Re: TLS handshake fails ("SSL_accept:error in error") for server->server connection (smtp submit dovecot->postfix) if /etc/pki/tls/openssl.cnf "Options=" includes 'ServerPreference' ?

2020-09-25 Thread PGNet Dev
On 9/25/20 8:55 AM, Viktor Dukhovni wrote: > Well, I expected you to post a working and non-workin trace for the > *same* server endpoint, with the good and bad configuration. > > Secondly, (snip) > Where's the recording of the successful transmission to port 465 (and > not say 587). you asked

Re: TLS handshake fails ("SSL_accept:error in error") for server->server connection (smtp submit dovecot->postfix) if /etc/pki/tls/openssl.cnf "Options=" includes 'ServerPreference' ?

2020-09-25 Thread PGNet Dev
On 9/25/20 12:18 AM, Viktor Dukhovni wrote: > On Thu, Sep 24, 2020 at 09:26:26PM -0700, PGNet Dev wrote: > I must lodge a complaint on wasting my time here seems your're done, then. thx anyway. > you intimated that just changing openssl.cnf makes the difference. i didn't 'intimate'.

Re: TLS handshake fails ("SSL_accept:error in error") for server->server connection (smtp submit dovecot->postfix) if /etc/pki/tls/openssl.cnf "Options=" includes 'ServerPreference' ?

2020-09-24 Thread PGNet Dev
On 9/24/20 9:13 PM, Viktor Dukhovni wrote: > On Thu, Sep 24, 2020 at 08:30:35PM -0700, PGNet Dev wrote: > Is that really the session you intended to capture. Interestingly phrased! The intention was to capture the tcp data 'thru' the failed event. That^^ is the data streamed to c

Re: TLS handshake fails ("SSL_accept:error in error") for server->server connection (smtp submit dovecot->postfix) if /etc/pki/tls/openssl.cnf "Options=" includes 'ServerPreference' ?

2020-09-24 Thread PGNet Dev
On 9/24/20 7:32 PM, Viktor Dukhovni wrote: > On Thu, Sep 24, 2020 at 06:43:05PM -0700, PGNet Dev wrote: > >> Been awhile since I 'de-noised' a comms dump; I'll dust off my notes, & work >> on getting a useful/relevant PCAP file ... > > # tcpdump -s0 -w /s

Re: TLS handshake fails ("SSL_accept:error in error") for server->server connection (smtp submit dovecot->postfix) if /etc/pki/tls/openssl.cnf "Options=" includes 'ServerPreference' ?

2020-09-24 Thread PGNet Dev
On 9/24/20 5:51 PM, Viktor Dukhovni wrote: >> again, the _only_ change between the two submissions is the addition of the >> "ServerPreference" option to the openssl.cnf config. > > This looks like the protocol version is no longer TLS 1.3 as a result, > and one side or the other now expects or

Re: TLS handshake fails ("SSL_accept:error in error") for server->server connection (smtp submit dovecot->postfix) if /etc/pki/tls/openssl.cnf "Options=" includes 'ServerPreference' ?

2020-09-24 Thread PGNet Dev
> I'd be tempted to drop most if not all of those settings, they're not > email-friendly. PUBLIC email non-friendly, because of still-frequent old cipher/protocol implementations? or, inherently problematic with TLS in/onr SMTP? in this case, there's nothing public ... both the dovecot and

TLS handshake fails ("SSL_accept:error in error") for server->server connection (smtp submit dovecot->postfix) if /etc/pki/tls/openssl.cnf "Options=" includes 'ServerPreference' ?

2020-09-23 Thread PGNet Dev
i've got two servers communicating over ssl. comms between them work if /etc/pki/tls/openssl.cnf includes Options = PrioritizeChaCha but fail if 'ServerPreference' (cref: Undocumented openssl.cnf options and PrioritizeChaCha

Re: matching openssl's enc ciphers to php's openssl functions' ciphers: where's "chacha20-poly1305"?

2020-08-14 Thread PGNet Dev
On 8/13/20 3:03 PM, Thomas Dwyer III wrote: > I think you want "openssl ciphers" rather than "openssl enc -ciphers". Per > the "enc" man page: > > The enc program does not support authenticated encryption modes like > CCM and GCM, and will not support such modes in the

matching openssl's enc ciphers to php's openssl functions' ciphers: where's "chacha20-poly1305"?

2020-08-13 Thread PGNet Dev
I'm deploying a php app that makes use of php's openssl functions https://www.php.net/manual/en/ref.openssl.php atm, I've php -v PHP 7.4.8 (cli) (built: Jul 9 2020 08:57:23) ( NTS ) openssl version OpenSSL 1.1.1g FIPS 21 Apr 2020 The

Re: cipherlist with only tlsv1.3 ciphers reports error?

2019-07-20 Thread PGNet Dev
On 7/20/19 8:17 AM, Viktor Dukhovni wrote: On Sat, Jul 20, 2019 at 07:35:49AM -0700, PGNet Dev wrote: Checking cipherlist for just TLSv1.3 ciphers FAILs here, openssl ciphers -stdname -s -V 'TTLS13-CHACHA20-POLY1305-SHA256:TLS13-AES-128-GCM-SHA256:TLS13-AES-256-GCM-SHA384

Re: cipherlist with only tlsv1.3 ciphers reports error?

