outdated version of the 3.x series to 4.0
 and is now (again) available via
  http://rt.openssl.org/ and https://rt.openssl.org/
   with the guest account being guest with password guest like before.

 The other services (web, ftp, mail) are still provided by the old server
 but will also be migrated soon. I will not update the old web pages to
 reflect the new setup as I do not intend to keep this state for long.

In the meantime I have also changed the DNS entries for www.openssl.org,
ftp.openssl.org, and rsync.openssl.org have been modified to point to
the new server.

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


Re: OpenSSL infrastructure migration

2013-01-15 Thread Lutz Jaenicke
On 01/15/2013 12:50 PM, Lutz Jaenicke wrote:
 Hi!

 As you will already have noted, the OpenSSL project is currently moving
 its infrastructure to a new server. This migration is combined with a
 change and/or upgrade of the tools (CVS - GIT, RT 3.x - 4.x, ...) so
 we have decided to set up the new server first and to perform a step by
 step migration. Most of the porting work is now done and I will now
 start to redirect the DNS entries (one at a time) such that the new
 services will be enabled.

 Current status is:
 * CVS has been retired and is now replaced by git. The last CVS commit
 was in December.
   The git repository is available for cloning via
 git clone git://git.openssl.org/openssl.git
   and for browsing via
 http://git.openssl.org/ or https://git.openssl.org/
   All commits to the source code in 2013 have already been made using
 git and the commit
   mails in the respective new format have been sent via the already
 existing openssl-cvs mailing list.
   For obvious reasons we encourage contributors to provide patch and
 extension proposals using
   git format...
 * RT has been upgrade from an outdated version of the 3.x series to 4.0
 and is now (again) available via
  http://rt.openssl.org/ and https://rt.openssl.org/
   with the guest account being guest with password guest like before.

 The other services (web, ftp, mail) are still provided by the old server
 but will also be migrated soon. I will not update the old web pages to
 reflect the new setup as I do not intend to keep this state for long.

In the meantime I have also changed the DNS entries for www.openssl.org,
ftp.openssl.org, and rsync.openssl.org have been modified to point to
the new server.

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


Re: Committing to openSSL - maximum fragment length

2013-01-15 Thread Lutz Jaenicke
On 01/12/2013 01:26 PM, Attila Gulyas wrote:
 Hi, 

 I have been working on implementing Maximm fragmentation length extension 
 (RFC3546, obsoleted by RFC6066) and I'd like to commit my work so that it'd 
 be available in later editions of openssl. 
 How may I do that? (I've been looking for an SVN access, or something like 
 that.)

Hi Attila,

we provide a public (read-only) access to our git repository so that you
can prepare your contribution as a patch against our code base:
  git clone git://git.openssl.org/openssl.git
Please send your contributions the request tracker via r...@openssl.org.

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


[openssl.org #2952] Testing new RT instance

2013-01-10 Thread Lutz Jaenicke via RT
This is a test of the upgraded RT for openssl.org

Best regards,
Lutz

__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


OpenSSL RT instance migration

2013-01-10 Thread Lutz Jaenicke
Hi,

in the process of upgrading and migrating our server infrastructure I
have just put the updated Request Tracker into operation. The request
tracker stays reachable via r...@openssl.org (or the alias
openssl-b...@openssl.org).
While the migration is still in progress, the web interface is
temporarily available via
  http[s]://rt.openssl.net/
(please note the .net at the end). Once we have finished updating our
infrastructure, the server will move back to openssl.org.

Hint: the certificate of the webserver is the openssl.org one so
please be prepared for a warning :-)

If you are experiencing any problems, please report.

Thank you very much for your patience,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


openssl.org web site certificate renewed

2011-08-30 Thread Lutz Jaenicke
Hi!

I have just installed a new 3 year wildcard *.openssl.org certificate
to our web site.
Thanks to GlobalSign for the new donation.

The migration should work more or less unnoted for the users. If you
experience any problems please drop me a message.

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


Re: Is RT not accepting patches?

2011-04-12 Thread Lutz Jaenicke
On 04/11/2011 11:10 PM, Tim Jackson wrote:
 Hi, I sent several patches to openssl-b...@openssl.org a few hours ago, but I 
 haven't seen them get forwarded to this list and don't see them at 
 http://rt.openssl.org/NoAuth/Buglist.html. Is this expected? Does 
 openssl-bugs still work, or do all patches have to go through 
 r...@openssl.org? I don't mind resending, but I didn't want to clog up the 
 patch submission system unnecessarily.

   

openssl-bugs and rt are synonyms. Due to the unavoidable amount of SPAM
sent to these addresses moderation has to take place resulting in some
delay.

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


OpenSSL server failure

2011-02-08 Thread Lutz Jaenicke
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi!

unfortunately the OpenSSL project has been hit by a hardware defect
(hard disk and power supply). The project hence had to be migrated to
a different server using a later version of the operating system and
tools.
Services are currently being restored:
* source code repositories have not been affected(!)
* mailing list services should now be up and running again, messages sent
  between Sunday evening and Tuesday afternoon that have not yet made
  it to the list are most likely lost.
* RT still seems to have some issues.
We apologize for any inconvenience.
Many thanks to Ralf S. Engelschall who is currently very busy on
restoring the services.

Best regards,
Lutz (on behalf of the team)
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iQCVAwUBTVFgH3iZOxScWKZtAQLM1QP/bTl9bn2cXxikm07AoVJhLv2jaZEXhdqJ
WkBYh8CTaB/FH8FK7K6NntIeyqLK/LjTolU1qpyDxeTRWfxQk/Eiv3Oy6qajJ6tX
tHWrwsKlC1mK07BmzNJnabR/YV1BIcAoCA3Y9oK/0Z4+oB3UjI/ehtnK23N9sgKn
EY3MqVk/T1Y=
=oC9H
-END PGP SIGNATURE-

__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


Re: How can I upload that .chm file?

2010-09-20 Thread Lutz Jaenicke
Harold S. Henry wrote:
 Thanks, Kyle. The problem, as identified in the delivery failure message, is 
 that openssl.org's mail server has a fixed message-size limit that is 
 exceeded by the size of the attachment. Sorry to be unclear.
   

Your contribution has been filed under #2342... but the mail server
seems to have eaten RT's mail to the list :-)

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


Re: How can I upload that .chm file?

2010-09-20 Thread Lutz Jaenicke
Kenneth Robinette wrote:
 Lutz

 How does one get access to the contributed .chm file?  I looked on the 
 OpenSSL site and cannot see any reference to it?
   

On the bottom of the descriptive test, right hand side, there should be
a small reference to OpenSSL.zip.

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


Re: Version control

2010-05-29 Thread Lutz Jaenicke
Am 28.05.2010 23:08, schrieb David Woodhouse:
 On Fri, 2010-05-28 at 10:14 +0200, Lutz Jaenicke wrote:
   
 The state of the test-repository is a bit old (approx one year) but
 you
 may have a look into
   git://login.openssl.org/openssl
   http://www.openssl.org/gitweb.cgi/

 When the initial test migrations were performed (2 years ago) I used
   cvs2svn-2.1.1
 with some setup in cvs2svn-git.options.
 
 Hm, OK. I'll try that again then.

   
  Since then Geoff Thorpe also worked a bit on some automatic way to
 keep the test repo in sync with the CVS repo but all of this is on
 hold until the team has come to a final decision... 
 
 What's to decide? Are there any plans being seriously proposed other
 than 
  1) Stay in the 20th century with CVS as we are now.
  2) Update to git.

 Surely nobody's suggesting svn/bzr/hg/arch or any of the other artifacts
 of the one-version-control-system-per-child craze

Some of the members of the team do work for google. To my best
understanding google is internally using mercurial so this discussion is
actually not concluded. Hence the project will stay in the 20th century
until a new version control system is agreed upon.

I would kindly suggest to not open a discussion about the merits and
advantages of the different version control systems on this list

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


Re: Version control

2010-05-28 Thread Lutz Jaenicke
Am 27.05.2010 18:48, schrieb David Woodhouse:
 On Thu, 2010-05-27 at 17:51 +0200, Lutz Jaenicke wrote:
   
 David Woodhouse wrote:
 
 On Wed, 2010-05-26 at 21:32 +0200, Ger Hobbelt wrote:
   
   
 Those [i_a] bits are my markers in our local code base so I know which 
 edits
 are mine when doing a (manual) merge with 'vanilla' CVS HEAD. Yes, I know
 there are smarter systems around, but I've been 'tracking' OpenSSL for
 almost a decade and tools available to me haven't always been smart enough
 to ensure I didn't lose local edits across upgrades. And drilling down the
 RCS database for every edit isn't fun nor fast like that. So marking has
 become a habit by now. Often accompanied with a short text about the 'why'
 or related info. Sorry, wasn't meant to be bothersome to you. 
 
 
 None of the existing CVS-git import tools handle the OpenSSL repository
 correctly -- they all do strange things on branches. But for HEAD, they
 should work OK.
   
   
 So far we have not seen technical problems when last tested.
 
 That's interesting. What tool were you testing? I've had issues with
 both cvs2git and git-cvsimport.

 My normal reaction in dealing with _any_ project which uses a legacy
 version control system (cvs,svn,hg,bzr,etc) is to mirror it into git so
 that I can deal with it sensibly. OpenSSL has so far resisted my
 efforts, which is one of the reason I find it a PITA to deal with.
   

