Re: [openssl-users] Fwd: basic constraints check

2018-05-31 Thread Sandeep Deshpande
1.0.2j On Fri, Jun 1, 2018, 3:52 AM Viktor Dukhovni wrote: > > > > On May 31, 2018, at 6:08 PM, Sandeep Deshpande > wrote: > > > > Hi Rich.. Thanks.. > > We want to add a check in our openssl library on client side to reject > such server certificate which are generated by the intermediate CA

Re: [openssl-users] Fwd: basic constraints check

2018-05-31 Thread Viktor Dukhovni
> On May 31, 2018, at 6:08 PM, Sandeep Deshpande wrote: > > We want to add a check in our openssl library on client side to reject such > server certificate which are generated by the intermediate CA with missing > extensions like basic constraints.. > How do we go about it? > > I looked

Re: [openssl-users] Fwd: basic constraints check

2018-05-31 Thread Salz, Rich via openssl-users
I don’t recall the details of 1.0.2, sorry. Maybe someone else on this list knows the best place to insert your checks. From: Sandeep Deshpande Date: Thursday, May 31, 2018 at 6:08 PM To: Rich Salz , openssl-users Subject: Re: [openssl-users] Fwd: basic constraints check Hi Rich.. Thanks..

Re: [openssl-users] Fwd: basic constraints check

2018-05-31 Thread Viktor Dukhovni
> On May 31, 2018, at 6:08 PM, Sandeep Deshpande wrote: > > Hi Rich.. Thanks.. > We want to add a check in our openssl library on client side to reject such > server certificate which are generated by the intermediate CA with missing > extensions like basic constraints.. > How do we go

Re: [openssl-users] Fwd: basic constraints check

2018-05-31 Thread Sandeep Deshpande
Hi Rich.. Thanks.. We want to add a check in our openssl library on client side to reject such server certificate which are generated by the intermediate CA with missing extensions like basic constraints.. How do we go about it? I looked at the code. In crypto/x509v3/v3_purp.c I see that check_ca

Re: [openssl-users] stunnel 5.46 released

2018-05-31 Thread Viktor Dukhovni
> On May 31, 2018, at 2:43 PM, Blumenthal, Uri - 0553 - MITLL > wrote: > > FWIW, I'm with Viktor in this argument. From cryptography point of view he's > right. I suspect he's right from the practical point of view as well. This is not so much a matter of "right" or "wrong" as arguably

Re: [openssl-users] stunnel 5.46 released

2018-05-31 Thread Blumenthal, Uri - 0553 - MITLL
FWIW, I'm with Viktor in this argument. From cryptography point of view he's right. I suspect he's right from the practical point of view as well. P.S. Those concerned that a nation-state would attack them, are advised to change the default config anyway. -- Regards, Uri Blumenthal On

Re: [openssl-users] Fwd: basic constraints check

2018-05-31 Thread Salz, Rich via openssl-users
* We generated intermediate02 such that it has "basicConstraints" extension and "keyUsage" missing. Now we used this intermediate 02 CA to sign server certificate. If those extensions, which are *optional,* are not present, then there is no limit on how the keys may be used, or how long

Re: [openssl-users] stunnel 5.46 released

2018-05-31 Thread Viktor Dukhovni
> On May 31, 2018, at 12:37 PM, Tomas Mraz wrote: > > I would not say that weak DH parameters are fully rejected by OpenSSL. > The 1024 bit DH parameters could be in theory attacked by state > agencies by precomputation of the discrete logarithm table. That's speculative. If the idea is to

Re: [openssl-users] PRNG is not seeded

2018-05-31 Thread Jochen Bern
On 05/31/2018 03:03 PM, openssl-users-requ...@openssl.org distributed: > Date: Thu, 31 May 2018 18:45:02 +1000 > From: FooCrypt > > Place a teaspoon of fine grade white sand onto the skin of a snare drum Macroscopic hardware TRNGs are a *tad* yesteryear https://en.wikipedia.org/wiki/Lavarand

[openssl-users] Fwd: basic constraints check

2018-05-31 Thread Sandeep Deshpande
Hi , We are using openssl 1.0.2j and have 3 level certificates like this. root CA --> intermediate 01 CA-->intermediate02 CA -->Server certificate. We generated intermediate02 such that it has "basicConstraints" extension and "keyUsage" missing. Now we used this intermediate 02 CA to sign

Re: [openssl-users] stunnel 5.46 released

2018-05-31 Thread Tomas Mraz
On Wed, 2018-05-30 at 13:12 -0400, Viktor Dukhovni wrote: > > On May 30, 2018, at 12:54 PM, Michał Trojnara > nel.org> wrote: > > > > > I am rather puzzled as to why you chose to eliminate > > > not just fixed DH, but also the ephemeral finite-field > > > DH key exchange. What's wrong with the

Re: [openssl-users] database openssl

2018-05-31 Thread Sampei
Oh, It's a good starter point. Openssl, installed in old server, is 0.9.7e version. Openssl, installed in new server, is -0.9.8e verson. In old server I searched .cnf files and I found several files which are /usr/local/openssl-0.9.7e/xxx/y.cnf where xxx= is directory, = name

Re: [openssl-users] stunnel 5.46 released

2018-05-31 Thread Michael Wojcik
> From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf > Of Viktor Dukhovni > Sent: Thursday, May 31, 2018 03:40 > To: openssl-users@openssl.org > Subject: Re: [openssl-users] stunnel 5.46 released > > > > On May 31, 2018, at 3:27 AM, Michał Trojnara > wrote: > > > > AFAIR EC

Re: [openssl-users] PRNG is not seeded

2018-05-31 Thread FooCrypt
Are you a Dr Who fan ? Place a teaspoon of fine grade white sand onto the skin of a snare drum Place an isolating isoscrope above the snare drum that can measure the fractional movements of the grains of sand based on the ambient noise. Do something that moves the sand so you can measure the

Re: [openssl-users] PRNG is not seeded

2018-05-31 Thread chris . gray
I've also encountered this quite often, and I have a feeling that on today's connected devices there may be a lot of entropy "in the air" (quite literally) which is not being captured. Does any one know of research in this area? > Hi Scott > > I don’t know your OS or environment, have you

Re: [openssl-users] Test SSL connection

2018-05-31 Thread Mark Shnaider via openssl-users
Hello Walter, I did not found file ca.pem (root certificate) for testing. Thanks Mark From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of Walter H. Sent: Wednesday, May 30, 2018 11:17 AM To: openssl-users@openssl.org Subject: Re: [openssl-users] Test SSL connection On

Re: [openssl-users] stunnel 5.46 released

2018-05-31 Thread Viktor Dukhovni
> On May 31, 2018, at 3:27 AM, Michał Trojnara > wrote: > > AFAIR EC cipher suites were introduced in OpenSSL 1.0.0, so those LTS > systems must be using OpenSSL 0.9.x. Actually, no. For IP-related reasons, RedHat for a long time disabled EC support in OpenSSL 1.0.x. I expect some of

Re: [openssl-users] stunnel 5.46 released

2018-05-31 Thread Michał Trojnara
On 05/31/2018 06:15 AM, Viktor Dukhovni wrote: > I expect there are still plenty of LTS RedHat systems that > ship without EC support, though yes anything reasonably > up to date, will have EC support. AFAIR EC cipher suites were introduced in OpenSSL 1.0.0, so those LTS systems must be using