Re: SSL Renogotation failure

2014-06-05 Thread Mithun Kumar
Thanks for the reply. I am currently resetting the below flag by resetting using SSL_CTX_clear_options(). Still the handshake fails. SSL_OP_ALLOW_UNSAFE_LEGACY_RENEGOTIATION Any inputs ? On Wed, Jun 4, 2014 at 6:57 PM, Salz, Rich rs...@akamai.com wrote: Ø Can you please elaborate? Ø

Re: SSL Renogotation failure

2014-06-05 Thread Kyle Hamilton
You must ensure that the option is set, not cleared. -Kyle H On Wed, Jun 4, 2014 at 11:37 PM, Mithun Kumar mithunsi...@gmail.com wrote: Thanks for the reply. I am currently resetting the below flag by resetting using SSL_CTX_clear_options(). Still the handshake fails.

SSL_Connect() invalid write

2014-06-05 Thread Brandon W. Yuille
Hi, I'm getting the following error when using SSL_Connect on a non-blocking socket. I've included some debug output that shows POLLOUT was set after the socket successfully connected. SSL_Connect then returns SSL_ERROR_WANT_READ, so the program waits for a POLLIN to be set at which point it

Re: suspending and continuing handshake

2014-06-05 Thread DEXTER
On Wed, Jun 4, 2014 at 4:49 PM, Viktor Dukhovni openssl-us...@dukhovni.org wrote: Sounds like the requested feature is already implemented. That's some fast work. :-) Indeed, it is some fast work. That's all that about the itching feature, low priority, and many years... --

Re: suspending and continuing handshake

2014-06-05 Thread DEXTER
Hi Steve, That is exactly what I needed. I've just tried it out with OpenSSL-1.0.2-beta1 and it works perfectly. Do you have any ETA on when the 1.0.2 will be released? Thank you! On Wed, Jun 4, 2014 at 4:29 PM, Dr. Stephen Henson st...@openssl.org wrote: On Wed, Jun 04, 2014, DEXTER wrote:

OpenSSL Security Advisory

2014-06-05 Thread OpenSSL
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 OpenSSL Security Advisory [05 Jun 2014] SSL/TLS MITM vulnerability (CVE-2014-0224) === An attacker using a carefully crafted handshake can force the use of weak

How to decrypt smime.p7m file in DER format using OpenSSL in C code.

2014-06-05 Thread Yash Dosi
Hi All, I am trying to decrypt emails using openssl. I am getting smime.p7m file from the server. But it is in DER format. I can decrypt this file using command prompt, with the command openssl smime -decrypt -in openssl_working_smime.p7m -inform DER -inkey mycert.pem dec_mail.eml But now I

OpenSSL Security Advisory

2014-06-05 Thread OpenSSL
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 OpenSSL Security Advisory [05 Jun 2014] Resend: first version contained characters which could cause signature failure. SSL/TLS MITM vulnerability (CVE-2014-0224) ===

RE: SSL Renogotation failure

2014-06-05 Thread Salz, Rich
It must therefore be that the *other side* is trying to do unsafe renegotiation. Someone posted a note about PostGres issues, IIRC. /r$ -- Principal Security Engineer Akamai Technologies, Cambridge, MA IM: rs...@jabber.memailto:rs...@jabber.me; Twitter: RichSalz

Re: How to decrypt smime.p7m file in DER format using OpenSSL in C code.

2014-06-05 Thread Vladimir Zatsepin
Hi, To load a DER-encoded PKCS7 structure from the file you have to use d2i_PKCS7_bio() function. 2014-06-05 15:51 GMT+04:00 Yash Dosi yashd...@gmail.com: Hi All, I am trying to decrypt emails using openssl. I am getting smime.p7m file from the server. But it is in DER format. I can

Conflicting information regarding non-blocking sockets

2014-06-05 Thread Barbe, Charles
Hello, I have implemented an SSL server on the ecos platform and it seems to be working well however I am a tiny bit unclear about the requirements around whether or not calls to SSL_read and SSL_write need to be syncrhonized and I want to avoid doing something incorrect. The specific question

Re: SSL_Connect() invalid write

2014-06-05 Thread Brandon W Yuille
Please ignore. Turned out another library I was linking against had a function called MD5_Final and the linker was using this one instead of OpenSSL's. On 6/4/2014 4:12 PM, Brandon W Yuille wrote: Hi, I'm getting the following error when using SSL_Connect on a non-blocking socket. I've

Re: Windows CE (VC-CE) Compilation problem !