The state of the test-repository is a bit old (approx one year) but you
may have a look into
  git://login.openssl.org/openssl
  http://www.openssl.org/gitweb.cgi/

When the initial test migrations were performed (2 years ago) I used
  cvs2svn-2.1.1
with some setup in cvs2svn-git.options. Since then Geoff Thorpe also
worked a bit on some automatic way to keep the test repo in sync with
the CVS repo but all of this is on hold until the team has come to a
final decision...

Best regards,
Lutz
# (Be in -*- mode: python; coding: utf-8 -*- mode.)

# As a partial check that the example options file is functional, we
# use it as the basis for this test.  We only need to overwrite the
# output option to get the output repository in the location expected
# by the test infrastructure.

execfile('cvs2svn-example.options')

from cvs2svn_lib.fulltext_revision_recorder \
 import SimpleFulltextRevisionRecorderAdapter
from cvs2svn_lib.git_revision_recorder import GitRevisionRecorder
from cvs2svn_lib.git_output_option import GitOutputOption


ctx.trunk_only = False
ctx.cross_project_commits = False
ctx.cross_branch_commits = False
ctx.username = 'cvs2svn'


# CVS uses unix login names as author names whereas git requires
# author names to be of the form foo bar.  The default is to set
# the git author to cvsauthor cvsauthor.  author_transforms can be
# used to map cvsauthor names (e.g., jrandom) to a true name and
# email address (e.g., J. Random jran...@example.com for the
# example shown).  All values should be either 16-bit strings or 8-bit
# strings in the utf-8 encoding.
author_transforms={
'jaenicke' : (u'Lutz Jänicke', 'jaeni...@openssl.org'),
'ben' : ('Ben Laurie', 'b...@openssl.org'),
'levitte' : ('Richard Levitte', 'levi...@openssl.org'),
'bodo' : (u'Bodo Möller', 'b...@openssl.org'),
'ulf' : (u'Ulf Möller', 'u...@openssl.org'),
'steve' : ('Dr. Stephen Henson', 'st...@openssl.org'),
'geoff' : ('Geoff Thorpe', 'ge...@openssl.org'),
'appro' : ('Andy Polyakov', 'ap...@openssl.org'),
'nils' : ('Nils Larsch', 'n...@openssl.org'),
'rse' : ('Ralf S. Engelschall', 'r...@openssl.org'),
'mark': ('Mark J. Cox', 'm...@openssl.org'),
'holger': ('Holger Reif', 'hol...@openssl.org'),
'paul' : ('Paul C. Sutton', 'p...@openssl.org'),
}

# How to convert author names, log messages, and filenames to unicode.
# The first argument to CVSTextDecoder is a list of encoders that are
# tried in order in 'strict' mode until one of them succeeds.  If none
# of those succeeds, then fallback_encoder is used in lossy 'replace'
# mode (if it is specified).  Setting a fallback encoder ensures that
# the encoder always succeeds, but it can cause information loss.
ctx.cvs_author_decoder = CVSTextDecoder(
[
'latin1',
'utf8',
'ascii',
],
#fallback_encoding='ascii'
)
ctx.cvs_log_decoder = CVSTextDecoder(
[
'latin1',
'utf8',
'ascii',
],
#fallback_encoding='ascii'
)
ctx.output_option = GitOutputOption(
'cvs2svn-tmp/git-dump.dat',
author_transforms=author_transforms,
)

ctx.revision_recorder = SimpleFulltextRevisionRecorderAdapter(
RCSRevisionReader('co'),
GitRevisionRecorder('cvs2svn-tmp/git-blob.dat'),
)
ctx.revision_excluder = NullRevisionExcluder()
ctx.revision_reader = None

run_options.clear_projects()

run_options.add_project(
r'/home/ljaenicke/opensource/openssl/openssl',
symbol_transforms=[
# See cvs2svn-example.options for more

Re: Version control

2010-05-27 Thread Lutz Jaenicke
David Woodhouse wrote:
 On Wed, 2010-05-26 at 21:32 +0200, Ger Hobbelt wrote:
   
 Those [i_a] bits are my markers in our local code base so I know which edits
 are mine when doing a (manual) merge with 'vanilla' CVS HEAD. Yes, I know
 there are smarter systems around, but I've been 'tracking' OpenSSL for
 almost a decade and tools available to me haven't always been smart enough
 to ensure I didn't lose local edits across upgrades. And drilling down the
 RCS database for every edit isn't fun nor fast like that. So marking has
 become a habit by now. Often accompanied with a short text about the 'why'
 or related info. Sorry, wasn't meant to be bothersome to you. 
 

 None of the existing CVS-git import tools handle the OpenSSL repository
 correctly -- they all do strange things on branches. But for HEAD, they
 should work OK.
   

So far we have not seen technical problems when last tested.

 I'd be very happy to work on fixing that, if there's a real prospect of
 OpenSSL actually changing over to using such a git repository once it
 exists. I think that would make life a _lot_ easier for anyone working
 on OpenSSL.
   

Internal discussion about which version control system to use in the
future have not yet been completed.

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


[openssl.org #2191] openSSL-0.9.8m make failure

2010-03-10 Thread Lutz Jaenicke via RT
From: Michael Wodei wo...@us.ibm.com
Date: Wed, 10 Mar 2010 04:33:24 -0700

You can withdraw this one, I found the issue

Mike Wodei
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


OpenSSL server problems

2010-03-09 Thread Lutz Jaenicke
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

Hi!

In the past few days we had some problems with the hardware of the
OpenSSL server providing the public services (web, mail, etc).
We are now closely monitoring the system and preparing to migrate to
another server if necessary.
Thank you very much for your patience.

Best regards,
Lutz
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org

iQCVAwUBS5Y9+XiZOxScWKZtAQL7RwP/R+FK3C8MCUDFDYADupddZS01Qx1yBAEf
4G5gdT6N9Hhr1F9LCDRk0liD7E9kERnD/0pYLYH0sV4B9FAWq5JuaekwwrnoSCqu
tiJ/y7py/mPKHFA9vPx+/4GyC0AlnOTUcNrUnahXi7lQp5sRq78/Uk2w6RXZX2iY
UfpFnI+yqL0=
=2kO7
-END PGP SIGNATURE-

__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


Re: Test of disabled renegotiation in 0.9.8l

2009-11-12 Thread Lutz Jaenicke
Boyle Owen wrote:
 PPS: Although I have subscribed to this list, I am not getting the mails
 (I have to keep checking the archives). Is there anyone who can check
 out my account? 
   

Hmm. If memory serves me right there was a subscribe message sent to
the list instead of the mailing list manager (which I then moderated
away)...
Please try again, we do have some handy form on the web page.

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


Re: [PATCH 00/14] Patches from the ocf-linux and uClinux-dist projects

2009-06-30 Thread Lutz Jaenicke
David McCullough wrote:
 Jivin Kyle Hamilton lays it down ...
   
 Please mail these each as attachments to r...@openssl.org.  This will
 ensure that each gets entered into a trackable state, and also ensures
 that the formatting for the patch files stays consistent.
 

 No problems,  I wasn't sure if I should do that or not, so I opted to
 not spam two lists ;-)

 It seems the mailing list ate 3 of the patches  (#2 #6 and #10),
 hopefully RT will deal with them,
   

The contents of some of your patches triggered the SPAM protection and
were sent to the moderation queue for manual approval. So they only
showed up with a delay caused by the moderator not being online 24/7 :-)

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


[openssl.org #1786] 0.9.9 HEAD: X509_POLICY_DATA/NODE function implementations missing - fix included

2009-04-14 Thread Lutz Jaenicke via RT
Closing as resolved.

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


Re: I hope the reports that I sent to -bugs are useful...

2009-04-01 Thread Lutz Jaenicke
Kyle Hamilton wrote:
 I hope the test reports I sent to -bugs are useful.  I'm on a Mac OSX
 10.5.6 machine, Intel-based, and I ran tests in both 32 and 64 bit
 modes, both without and with the optional features.  I do not have gmp
 installed, nor zlib, so I cannot vouch for their usability; I did not
 test krb5, and I also did not test the shared option.


   

Hi Kyle,

thank you very much for reports, they are currently sitting in the
moderation queue. I would kindly ask you and other testers to either
* send success messages to the list with just the platform mentioned
* send failures to openssl-bugs (or rt which is an alias) with a suitable
  subject line exposing the platform and type of problem
  Re: OpenSSL 1.0.0 beta1 released is not too useful as it will end up in
  many open tickets all having the same non-informative subject.

Thank you very much,
Lutz

__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


Re: I hope the reports that I sent to -bugs are useful...

2009-04-01 Thread Lutz Jaenicke
Kyle Hamilton wrote:
 On Wed, Apr 1, 2009 at 4:55 AM, Lutz Jaenicke l...@lutz-jaenicke.de wrote:
   
 Hi Kyle,

 thank you very much for reports, they are currently sitting in the
 moderation queue. I would kindly ask you and other testers to either
 * send success messages to the list with just the platform mentioned
 * send failures to openssl-bugs (or rt which is an alias) with a suitable
  subject line exposing the platform and type of problem
  Re: OpenSSL 1.0.0 beta1 released is not too useful as it will end up in
  many open tickets all having the same non-informative subject.

