Re: Performance related queries for SSL based client server model

2014-09-09 Thread Alok Sharma
share me sample SSL based client server programme which I could use to measure performance. Regards, Alok On Tue, Sep 9, 2014 at 3:54 AM, Iñaki Baz Castillo i...@aliax.net wrote: 2014-09-08 19:46 GMT+02:00 Alok Sharma alokonm...@gmail.com: One thing I observerd by looking into scp code

Re: Performance related queries for SSL based client server model

2014-09-08 Thread Alok Sharma
connection */ } close(server); /* close server socket */ SSL_CTX_free(ctx); /* release context */ } On Sun, Sep 7, 2014 at 8:11 PM, Viktor Dukhovni openssl-us...@dukhovni.org wrote: On Sun, Sep 07, 2014 at 01:00:17PM +0530, Alok Sharma wrote: I am writing

Performance related queries for SSL based client server model

2014-09-07 Thread Alok Sharma
Hi, I am writing one sample ssl based client server model which uses SSL_Read SSL_Write API provided by openssl. But I found that my application is very slow it takes around 40 mins to copy 700MB file. While same file using scp finishes in 10 mins. So my query is that is there an

Re: Fwd: How to tweak openSSL vulnerabilities CVE-2013-0169

2013-11-18 Thread Alok Sharma
:23 PM, Dr. Stephen Henson st...@openssl.orgwrote: On Tue, Nov 12, 2013, Alok Sharma wrote: One of the openSSL vulnerabilities is: CVE-2013-0169: The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, , do not properly consider timing side-channel

How CBC based ciphers can be disabled from openssl

2013-11-15 Thread Alok Sharma
Hi, I am using 0.9.8.s openssl and due to some limitation I cann't upgrade to latest versions to tackle CVE-201300169. So is there any easy process to disable CBC based ciphers. Also is there a way to know which ciphers client and servers are using? Regards, Alok

Re: Fwd: How to tweak openSSL vulnerabilities CVE-2013-0169

2013-11-14 Thread Alok Sharma
Hi Steve, Thanks for reply. Do you have idea how CBC ciphers can be disabled? Regards, Alok On Tue, Nov 12, 2013 at 8:23 PM, Dr. Stephen Henson st...@openssl.orgwrote: On Tue, Nov 12, 2013, Alok Sharma wrote: One of the openSSL vulnerabilities is: CVE-2013-0169: The TLS

Fwd: How to tweak openSSL vulnerabilities CVE-2013-0169

2013-11-11 Thread Alok Sharma
One of the openSSL vulnerabilities is: CVE-2013-0169: The TLS protocol 1.1 and 1.2 and the DTLS protocol 1.0 and 1.2, as used in OpenSSL, , do not properly consider timing side-channel attacks on a MAC check requirement during the processing of malformed CBC padding, which allows remote

Re: Issue With continous PRNG test with Fips module of openssl

2011-09-26 Thread alok sharma
Hi, Thanks for the help, it resolved my problem. Regards, Alok On Fri, Sep 23, 2011 at 5:59 PM, Dr. Stephen Henson st...@openssl.orgwrote: On Fri, Sep 23, 2011, alok sharma wrote: Hi, Ok I got your point. I think it will be helpful.Do you have any link or precedure to setup

Re: Issue With continous PRNG test with Fips module of openssl

2011-09-23 Thread alok sharma
Hi, So is there any method on Windows to generate non-predictable randomnumbers. I think mostly FileSytem time is used to seed randomness which is failing in my case. Regards, Alok On Mon, Sep 19, 2011 at 4:52 PM, Dr. Stephen Henson st...@openssl.orgwrote: On Mon, Sep 19, 2011, alok sharma

Re: Issue With continous PRNG test with Fips module of openssl

2011-09-23 Thread alok sharma
, 2011, alok sharma wrote: Hi, So is there any method on Windows to generate non-predictable randomnumbers. I think mostly FileSytem time is used to seed randomness which is failing in my case. As I indicated this shouldn't be happening if you've set up locking callbacks correctly

Re: Issue With continous PRNG test with Fips module of openssl

2011-09-23 Thread alok sharma
...@openssl.orgwrote: On Fri, Sep 23, 2011, alok sharma wrote: Hi, The error message comes when we invoke SSL_accept() API. But taking lock on it will affect performance as it performs network operation inside this API (like client hello message and other). So if network is overloaded then mutex

Re: Issue With continous PRNG test with Fips module of openssl

2011-09-19 Thread alok sharma
wrote: On 9/14/2011 6:33 PM, alok sharma wrote: Hi, I am having my client server on Windows. The server is concurrent and having each thread for each connection. When the number of connection increases to 400-500 i.e having high thread load, my server crashes. I debuged it and found

Issue With continous PRNG test with Fips module of openssl

2011-09-14 Thread alok sharma
Hi, I am having my client server on Windows. The server is concurrent and having each thread for each connection. When the number of connection increases to 400-500 i.e having high thread load, my server crashes. I debuged it and found that it gives error (“random number

Query regarding pseudo number generation error in OpenSSL

2011-08-26 Thread alok sharma
Hi, I am using openssl to one of my application. The application has support of multithreading and runs on Windows platform. This application uses openssl 0.9.8.0 version and has support of fips. The application listens on a particular port and for each new connection it creates a separate