2014-06-05 Thread J@yNe$|-|
hello karan, i am built wcecompat but when i try to compile openssl i can not compiled it. so can you gave me the steps for compiling openssl. and if you don't mind then gave me the step to compile wcecompat as well so i check my compiled libs have any problem or not. so please help me out

Re: OpenSSL Security Advisory

2014-06-05 Thread Jeff Wieland
In 0.9.8za at least, there is a missing directive to include limits.h. Without it, compilation fails on SPARC Solaris 10 with INT_MAXbeing undefined on line 536, which looks like: OPENSSL_assert(s-s3-wnum INT_MAX); It appears that 1.0.0m has the same problem. I haven't looked at 1.0.1h as

Re: OpenSSL Security Advisory

2014-06-05 Thread Juha Saarinen
Hi Steve, That’s quite a few in one go - is this due to greater testing of OpenSSL and more scrutiny of the code by the community? Of the flaws listed, which is the one of most concern? This kind of begs the question what to do with all those embedded systems that run older versions of

DTLS path MTU issues

2014-06-05 Thread David Geib
I am developing an application similar to a VPN which uses OpenSSL for DTLS and am trying to sort out path MTU discovery. The first issue I am having is that the man pages for SSL_write and SSL_read provide the following warning: When an SSL_write() [or SSL_read()] operation has to be repeated

CVE-2014-0224

2014-06-05 Thread Jeffrey Walton
CVE-2014-0224 looks like an interesting issue (https://www.openssl.org/news/secadv_20140605.txt): An attacker using a carefully crafted handshake can force the use of weak keying material in OpenSSL SSL/TLS clients and servers. This can be exploited by a Man-in-the-middle (MITM)

RE: CVE-2014-0224

2014-06-05 Thread Salz, Rich
Can anyone explain the vulnerability? A handful of links Here's the timeline, a public document: https://plus.google.com/u/0/+MarkJCox/posts/L8i6PSsKJKs And this blog entry from the guy who found the bug. BTW, it's 16 years old.

CVE-2014-0195

2014-06-05 Thread Jeffrey Walton
CVE-2014-0195 is a buffer overflow (https://www.openssl.org/news/secadv_20140605.txt): A buffer overrun attack can be triggered by sending invalid DTLS fragments to an OpenSSL DTLS client or server. This is potentially exploitable to run arbitrary code on a vulnerable client

Re: CVE-2014-0224

2014-06-05 Thread Jeroen de Neef
I am also quite curious. Also, how long has this exploit been around, and could hackers have exploited this already? 2014-06-05 22:46 GMT+02:00 Jeffrey Walton noloa...@gmail.com: CVE-2014-0224 looks like an interesting issue (https://www.openssl.org/news/secadv_20140605.txt): An

RE: OpenSSL Security Advisory

2014-06-05 Thread Green, Gatewood
Openssl-0.9.8za will not build in FIPS mode. The openssl-fips-1.2(.4) seems to be missing the symbol BN_consttime_swap. Woody Gatewood C Green Jr (Woody) Principal Software Engineer, Product Security Champion SIEM Engineering McAfee. Part of Intel Security. Direct: 208.552.8269 Mobile:

Re: CVE-2014-0224

2014-06-05 Thread Jeffrey Walton
On Thu, Jun 5, 2014 at 4:49 PM, Salz, Rich rs...@akamai.com wrote: Can anyone explain the vulnerability? A handful of links Here's the timeline, a public document: https://plus.google.com/u/0/+MarkJCox/posts/L8i6PSsKJKs And this blog entry from the guy who found the bug. BTW, it's

RE: CVE-2014-0195

2014-06-05 Thread Salz, Rich
Does that mean this RCE is a heap based overflow? I/O buffers in openssl are generally (always?) from the heap, not on the stack. So yes in general, and yes in this specific case. /r$ -- Principal Security Engineer Akamai Technologies, Cambridge, MA IM: rs...@jabber.me; Twitter:

Re: CVE-2014-0224

2014-06-05 Thread Tim Hudson
I've also added these into the wiki at http://wiki.openssl.org/index.php/SECADV_20140605 - so that others looking back through the issues can find a handy reference to the additional information from various locations - the link at http://wiki.openssl.org/index.php/Security_Advisories basically

Re: AES-GCM

2014-06-05 Thread Anant Rao
Thanks for the info! I looked at the demos programs in the given link http://git.openssl.org/gitweb/?p=openssl.git;a=blob;f=demos/evp/aesgcm.c;h=324d8a55b1481c507c7754fa7f33c30a02bdb737;hb=HEAD . I have a question in encrypt: ... /* Finalise: note get no output for GCM */ 63

Re: AES-GCM

2014-06-05 Thread Jeffrey Walton
On Tue, May 27, 2014 at 3:00 AM, Anant Rao a...@noknok.com wrote: Hi, I have ciphertext encrypted in Java (using BouncyCastle - BC) with AES/GCM/NoPadding cipher. When I tried to decrypt it using OpenSSL in a 'c' program, the last call 'EVP_DecryptFinal_ex' fails. Somehow,