 Thank you very much,
Lutz
 

 Hi Lutz,

 The problem with 'just the platform mentioned' is that there are two
 separate types of platforms on OSX -- 32 bit and 64 bit.  I tested the
 default configuration on each.

 In addition, I also tested the experimental-jpake, enable-rfc3779,
 experimental-store, and basically all the other options I had
 available, in separate tests (both 32- and 64-bit).  I'd figured that
 you'd have the ability to parse the configuration lines so that you
 could identify the options in use, the platform, and any combination
 which resulted in a test failure -- and that more information would be
 easier to diagnose problems with than less.

 Which list should I send success reports to?  The body will need to
 include the compiler, the Configure options, and platform at the very
 least; that's a bit too much to fit into an appropriate Subject.

 (Or am I taking the concept of a proper, comprehensive test matrix too
 seriously for the OpenSSL team's liking?)

   



Probably you are not around long enough for the last (0.9.8) release :-)
In the past we tended to have the success reports sent to openssl-dev.
The problem with the success reports is that they are actually invalidated
with every new iteration so keeping those in the request tracker is not
the correct way.
I am considering on how to collect the success information which is
probably best handled with a yes or no (or the yes: betaX) in a
spreadsheet.
Failures have to be looked into one by one and hence should go into
separate tickets in the request tracker.

Best regards,
Lutz
I am considering how to collet
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


Re: Can not mail to r...@openssl.org.

2009-03-08 Thread Lutz Jaenicke

Jurko Gospodnetić wrote:

  Hi all.

  Just wandering whether there is something I am missing about posting 
bug reports/patches to 'r...@openssl.org'. I send a report there three 
days ago and got neither any confirmation nor did the report get 
forwarded to the development list. I resent the same report yesterday 
and still nothing.


  I sent the report from the same e-mail address I am posting this 
from. Is there some registration I'm missing in order to be able to 
send in patches using 'regular channels' as suggested on 
'http://www.openssl.org/support/rt.html'? Or is perhaps my subject 
line supposed to be formatted in a specific way? Or is it just that 
the list is moderated and no moderators have yet gotten to looking 
over my report?


It is moderated and I just did not find time to work through the 
moderation queue from Friday evening till now.


Best regards,
   Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


[openssl.org #1787] [PATCH] speed -multi buffered output fix

2008-12-10 Thread Lutz Jaenicke via RT
Thanks, patch applied.

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


[openssl.org #1761] [PATCH] AWOL openssl s_client eating CPU time.

2008-10-22 Thread Lutz Jaenicke via RT
Patch applied.

Thanks,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


[openssl.org #1764] openssl-0.9.8i random generator bug

2008-10-22 Thread Lutz Jaenicke via RT
 [EMAIL PROTECTED] - Tue Oct 21 14:23:50 2008]:
 
 Hello rt,
 
   During stress testing my project, suddenly got crash inside openssl
 
   openssl version - openssl-0.9.8i
   compiler - Microsoft Visual Studio 2008 Professional Edition (C++
 project)
   project - x64 debug compilation
   OS - Microsoft Windows XP x64 Edition Service Pack 2
 
   usage example:
 __inline void Rand(unsigned char* pBuf, uintptr_t nSize)
 {
 RAND_pseudo_bytes(pBuf,int(nSize));
 }
 __inline uintptr_t Rand(void)
 {
 uintptr_t   nRet;
 Rand(reinterpret_castunsigned
 char*(nRet),sizeof(uintptr_t));
 return nRet;
 }
 
 uintptr_t = Rand();
 
   stress test:
   my code executing Rand() repeately in two threads with
   100% loading of Dual Core CPU, in 100k-300k calls application
   crashes. no need to wait long :)
 
   crash:
   0xc005 (ACCESS_VIOLATION)
   sha1_block_data_order d:\libraryes\openssl-
 0.9.8i\crypto\sha\sha_locl.h (259)
 
   where is wrong:
   ssleay_rand_bytes   d:\libraryes\openssl-
 0.9.8i\crypto\rand\md_rand.c (474)
 
   crypto\rand\md_rand.c line 470:
   k=(st_idx+MD_DIGEST_LENGTH/2)-st_num; --- something wrong
 around this line
 
   with this data I'm getting crash:
   st_idx = 1032
   st_num = 1023
   k=(st_idx+MD_DIGEST_LENGTH/2)-st_num; // k == 19
 
   // MD_DIGEST_LENGTH/2-k == -9
   MD_Update(m,(state[st_idx]),MD_DIGEST_LENGTH/2-k); // with -9 it
 will crash
 
   I'm getting 100% crashes at each stress test. :(

Hmm, that is odd. STATE_SIZE is 1024, so there must not be st_idx
with a value larger than 1023. Upon call st_idx is set from state_index.

As your application is using threads: have you made sure that proper
locking functions are activated? A failure to properly lock the threads
while updating st_idx and friends would explain a failure like this.

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: [openssl.org #1703] Bug report for DTLS

2008-10-14 Thread Lutz Jaenicke
David Woodhouse wrote:
 On Mon, 2008-10-13 at 09:01 +0200, Lutz Jaenicke via RT wrote:
   
 Note: I have reverted the DTLS1_BAD_VER part as DTLS1_BAD_VER handling
 is not present in HEAD (0.9.9).
 

 That makes sense.

 I assume that DTLS1_BAD_VER handling wasn't added to HEAD because the
 pre-RFC version of DTLS was considered to be an OpenSSL-specific thing
 that would quickly die out as people upgraded to 0.9.8f and beyond?

 Now we've observed that there are servers in the wild which implement
 that old OpenSSL-specific version of the protocol, but which we'd like
 to be compatible with. If I can actually get that working in HEAD, would
 a patch to support it be acceptable?
   
I had a deeper look into the mailing list archive and I did not find
any explicit statement on why this was handed differently in 0.9.8
and in HEAD.
Finally we would of course prefer to move people to update to an
RFC compliant version, so I guess the pre-RFC support should be
configurable somehow. Andy, what do you think?

Best regards,
Lutz

__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


[openssl.org #1752] DTLS drops incoming packets when they are reordered.

2008-10-13 Thread Lutz Jaenicke via RT
From answer only sent to mailing list:

Yeah, it looks right. I haven't yet got it working with my test case,
because I need to use DTLS1_BAD_VER and there are other parts missing
from HEAD for that, on top of my patch in #1751 -- but I agree with your
assessment that it shouldn't be needed any longer.

Thanks, fix applied.

Best regards,
   Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


[openssl.org #1703] Bug report for DTLS

2008-10-13 Thread Lutz Jaenicke via RT
 [jaenicke - Fri Oct 10 12:42:51 2008]:
 
 I have applied the patch to 0.9.8-stable and adopted it to 0.9.9-dev. I
 am not very familiar with the DTLS implementation so hopefully I did not
 break it.

Note: I have reverted the DTLS1_BAD_VER part as DTLS1_BAD_VER handling
is not
present in HEAD (0.9.9).

Best regards,
Lutz

__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


[openssl.org #1703] Bug report for DTLS

2008-10-10 Thread Lutz Jaenicke via RT
I have applied the patch to 0.9.8-stable and adopted it to 0.9.9-dev. I
am not very familiar with the DTLS implementation so hopefully I did not
break it.

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


[openssl.org #1752] DTLS drops incoming packets when they are reordered.

2008-10-10 Thread Lutz Jaenicke via RT
 [EMAIL PROTECTED] - Tue Oct 07 10:57:04 2008]:
 
 This patch to the 0.9.8 branch fixes two bugs with misordered incoming
 packets in DTLS, which are reported as RT #1752.

Could you comment on the 0.9.9-dev branch as well?
The patch to d1_pkt.c applies fine. The length object is gone from the
code so it should not be needed any longer.

Best regards,
Lutz

 
 Firstly, the bitmap we use for replay protection was ending up with zero
 length, so a _single_ pair of packets getting switched around would
 cause one of them to be 'dropped'.
 
 Secondly, it wasn't even _dropping_ the offending packets, in the
 non-blocking case. It was just returning garbage instead.
 
 --- ssl/d1_lib.c~ 2008-10-02 06:43:47.0 +0100
 +++ ssl/d1_lib.c  2008-10-05 21:31:38.0 +0100
 @@ -106,6 +106,7 @@ int dtls1_new(SSL *s)
   pq_64bit_init((d1-bitmap.map));
   pq_64bit_init((d1-bitmap.max_seq_num));
   
 + d1-next_bitmap.length = d1-bitmap.length;
   pq_64bit_init((d1-next_bitmap.map));
   pq_64bit_init((d1-next_bitmap.max_seq_num));
  
 --- ssl/d1_pkt.c~ 2008-10-02 06:43:47.0 +0100
 +++ ssl/d1_pkt.c  2008-10-05 21:44:54.0 +0100
 @@ -597,6 +597,7 @@ again:
   /* check whether this is a repeat, or aged record */
   if ( ! dtls1_record_replay_check(s, bitmap, (rr-seq_num)))
   {
 + rr-length = 0;
   s-packet_length=0; /* dump this record */
   goto again; /* get another record */
   }
 
 
 

__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: [openssl.org #1752] DTLS drops incoming packets when they are reordered.

2008-10-06 Thread Lutz Jaenicke
David Woodhouse via RT wrote:
 (Was waiting for the RT to autoreply with a number before I followed up,
 but it doesn't seem to have arrived after half an hour, so I'll send
 anyway. Hopefully the References: header will associate this with the
 previous mail anyway...)
   

Mailings to rt are moderated.
The requested association was thus performed by the moderation
mechanism :-)

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


[openssl.org #1757] Compile crash on IA64 due to crypto/sha/Makefile problem

2008-10-06 Thread Lutz Jaenicke via RT
Thanks, I have applied the respective patch to the 0.9.7, 0.9.8 and 0.9.9
branches, see
  http://cvs.openssl.org/rlog?f=openssl/crypto/sha/Makefile
for commits 17496 to 17498.

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


OpenSSL Web Server Certificate renewed

2008-09-12 Thread Lutz Jaenicke
Hi!

I have just installed a new (2048bit) certificate and key to the
OpenSSL Project webserver. It is a wildcard certifcate for *.openssl.org
catching both www.openssl.org and rt.openssl.org.

Many thanks go to Steve Roylance from Globalsign for donating a
3 year wildcard SSL certificate!!

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


[openssl.org #1727] No License error getting

2008-08-06 Thread Lutz Jaenicke via RT
It seems you do not have enough licenses for your C compiler which is
thus locking up.

Sincere regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


[openssl.org #1728] Root Certificate Program

2008-08-06 Thread Lutz Jaenicke via RT
The OpenSSL project does not have a root CA program and has decided to
not supply root CA certificates with the toolkit.

Please checkout the FAQ:
  How can I set up a bundle of commercial root CA certificates?
  http://www.openssl.org/support/faq.html#USER16

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: non-blocking SSL_read() API problem

2008-08-01 Thread Lutz Jaenicke
Thor Lancelot Simon wrote:
 I think I've discovered another problem with the current non-blocking API.

 I have an application which reads data into fixed-size buffers which it
 maintains per session.  It uses non-blocking IO and select() when a read
 returns SSL_ERROR_WANT_{READ,WRITE}.

 To conserve memory I reduced the buffer size from 16384 to 8192 and saw
 sessions suddenly hang.  A coworker diagnosed this as follows:

 1) The peer sends a SSL record larger than the buffer size.

 2) We receive the SSL record.  The socket selects as ready to read.

 3) We call SSL_read with our 8k buffer.  The received data does not fit,
so OpenSSL buffers it internally and returns 8K with SSL_ERROR_WANT_READ.
   
The record size of the SSL record is predetermined by the sender with
16k being the maximum size specified by the protocol.

In order to return the (decrytped and authenticated) data to the
application, the full record must have been received as the MAC
(Message Authentication Code) is at the end of the record and
checking it requires to calculate the hash over the complete record
anyway. Hence, SSL_read() will only return and provide data once
the full record has been recevied from the underlying socket.

As the SSL communication just like TCP is stream oriented there is no
way for an application to know what is the size of a record, whether
data are split over several records or sent in one or whether more
information inside the stream was combined to just one record.

Hence you have to read from the stream with SSL_read() until there is
no more data to be retrieved. As long as there are bytes available
SSL_read() will return the number of bytes written to the buffer.
A following call to SSL_get_errror(ssl, number of bytes) will return
SSL_ERROR_NONE. The logic here is quite simple: the first test in
ssl/ssl_lib.c:SSL_get_error() is:
  if (i  0) return(SSL_ERROR_NONE);

Hence the scenario you describe here (returned 8k and
SSL_ERROR_WANT_READ at the same time) is technically impossible as
long as you did call SSL_get_error() with the correct return value of
SSL_read().

To find out whether there actually is decrypted data available to be read
you may use SSL_pending() before calling SSL_read().

I have written quite some amount of applications using non-blocking I/O
and while especially the shutdown behavior is questionable at least, the
actual
state machine never made any trouble to me.

Note: I did not invent the API, I just wrote the manual pages :-)

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: non-blocking SSL_read() API problem

2008-08-01 Thread Lutz Jaenicke
Thor Lancelot Simon wrote:
 On Fri, Aug 01, 2008 at 03:49:01PM +0200, Lutz Jaenicke wrote:
   
 Thor Lancelot Simon wrote:

 The record size of the SSL record is predetermined by the sender with
 16k being the maximum size specified by the protocol.
 

 32K for SSLv2, no?
   
I stopped caring for SSLv2 quite some time ago.

 In order to return the (decrytped and authenticated) data to the
 application, the full record must have been received as the MAC
 (Message Authentication Code) is at the end of the record and
 checking it requires to calculate the hash over the complete record
 anyway. Hence, SSL_read() will only return and provide data once
 the full record has been recevied from the underlying socket.
 

 Yes, I understand this.  The problem is that since the API doesn't include
 SSL_select() or SSL_poll(), there's no way for an application to sleep
 once SSL_read() consumes the data out of the socket buffer.  This means
 SSL_read() can't work quite like read(2) here -- it requires the read to
 completion behavior you mention.
   
Yes.

 This leads to another problem, actually:

 A malicious peer which sends data as fast as it can can get _more_ data
 into the socket buffer while the application is trying to read to
 completion.  This can deny service to _other_ peers.
   

This type of fairness has to be implemented by the application.
This will include modifying the event handling.

 Basically an event-driven application which had an event loop like this
 (which worked with the Unix model):

   while (1)
   {
   select()
   
   for(selected writable) {
   write(it all);
   }
   for(selected readable) {
   read(fixed size for fairness);
   }
   }

 Now has to do something like this:

   while (1)
   {
   select()

   for(selected writable) {
   SSL_write(it all);
   }
   for(SSL_pending() was true after last read) {
   SSL_read(another fixed size chunk);
   if (SSL_pending(this SSL)) {
   flag as more coming in private datastructure;
   }
   }
   for(selected readable) {
   SSL_read(fixed size for fairness);
   if (SSL_pending(this SSL)) {
   flag as more coming in private datastructure;
   }
   }
   }

 This will work, but it will require restructuring the event loops of
 many applications written to expect the Unix was (which is not great, but
 so long as it's documented, it's better).
   
What kind of application are you talking about?
So far I have not seen any appliation that is collecting data from different
peers based on a amount of data sent round robin fashion. More or
less every application tends to have a higher level protocol with
handshake etc. that is actually responsible to deal with the peers
data.

Even though the interface might seem read()/write() compatible on the
first glance it finally is not and probably can never be as the protocol is
using bidirectional traffic for both read and write such that a simple
select model cannot be used.

 The SSL_read() manual page should at least mention that it's unsafe to
 call select again if SSL_pending() comes true.  At present, it doesn't
 mention SSL_pending() at all.
   
That is true indeed.
 And this will work only as long as we're guaranteed SSL_pending() will
 never actually read from the socket buffer, which someone might want to
 make a note of somewhere!
   
It better should not because actually SSL_pending() should be
usable in the blocking case as well which would not hold if it
would actually try going down the chain.

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


[openssl.org #1260] [REQ] Include this root certificate with openssl sources

2008-05-23 Thread Lutz Jaenicke via RT
The OpenSSL distribution as of 0.9.8h is no longer shipped with any root
CA certificates.

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


[openssl.org #1645] Ehancement - The addition of GlobalSigns Roots into the default openSSL rootstore

2008-05-23 Thread Lutz Jaenicke via RT
The OpenSSL distribution as of 0.9.8h is no longer shipped with any root
CA certificates.

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


[openssl.org #1513] Bug : SSL_CTX_use_certificate_chain_file fails due to earlier errors

2008-05-23 Thread Lutz Jaenicke via RT
Respective patch applied, thanks.
The fix will be in 0.9.8h.

Best regards,
   Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


[openssl.org #1417] enhancement request: FAQ

2008-05-23 Thread Lutz Jaenicke via RT
Issue resolved by code modification, see ticket #1513.

Best regards,
   Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: valgrind and openssl

2008-05-16 Thread Lutz Jaenicke
Bodo Moeller wrote:
 However, another intentional use of potentially unitialized data is
 still left as of
 http://cvs.openssl.org/getfile/openssl/crypto/rand/randfile.c?v=1.47.2.2
 :

   i=fread(buf,1,n,in);
   if (i = 0) break;
   /* even if n != i, use the full array */
   RAND_add(buf,n,(double)i);

 Changing this into RAND_add(buf,i,(double)i) should make verification
 tools happier.  Or it could be

 #ifdef PURIFY
   RAND_add(buf,i,(double)i);
 #else
   RAND_add(buf,n,(double)i);
 #endif

 (abusing the PURIFY macro with a more general meaning).
   
Good catch, patch applied :-)

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: Will this change causes lock up?

2008-04-18 Thread Lutz Jaenicke
Zhichao Hong wrote:
 I have sent email about a client hangs when trying to communicating
 with server using 0.9.7e version of the openssl. When looking into the
 debugger stack trace, the ssl3_read_n blocks forever in the s3_pkt.c.
 When I browsed the cvs change history, the following issue was fixed
 later in Nov 2006.  I am wondering without the fix (i.e. setting
 s-first_packet to 0), will it cause some kind of locked up?

 --- s3_pkt.c  2004/05/15 17:46:50 1.46.2.7
 +++ s3_pkt.c  2006/11/29 14:44:07 1.46.2.8
 @@ -275,11 +275,7 @@
   n2s(p,rr-length);

   /* Lets check version */
 - if (s-first_packet)
 - {
 - s-first_packet=0;
 - }
 - else
 + if (!s-first_packet)
   {
   if (version != s-version)
   {

 Any insight will be very appreciated
Hmm, the full commit is at
  http://cvs.openssl.org/chngview?cn=15686

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


[openssl.org #1609] openssl-0.9.8g - Bug report and maybe simple patch

2008-04-18 Thread Lutz Jaenicke via RT
The missing defitions have been added.

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: Will this change causes lock up?

2008-04-18 Thread Lutz Jaenicke
Zhichao Hong wrote:
 Thank you, Lutz, for the change set information!  I have to admit that
 I am not a power user of the openssl at the source level.  We are not
 controlling the server as it is a standard IIS HTTPS.   The software
 is using openssl library on top of openbsd stack.  So do you know what
 is the impact on the client side if the fix are not applied?
   

If I would have understood the impact I would have explained :-) .
I did checkout the mailing lists around the date of commit and did not
find any statement regarding this change.

Sorry,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


[openssl.org #1552] mingw patch for openssl-0.9.8e

2008-04-17 Thread Lutz Jaenicke via RT
I have applied both the patch from Roumen Petrov and the Fixup from Alon
Bar-Lev.
I don't have a mingw environment to actually verify the correct
operation. Please check out the next snapshot and verify that everything
is working now as expected.

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


[openssl.org #1451] Re: PATCH (Re: Cross compile OpenSSL in Linux using MinGW32)

2008-04-17 Thread Lutz Jaenicke via RT
Closing as well according to #1552
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


[openssl.org #1659] NULL pointer dereference in rsautl bug and patch

2008-04-17 Thread Lutz Jaenicke via RT
I have applied a different modification which is a little bit more in
line with the handling in other applications (where the handling seems
to be correct).
  http://cvs.openssl.org/chngview?cn=17067

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


[openssl.org #1607] Bug in openssl - file apps.c

2008-04-17 Thread Lutz Jaenicke via RT
Thanks, fixed in
  http://cvs.openssl.org/chngview?cn=17069 (0.9.8-stable)
  http://cvs.openssl.org/chngview?cn=17068 (HEAD)
  

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


[openssl.org #1660] Request for feature, all Windows systems, all OpenSSL versions.

2008-04-16 Thread Lutz Jaenicke via RT
I agree with Shaw Graham George's post on openssl-dev. Modifying system
settings upon installation would seem to be too intrusive for the
OpenSSL source package.

OpenSSL as distributed by the OpenSSL team does not modify system
settings during installation on any platform. Typically integrators
providing distributions like (name-your-favorite) Linux distribution are
providing such functions as their value add... and besides they do
know more about the specific installation requirements than we do.

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: 64 bits computer always returns the same salt

2008-04-16 Thread Lutz Jaenicke
David Erosa García wrote:
 Hello all. 

 I tried the openssl-users list but I think this may be a question for
 the devel list:

 I'm doing my homework about openssl, but *this question has nothing to
 do with it*. It's just a doubt that arised while doing it. 

 There is one exercise with the following text: 

  
 Con el comando “openssl enc” y la siguiente clave AES: 
 188458A6D15034DFE386F23B61D43774 se puede descifrar cierta información. 
 Podrías decir cual? 
  
 Using the command  openssl enc and the following AES key: 
 188458A6D15034DFE386F23B61D43774 you can decode some information, could 
 you say what? 

 I started playing with openssl enc and I thought the only thing I 
 could guess was the salt (Surely I'm wrong). 

 So I ran the command with a random IV: 
 openssl enc -aes128 -K 188458A6D15034DFE386F23B61D43774 -iv 1 -P 

 I found that the salt varies as it should on two machines with 32 bit 
 CPU (not my main one): 

 Office's computer (openssl 0.9.8g-4ubuntu2): 
 salt=4075DFB76496F2B7 
 salt=4045D8B76466EBB7 
 salt=40C5DAB764E6EDB7 
 salt=4015DEB76436F1B7 
 salt=4025DFB76446F2B7 

 A server I have somewhere else (openssl 0.9.8c-4etch1): 
 salt=50D882BF0C00 
 salt=B05DD9BF0C00 
 salt=A0CCC7BF0C00 
 salt=E0C88BBF0C00 
 salt=204190BF0C00 

 But when I run it on my main computer, it always outputs the same salt! 
 This machine is a 64bit CPU, running a 64bits linux distribution 
 (openssl 0.9.8g-4ubuntu2): 

 salt=0004 
 salt=0004 
 salt=0004 
 salt=0004 

 I've been searching through  the openssl lists and found nothing about
 this behavior. 

 What can be happening? Is it about the 64 bit version of openssl? 
   
No, the actual output may depend on the system but the reason behind it
is found in apps/enc.c:
...
if (cipher != NULL)
{
/* Note that str is NULL if a key was passed on the command
 * line, so we get no salt in that case. Is this a bug?
 */
if (str != NULL)
...

In the case the str == NULL the memory containing the salt is an
uninitialized part of the stack so its content is undefined and the
behavior will depend on system and compiler (options) used.

Best regards,
Lutz

__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: [openssl.org #1663] bug report openssl-0.9.8g on Windows XP

2008-04-16 Thread Lutz Jaenicke via RT
Andrew Lamoureux via RT wrote:
 Hi, I'd like to report a bug in openssl-0.9.8g compiled with 
 Visual Studio. OS is Windows XP.

 Access violation occurs when BN_rshift() is used on a BIGNUM whose 
 bit length is less (amount required varies) than the number of 
 bits requesting to be shifted.

 Here is very simple code that reliably reproduces the problem:

 BIGNUM * bnp = BN_new();
 BN_rand(bnp, 64, 0, 0);
 BN_rshift(bnp, bnp, 67);

   
It does crash in BN_rshift() with a segmentation violation on Linux as well.

Best regards,
Lutz


__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


[openssl.org #1662] key generation creates world-readable keys by default

2008-04-16 Thread Lutz Jaenicke via RT
OpenSSL does create keys in more components than just gen(r|d)sa. In
none of these functions any file permission mask is used.
All of the components in openssl/apps are using the file-BIO which
behaves like stdio and does not have idea about file permissions.
People using OpenSSL to generate their keys should rather use safe umask
settings.

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


[openssl.org #1661] README file references a non-existing URL

2008-04-07 Thread Lutz Jaenicke via RT
That is indeed true. I have migrated RT quite a lot of time ago but did
miss the obvious references in the process.
* fixed the URI in the respective files for future releases
* added a redirection at the URI provided to the new page

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


[openssl.org #1641] [Patch] uninitialized variable in bn_mont.c

2008-02-28 Thread Lutz Jaenicke via RT
Closing according to respective email on [EMAIL PROTECTED]

Hi,

a couple of days ago I've reported the bug:
http://rt.openssl.org/Ticket/Display.html?id=1641

It looks like that Bodo's commit (see below) has fixed the reported problem.

So the bug can be closed and set to fixed.


Best regards,
Christian 
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: Minor bug in verify manpage

2008-01-31 Thread Lutz Jaenicke
Richard Hartmann wrote:
 Hi all,

 3 X509_V_ERR_UNABLE_TO_GET_CRL unable to get certificate CRL

 should read

 3 X509_V_ERR_UNABLE_TO_GET_CRL: unable to get certificate CRL

 i.e. there is a colon missing. If there is any interest, I can create a patch
 but it is probably faster for both sides if someone with commit access
 just fixes this him- or herself.

   
Applied.

Thanks,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: Administrivia and seasons greetings

2008-01-05 Thread Lutz Jaenicke

Guenter Knauf wrote:

Hi Lutz,
  

Replies to active tickets are handled automatically.


I've a ticket open where I posted a couple of times updates:
http://rt.openssl.org/index.html?q=1611
but nothing of these appear here on the list - although they are properly 
listed with #1611...
can you tell me what I'm probably doing wrong?
  

I don't know what goes wrong for you. All of the mails have been sent to
the mailing list: I have checked both my personal mailbox as well as public
mail archives.
Hint: my Thunderbird marked the mails as possible SCAM. Do you have
any automatic SPAM filter?

Best regards,
   Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: Display the CRL number w/o -text [patch included]

2007-12-19 Thread Lutz Jaenicke
Bruno Bonfils wrote:
 Hi openssl's people,

 I'm currently writing a script to check a PKI. For this purpose, I
 wrote a small patch to display the crlNumber directly from the crl's
 app:

 # openssl crl -in ca.crl -crlnumber -noout
 crlNumber=42

 I'll happy if the patch can be include in upstream.
   

Thanks for your submission.
Could you kindly submit your proposed patch in unified diff format to
OpenSSL's request tracker?
  http://www.openssl.org/support/rt.html

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: powerpcc64 debian and -DOPENSSL_USE_GMP -lgmp

2007-12-04 Thread Lutz Jaenicke
Robert Gries wrote:
 Well even though I get the error about the shared libraries, it did work with 
 is Configure:
  
 ./Configure  --prefix=~gries/usr/local/ssl  --openssldir=~gries/usr/local/ssl 
  threads linux-ppc64 -m64  -L/usr/local/lib  -DOPENSSL_USE_GMP -lgmp -static

 [EMAIL PROTECTED]:~/openssl-0.9.8g$ apps/openssl speed rsa -engine gmp 
 invalid engine gmp 27835:error:25066067:DSO support 
 routines:DLFCN_LOAD:could not load the shared 
 library:dso_dlfcn.c:162:filename(~gries/usr/local/ssl/lib/engines/libgmp.so): 
 ~gries/usr/local/ssl/lib/engines/libgmp.so: cannot open shared object file: 
 No such file or directory
 27835:error:25070067:DSO support routines:DSO_load:could not load the shared 
 library:dso_lib.c:244:
   
...

Did you actually read the error messages shown? They indicate that
OpenSSL tries to load the engine from

~gries/usr/local/ssl/lib/engines/libgmp.so

Did you check whether libgmp.so is actually installed?
From my best understanding ~gries is a shell'ism and is most likely not 
supported
by the dynamic loader. You should rather pass $(HOME)/usr/local/ssl on the
command line such that the shell expands the full path and the openssl 
configuration
has the full path compiled in.

Best regards,
   Lutz

__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: Please add OIDs for CMP and CRMF to objects.txt

2007-11-01 Thread Lutz Jaenicke
Martin Peylo wrote:
 Hi,

 could the following OIDs please be added to the objects.txt file? They
 are used by CMP (RFC 4210) and CRMF (RFC 4211) which I am implementing
 right now. This would make it easier for me to supply a patch which
 applies cleanly in case the objects.txt file was changed in the
 meantime.

 # Macs for CMP and CRMF
 ISO-US 113533 7 66 13   : id-PasswordBasedMAC : password based MAC
 ISO-US 113533 7 66 30   : id-DHBasedMac   : Diffie-Hellman based MAC

 # HMAC OIDs
 identified-organization 6 1 5 5 8 1 1  : HMAC-MD5   : hmac-md5
 identified-organization 6 1 5 5 8 1 2  : HMAC-SHA1  : hmac-sha1

 # (additional) CMP information types
 id-it 16: id-it-suppLangTags
   
So done in 0.9.8-stable and -dev. Please test out the next snapshots.

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


[openssl.org #1594] 0.9.8f build problem on HP-UX 11.23 ia64

2007-10-19 Thread Lutz Jaenicke via RT
This should be fixed by commit
  http://cvs.openssl.org/chngview?cn=16682

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


[openssl.org #1590] OpenSSL 0.9.8f: bad SHA1, questionable PGP

2007-10-19 Thread Lutz Jaenicke via RT
The SHA1 was recreated and the tarball was resigned by myself.

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


[openssl.org #1589] OPENSSL_VERSION_NUMBER wrong in 0.9.8f release

2007-10-19 Thread Lutz Jaenicke via RT
 [jaenicke - Fri Oct 19 11:39:05 2007]:
 
 This will never be fixed in the 0.9.8f tarball (as it was rolled as is).
 
 OpenSSL 0.9.8g has now been released using a correct version code.
 
 Best regards,
Lutz
 

__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


[openssl.org #1591] get_session_cb callback invoked with no previous session in 0.9.8f

2007-10-19 Thread Lutz Jaenicke via RT
Fixed in 0.9.8g
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


[ANNOUNCE] OpenSSL version 0.9.8g released

2007-10-19 Thread Lutz Jaenicke
   OpenSSL version 0.9.8g released
   ===

   OpenSSL - The Open Source toolkit for SSL/TLS
   http://www.openssl.org/

   The OpenSSL project team is pleased to announce the release of
   version 0.9.8g of our open source toolkit for SSL/TLS. This new
   OpenSSL version is a bugfix release. For a complete list of changes,
   please see
   http://www.openssl.org/source/exp/CHANGES.

   We consider OpenSSL 0.9.8g to be the best version of OpenSSL
   available and we strongly recommend that users of older versions
   upgrade as soon as possible. OpenSSL 0.9.8g is available for
   download via HTTP and FTP from the following master locations (you
   can find the various FTP mirrors under
   http://www.openssl.org/source/mirror.html):

 * http://www.openssl.org/source/
 * ftp://ftp.openssl.org/source/

   The distribution file names are:

o openssl-0.9.8g.tar.gz
  MD5 checksum: acf70a16359bf3658bdfb74bda1c4419
  SHA1 checksum: 4e9c5ced466715d18fd924de79bde5c15da80fa1

   The checksums were calculated using the following commands:

openssl md5 openssl-0.9.*.tar.gz
openssl sha1 openssl-0.9.*.tar.gz

   The OpenSSL Project Team...

Mark J. Cox Nils Larsch Ulf M�ller
Ralf S. Engelschall Ben Laurie  Andy Polyakov
Dr. Stephen Henson  Richard Levitte Geoff Thorpe
Lutz J�nickeBodo M�ller
-BEGIN PGP SIGNED MESSAGE-


   OpenSSL version 0.9.8g released
   ===

   OpenSSL - The Open Source toolkit for SSL/TLS
   http://www.openssl.org/

   The OpenSSL project team is pleased to announce the release of
   version 0.9.8g of our open source toolkit for SSL/TLS. This new
   OpenSSL version is a bugfix release. For a complete list of changes,
   please see
   http://www.openssl.org/source/exp/CHANGES.

   We consider OpenSSL 0.9.8g to be the best version of OpenSSL
   available and we strongly recommend that users of older versions
   upgrade as soon as possible. OpenSSL 0.9.8g is available for
   download via HTTP and FTP from the following master locations (you
   can find the various FTP mirrors under
   http://www.openssl.org/source/mirror.html):

 * http://www.openssl.org/source/
 * ftp://ftp.openssl.org/source/

   The distribution file names are:

o openssl-0.9.8g.tar.gz
  MD5 checksum: acf70a16359bf3658bdfb74bda1c4419
  SHA1 checksum: 4e9c5ced466715d18fd924de79bde5c15da80fa1

   The checksums were calculated using the following commands:

openssl md5 openssl-0.9.*.tar.gz
openssl sha1 openssl-0.9.*.tar.gz

   Yours,

   The OpenSSL Project Team...

Mark J. Cox Nils Larsch Ulf Möller
Ralf S. Engelschall Ben Laurie  Andy Polyakov
Dr. Stephen Henson  Richard Levitte Geoff Thorpe
Lutz JänickeBodo Möller




-BEGIN PGP SIGNATURE-
Version: PGPfreeware 5.0i for non-commercial use
Charset: noconv

iQCVAwUBRxhvVXiZOxScWKZtAQGtrgP/UeZPGx3YlBis9yLyqy5rRVys3pzlLAgH
a0dJx+Ig/qTsuUK5CNmBk34xymlzVTmUlZZxnhJeQf9dd1FfJqhPhQVed3ejhGif
0C5MzLv6ywPPp6GqJb5HDD1C2PbdgD4eguR0zumHUDcWU09zTRIl9LAFgCKWiE8N
IBIpBai+2+o=
=Dr0o
-END PGP SIGNATURE-


[openssl.org #1589] OPENSSL_VERSION_NUMBER wrong in 0.9.8f release

2007-10-17 Thread Lutz Jaenicke via RT
Your statement is actually correct. Nevertheless it does not seem to be
useful to create
a new release (0.9.8g) just to correct an informational version number
code. It also
would not be a good idea to create a new tarball with the same name but
just a new
version number code.

We have therefore decided to leave the tarball as is and work around
using another version
code for the time being.

http://cvs.openssl.org/chngview?cn=16688

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


[openssl.org #1590] OpenSSL 0.9.8f: bad SHA1, questionable PGP

2007-10-17 Thread Lutz Jaenicke via RT
I have made the following modifications to the download area (not
tracked by CVS, so the
action is not logged via openssl-cvs) at Wed Oct 17, 2007, 09:30 CEST
(07:30GMT):
* updated openssl-0.9.8f.tar.gz.sha1
* created new openssl-0.9.8f.tar.gz.asc with my (Lutz Jaenicke) personal
key matching
  the listed in http://www.openssl.org/about/ in ascii-armor
* moved old signature file from Ben using a key not listed on the
About page to
  openssl-0.9.8f.tar.gz.sig (.sig should be fine for a binary signature)
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


[openssl.org #1590] OpenSSL 0.9.8f: bad SHA1, questionable PGP

2007-10-17 Thread Lutz Jaenicke via RT
Grr. The OpenSSL web site is some (semi-)automatic thing that is updated
in a magic way. Probably only Ralf Engelschall fully understands how
this works :-)
I have made sure the correct files are linked now.

Best regards,
   Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


[openssl.org #1591] get_session_cb callback invoked with no previous session in 0.9.8f

2007-10-17 Thread Lutz Jaenicke via RT
 [EMAIL PROTECTED] - Wed Oct 17 18:11:27 2007]:
 
 Starting with OpenSSL 0.9.8f, ssl3_get_client_hello() no longer tests
 whether the client proposed a
 previous session_id before trying to process it. In previous releases,
 a new session was always
 created if no previous session was proposed (i.e. if j==0 at
 ssl\s3_srvr.c:746)

The problem is being worked upon.

Best regards,
   Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


[openssl.org #1578] [PATCH] fix is is typos

2007-09-24 Thread Lutz Jaenicke via RT
Applied, thanks.

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


[openssl.org #521] [PATCH] Avoid uninitialized data in random buffer

2007-09-20 Thread Lutz Jaenicke via RT
A respective compile time macro PEDANTIC (to be added to the C flags
as -DPEDANTIC)
has been added for OpenSSL 0.9.8f. The behavior has been clarified in
the manual page
and the FAQ
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: How to Submit a patch

2007-04-12 Thread Lutz Jaenicke
Nitin M wrote:
 Hi!

 Can anyone please tell me the correct way to submit a patch here, as I
 have never done that before on this list?

As stated somewhere on the website: submit it by email to [EMAIL PROTECTED]
Note: wrt SPAM protection this interface is moderated so there may be some
delay(*) before the request becomes public.

(*) delay being between minutes and several hours depending on when
I find the time to look into the queue of incoming requests.

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   [EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]


Re: [patch] Valgrind complaining about unitialized data

2007-03-04 Thread Lutz Jaenicke
Ben Laurie schrieb:
 Lutz Jaenicke wrote:
   
 Lutz Jaenicke wrote:
 
 Peter Waltenberg wrote:
   
   
 Yes, it's desirable that that data is unknown however there is a
 compromise possible:
 Complement the area. It'll mean valgrind will only complain at the correct
 place, or possibly not at all, and it's still random. The performance hit
 from doing that will be so small it won't matter.

 This annoyed me as well - the big advantage of valgrind is that it doesn't
 require recompilation to work and it's really good if you don't have to
 wade through all the flase alarms before you can find the real problems.
   
 
 
 Not being a valgrind user... I do not see that leaving this area
 uninitialized will
 give us some cryptographically useful amount of entropy so that we could
 as well memset it to 0...
   
   
 Ok, I have just applied the patch to 0.9.8-stable and 0.9.9-dev.
 

 Oi. Don't do that.

   
Why not?
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: [patch] Valgrind complaining about unitialized data

2007-03-02 Thread Lutz Jaenicke
Peter Waltenberg wrote:
 Yes, it's desirable that that data is unknown however there is a
 compromise possible:
 Complement the area. It'll mean valgrind will only complain at the correct
 place, or possibly not at all, and it's still random. The performance hit
 from doing that will be so small it won't matter.

 This annoyed me as well - the big advantage of valgrind is that it doesn't
 require recompilation to work and it's really good if you don't have to
 wade through all the flase alarms before you can find the real problems.
   
Not being a valgrind user... I do not see that leaving this area
uninitialized will
give us some cryptographically useful amount of entropy so that we could
as well memset it to 0...

Regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


[openssl.org #1499] Uninitialized value in RAND_load_file, with -DPURIFY

2007-03-02 Thread Lutz Jaenicke via RT
Guessing on the stack being non-predictable does not seem to improve
entropy too much to me. I have therefore modified the code to no longer
use uninitialized memory in any case.
Not relying on -DPURIFY will also make valgrind users happy :-)

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: STARTTLS patch for imap and ftp

2007-02-22 Thread Lutz Jaenicke
Goetz Babin-Ebell wrote:
 Lutz Jaenicke wrote:
  Goetz Babin-Ebell wrote:
 [...]
  * in SMTP doing a STARTTLS without previous EHLO
will return a
503 STARTTLS command used when not advertised
  * in IMAP doing a STARTLS requires a
. CAPABILITY
first.
 
  In both cases the server response should be parsed for
  the string STARTTLS...
 
  This statement is technically correct. As the s_client tool is however
  intended for testing purposes only (you remember that a capital
  R at the beginning of the line will start a renegotiation instead
  of being transferred to the server :-) adding the EHLO and .CAPABILITY
  should be sufficient and the more complex parsing of the response
  might be omitted...

 Do you want something like the attached patch ?
 (untested, I'm off to bed...)
Ok, I have reworked this section as discussed by using a buffering BIO and
have committed everything to CVS. I would be most pleased if somebody would
also cross-test it (the part with the multi-line IMAP response may require
some more digging as the termination should be the . at the beginning
of the response line, not the number of chars being less than 3!?)

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


[openssl.org #1459] Bug in quoting string expressions

2007-02-21 Thread Lutz Jaenicke via RT
Patch applied.

Thanks,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


[openssl.org #1277] add support for m68k linux

2007-02-21 Thread Lutz Jaenicke via RT
Applied to openssl-0.9.8 and openssl-dev trees.
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


[openssl.org #1152] add support for Linux on SuperH

2007-02-21 Thread Lutz Jaenicke via RT
Applied to openssl-0.9.8 and openssl-dev.

Thanks,
  Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: STARTTLS patch for imap and ftp

2007-02-21 Thread Lutz Jaenicke
Goetz Babin-Ebell wrote:
 Lutz Jaenicke wrote:
  Goetz Babin-Ebell wrote:
 [...]
  * in SMTP doing a STARTTLS without previous EHLO
will return a
503 STARTTLS command used when not advertised
  * in IMAP doing a STARTLS requires a
. CAPABILITY
first.
 
  In both cases the server response should be parsed for
  the string STARTTLS...
 
  This statement is technically correct. As the s_client tool is however
  intended for testing purposes only (you remember that a capital
  R at the beginning of the line will start a renegotiation instead
  of being transferred to the server :-) adding the EHLO and .CAPABILITY
  should be sufficient and the more complex parsing of the response
  might be omitted...

 Do you want something like the attached patch ?
 (untested, I'm off to bed...)

Yes, something like this. I have applied your patch to 0.9.8 and -dev... and
was just going to write thank you when I discovered that it does not work.
As I just noted BIO_read() does not work line by line but on the message
coming in. This message is the complete multi-line response and it has
to be parsed in a different way as attached as a crude hack.

No: BIO_gets() does not work on here (not supported on connect BIO.

Yes: all other appearances of multi-line handling are broken as well.
The multi-line handling in the SMTP greeting would fail on the first
host with a multi-line greeting and the other protocol handlers are
as buggy. I have thus left your patch in and we have to decide how to
tackle the other occurances...

Best regards,
Lutz
Index: s_client.c
===
RCS file: /e/openssl/cvs/openssl/apps/s_client.c,v
retrieving revision 1.76.2.7
diff -u -r1.76.2.7 s_client.c
--- s_client.c	21 Feb 2007 18:20:33 -	1.76.2.7
+++ s_client.c	21 Feb 2007 18:53:00 -
@@ -735,7 +735,7 @@
 	/* This is an ugly hack that does a lot of assumptions */
 	if (starttls_proto == PROTO_SMTP)
 		{
-		int foundit=0;
+		int foundit=0, response_done = 0;
 		/* wait for multi-line response to end from SMTP */
 		do
 			{
@@ -747,11 +747,15 @@
 		/* wait for multi-line response to end EHLO SMTP response */
 		do
 			{
+			int ll;
 			mbuf_len = BIO_read(sbio,mbuf,BUFSIZZ);
 			if (strstr(mbuf,STARTTLS))
 foundit=1;
+			for (ll = 0; !response_done  ll  mbuf_len - 4; ll++)
+if (mbuf[ll] == '\n'  mbuf[ll + 3] != '-')
+	response_done = 1;
 			}
-		while (mbuf_len3  mbuf[3]=='-');
+		while (mbuf_len3  mbuf[3]=='-'  !response_done);
 		if (!foundit)
 			BIO_printf(bio_err,
    didn't found starttls in server response,


Re: STARTTLS patch for imap and ftp

2007-02-21 Thread Lutz Jaenicke
Dr. Stephen Henson wrote:
 On Wed, Feb 21, 2007, Lutz Jaenicke wrote:

   
 Goetz Babin-Ebell wrote:
 
 Lutz Jaenicke wrote:
   
 Goetz Babin-Ebell wrote:
 
 [...]
   
 * in SMTP doing a STARTTLS without previous EHLO
   will return a
   503 STARTTLS command used when not advertised
 * in IMAP doing a STARTLS requires a
   . CAPABILITY
   first.

 In both cases the server response should be parsed for
 the string STARTTLS...

   
 This statement is technically correct. As the s_client tool is however
 intended for testing purposes only (you remember that a capital
 R at the beginning of the line will start a renegotiation instead
 of being transferred to the server :-) adding the EHLO and .CAPABILITY
 should be sufficient and the more complex parsing of the response
 might be omitted...
 
 Do you want something like the attached patch ?
 (untested, I'm off to bed...)

   
 Yes, something like this. I have applied your patch to 0.9.8 and -dev... and
 was just going to write thank you when I discovered that it does not work.
 As I just noted BIO_read() does not work line by line but on the message
 coming in. This message is the complete multi-line response and it has
 to be parsed in a different way as attached as a crude hack.

 No: BIO_gets() does not work on here (not supported on connect BIO.

 

 Note that adding a buffering BIO to the chain is a simple way to fix this.
   

Yes. I get your point :-)

Best regards,
Lutz
Index: apps/s_client.c
===
RCS file: /e/openssl/cvs/openssl/apps/s_client.c,v
retrieving revision 1.76.2.7
diff -u -r1.76.2.7 s_client.c
--- apps/s_client.c	21 Feb 2007 18:20:33 -	1.76.2.7
+++ apps/s_client.c	21 Feb 2007 19:55:21 -
@@ -736,22 +736,28 @@
 	if (starttls_proto == PROTO_SMTP)
 		{
 		int foundit=0;
+		BIO *fbio = BIO_new(BIO_f_buffer());
+		BIO_push(fbio, sbio);
 		/* wait for multi-line response to end from SMTP */
 		do
 			{
-			mbuf_len = BIO_read(sbio,mbuf,BUFSIZZ);
+			mbuf_len = BIO_gets(fbio,mbuf,BUFSIZZ);
 			}
 		while (mbuf_len3  mbuf[3]=='-');
 		/* STARTTLS command requires EHLO... */
-		BIO_printf(sbio,EHLO openssl.client.net\r\n);
+		BIO_printf(fbio,EHLO openssl.client.net\r\n);
+		BIO_flush(fbio);
 		/* wait for multi-line response to end EHLO SMTP response */
 		do
 			{
-			mbuf_len = BIO_read(sbio,mbuf,BUFSIZZ);
+			mbuf_len = BIO_gets(fbio,mbuf,BUFSIZZ);
 			if (strstr(mbuf,STARTTLS))
 foundit=1;
 			}
 		while (mbuf_len3  mbuf[3]=='-');
+		BIO_flush(fbio);
+		BIO_pop(fbio);
+		BIO_free(fbio);
 		if (!foundit)
 			BIO_printf(bio_err,
    didn't found starttls in server response,


Re: STARTTLS patch for imap and ftp

2007-02-19 Thread Lutz Jaenicke
Goetz Babin-Ebell wrote:
 Hello Richard,

 Richard Levitte - VMS Whacker wrote:
  In message [EMAIL PROTECTED] on Thu, 15 Feb 2007
 10:34:23 -0800,
  Kees Cook [EMAIL PROTECTED] said:

  kees 3 years ago, I wrote a patch[1] (and did the TSU[2]) for adding
  kees these features to s_client.  Can this please be applied to CVS?

  Yes.  Done.  Thank you, and sorry you had to wait 3 years for this to
  happen.

 The problem (not only I have) with the patch is
 that at least in SMTP and IMAP it is illegal
 to start TLS before an initial protocol handshake is done:

 * in SMTP doing a STARTTLS without previous EHLO
   will return a
   503 STARTTLS command used when not advertised
 * in IMAP doing a STARTLS requires a
   . CAPABILITY
   first.

 In both cases the server response should be parsed for
 the string STARTTLS...

This statement is technically correct. As the s_client tool is however
intended for testing purposes only (you remember that a capital
R at the beginning of the line will start a renegotiation instead
of being transferred to the server :-) adding the EHLO and .CAPABILITY
should be sufficient and the more complex parsing of the response
might be omitted...

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


[Fwd: [openssl.org #1480]]

2007-02-07 Thread Lutz Jaenicke
RT access configuration has been changed.

Best regards,
Lutz
---BeginMessage---
This transaction appears to have no content
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]
---End Message---


Re: OpenSSL request tracker downtime

2007-01-31 Thread Lutz Jaenicke
Lutz Jaenicke wrote:
 Lutz Jaenicke wrote:
   
 Hi!

 The OpenSSL request tracker will go down now for migration to a new
 version of RT and another host. All incoming email requests will be
 queued and will be uploaded once the new setup is finished.
 I will send another announcement once the request tracker is back up online.

   
 

 Unfortunately the migration did not work as smooth as expected. I have
 re-enabled the old instance for the time being.
   

Ok, I have worked out the problems of the new setup and will make a new
attempt now. Request tracker at aet.tu-cottbus.de will go down now.

Best regards,
Lutz

__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


[openssl.org #1469] Testing

2007-01-31 Thread Lutz Jaenicke via RT
Testing the new installation of RT for OpenSSL before declaring it live.
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: [openssl.org #1469] Testing

2007-01-31 Thread Lutz Jaenicke via RT
Lutz Jaenicke via RT wrote:
 Testing the new installation of RT for OpenSSL before declaring it live.
   
Testing the mail gateway before declaring it live.


__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: [openssl.org #1469] Testing

2007-01-31 Thread Lutz Jaenicke via RT
Lutz Jaenicke via RT wrote:
 Testing the new installation of RT for OpenSSL before declaring it live.
   
Testing the mail gateway before declaring it live.


__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: OpenSSL request tracker downtime

2007-01-31 Thread Lutz Jaenicke
Lutz Jaenicke wrote:
 Lutz Jaenicke wrote:
   
 Lutz Jaenicke wrote:
   
 
 Hi!

 The OpenSSL request tracker will go down now for migration to a new
 version of RT and another host. All incoming email requests will be
 queued and will be uploaded once the new setup is finished.
 I will send another announcement once the request tracker is back up online.

   
 
   
 Unfortunately the migration did not work as smooth as expected. I have
 re-enabled the old instance for the time being.
   
 

 Ok, I have worked out the problems of the new setup and will make a new
 attempt now. Request tracker at aet.tu-cottbus.de will go down now.

   
Request tracker has now been migrated to
  http://rt.openssl.org/
The email address stays at
  [EMAIL PROTECTED] or openssl-bugs@openssl.org
I will do some more fine tuning and tests over the next hours and days.
For the time being it seems that outgoing mails to openssl-dev are sent
twice.

Best regards,
   Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: [openssl.org #1469] Testing

2007-01-31 Thread Lutz Jaenicke via RT
Lutz Jaenicke via RT schrieb:
 Testing the new installation of RT for OpenSSL before declaring it live.
   
Testing with modified settings. Duplicate emails to openssl-dev should
now be gone.
Hopefully...

Best regards,
Lutz


__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


[EMAIL PROTECTED]: request for the source code....]

2007-01-27 Thread Lutz Jaenicke
Forwarded to the openssl-dev mailing list for discussion.

Best regards,
Lutz
- Forwarded message from jha sudhir [EMAIL PROTECTED] -

X-Original-To: [EMAIL PROTECTED]
X-Original-To: [EMAIL PROTECTED]
Delivered-To: [EMAIL PROTECTED]
X-Greylist: delayed 399 seconds by postgrey-1.27 at master.openssl.org; Fri, 26 
Jan 2007 21:13:43 CET
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws;
  s=s1024; d=yahoo.co.in;
  
h=Message-ID:X-YMail-OSG:Received:Date:From:Subject:To:MIME-Version:Content-Type:Content-Transfer-Encoding;
  
b=EH8B9nfXZm3Yjpo4n+pYXCdz8/Qz6Lxxy9dbQOXZG3pe47jTmYHdHwSDYFpxVIFLOvSvL8pPyeGQP8d0zNSISxF0arPSmyMFrt10TxgIMZBpBMFXtwNX5mVj1abpeXnUbt6eUINukwg7UwbqNsj+fGqwKgFwqscADVvWOVHPK3Y=
  ;
X-YMail-OSG: 
pmbxfmkVM1mivif.h7n8z8CyduPekZtuMH6GQKQE2D3BrSZ7CgP97rgUIFXN74rtzxOoGC5ZJDB0zX3Iotne3Q14ijNnl2gmCHS7lRFGVCUhLJdig7NZE5EAhxbVbdI062DsUNcsVW8qT4VFUH1Ymng9
Date: Fri, 26 Jan 2007 20:06:23 + (GMT)
From: jha sudhir [EMAIL PROTECTED]
Subject: request for the source code
To: [EMAIL PROTECTED]
X-Virus-Scanned: by amavisd 0.1
X-Virus-Scanned: by amavisd 0.1

Hi ,
   
this is sudhir jha from chennai.i m final year student doing my 
Btech frm computer science.
   
   
  rit now we have our projects ...and mine is Implemention of ECC algo on ssl 
vr 3.0.tht i dont know how to perform as well as validate it.
   
   
   
  so i am loking for your kind help if u could ..pls 
   
   
  reply soon.
   
   
  bye,
  sudhir jha 


-
 Here’s a new way to find what you're looking for - Yahoo! Answers 
- End forwarded message -

-- 
Lutz Jaenicke [EMAIL PROTECTED]
http://www.aet.TU-Cottbus.DE/personen/jaenicke/
BTU Cottbus, Allgemeine Elektrotechnik
Universitaetsplatz 3-4, D-03044 Cottbus
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


OpenSSL request tracker downtime

2007-01-26 Thread Lutz Jaenicke
Hi!

The OpenSSL request tracker will go down now for migration to a new
version of RT and another host. All incoming email requests will be
queued and will be uploaded once the new setup is finished.
I will send another announcement once the request tracker is back up online.

Best regards,
Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: OpenSSL request tracker downtime

2007-01-26 Thread Lutz Jaenicke
Lutz Jaenicke wrote:
 Hi!

 The OpenSSL request tracker will go down now for migration to a new
 version of RT and another host. All incoming email requests will be
 queued and will be uploaded once the new setup is finished.
 I will send another announcement once the request tracker is back up online.

   

Unfortunately the migration did not work as smooth as expected. I have
re-enabled the old instance for the time being.

Best regards,
   Lutz
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


[openssl.org #1459] Bug in quoting string expressions

2007-01-12 Thread Lutz Jaenicke via RT

The attached patch fixes an incorrect handling of special characters.
Patch is against 0.9.8d.
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: [openssl.org #1457] Error while building openssl on ppc64 with gcc...

2007-01-11 Thread Lutz Jaenicke via RT

Atul Kulkarni (SIGSEC) via RT wrote:
 That seems to be a bug with openssl dev package, as I am trying to build
 on a native ppc64 machine why should it add a -b directive  asking for a
 cross-compilation machine. Please note my code compiles without it
 though! 

 If there is any specific reason that I am missing please let me know.

   

There is a comment in the Configure file that reads
  # -bpowerpc64-linux is transient option, -m64 should be the one to use...
so it might be worth adding another Configure target or fix the old one...

Best regards,
Lutz

__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   [EMAIL PROTECTED]


  1   2   3   4   5   6   7   8   >