2019-07-20 Thread PGNet Dev
Hi, On 7/20/19 7:28 AM, Viktor Dukhovni wrote: > On Fri, Jul 19, 2019 at 10:38:19AM -0700, PGNet Dev wrote: > >> I suspect I've misunderstood usage of TLSv1.3 @ >> >> https://www.openssl.org/blog/blog/2018/02/08/tlsv1.3/ >> >> Checking cipherlist

Re: cipherlist with only tlsv1.3 ciphers reports error?

2019-07-19 Thread PGNet Dev
>>> Configuration file difference? > >> which config file are you referring to? > > The default OpenSSL configuration file. openssl.cnf, in the directory > displayed by "openssl version -d". But I can't think offhand of anything in > the configuration file that I'd expect to have this sort

Re: cipherlist with only tlsv1.3 ciphers reports error?

2019-07-19 Thread PGNet Dev
> Works for me: > $ openssl ciphers -stdname -s -V > 'TTLS13-CHACHA20-POLY1305-SHA256:TLS13-AES-128-GCM-SHA256:TLS13-AES-256-GCM-SHA384' simplifying to build defaults ./config -v \ --prefix=/usr/local/ssl-test \ --openssldir=/usr/local/ssl-test \

Re: cipherlist with only tlsv1.3 ciphers reports error?

2019-07-19 Thread PGNet Dev
> Works for me: heh. of COURSE it does! sanity check here, openssl ciphers -stdname -s -V 'TTLS13-CHACHA20-POLY1305-SHA256:TLS13-AES-128-GCM-SHA256:TLS13-AES-256-GCM-SHA384' Error in cipher list 140042399306176:error:1410D0B9:SSL routines:SSL_CTX_set_cipher_list:no cipher

cipherlist with only tlsv1.3 ciphers reports error?

2019-07-19 Thread PGNet Dev
I suspect I've misunderstood usage of TLSv1.3 @ https://www.openssl.org/blog/blog/2018/02/08/tlsv1.3/ Checking cipherlist for just TLSv1.3 ciphers FAILs here, openssl ciphers -stdname -s -V 'TTLS13-CHACHA20-POLY1305-SHA256:TLS13-AES-128-GCM-SHA256:TLS13-AES-256-GCM-SHA384'

Re: Error building app on RHEL 7 with openssl 1.1.1

2019-07-18 Thread PGNet Dev
On 7/18/19 3:37 PM, Mark Richter wrote:> I use: > > ./config --prefix=/opt/openssl1.1 --openssldir=/opt/openssl1.1 --libdir=lib no-shared zlib-dynamic just fyi, the options were simply referring to the linking issue, not an inclusive list; hence the ellipsis > I'm pretty sure I can't just

Re: Error building app on RHEL 7 with openssl 1.1.1

2019-07-18 Thread PGNet Dev
On 7/18/19 1:34 PM, Mark Richter wrote: This is probably along the same lines as other questions I have hasked. I built the 1.1.1 libraries and installed them in /opt/openssl1.1, then modified the Makefile to include the right –I and -L flags, but I get this error: haven't backtracked

webserver+openssl 1.1.1c failing to use CHACHA20 ciphers, and fails to launch at all if just TLSv1.3 cipherlist is specified?

2019-07-17 Thread PGNet Dev
I run nginx 1.17.1 + openssl 1.1.1c on linux. I typically configure recommended defaults for SSL usage, and it "just works", with ssllabs reporting my sites as healthy with an "A+", fwiw. Now, I'm currently working setting up a local-only server, attempting to get it to use TLSv1.3/CHACHA20

Re: [openssl-users] TLS 1.3 and the release

2018-08-12 Thread PGNet Dev
I'm just dealing with trying to get openssl 1.1.0 to get installed on Ubuntu bionic. Yes, there is a package, but all the other packages depend upon 1.0.x and many things are linking against 1.0.x rather than 1.1, when both are installed... I don't know why they build stuff against 1.0.x

Re: [openssl-users] 1st time through, only -- "Can't open root/database.attr for reading, No such file or directory" ?

2017-06-04 Thread PGNet Dev
On 6/4/17 4:51 PM, Jeffrey Walton wrote: but the process STARTS with an apparently non-fatal error ... Using configuration from /home/sec/newCA/openssl.cnf Can't open root/database.attr for reading, No such file or directory 140013244086016:error:02001002:system

[openssl-users] 1st time through, only -- "Can't open root/database.attr for reading, No such file or directory" ?

2017-06-04 Thread PGNet Dev
I've a new, local CA for (primary) local, self-signed, elliptical cert issuance & use. I've built/installed, openssl version OpenSSL 1.1.0f 25 May 2017 I've created a ROOT crt & key, & and an INTERMEDIATE key & csr. On exec of signing the INTERMEDIATE key with the

Re: [openssl-users] OpenSSL and RPATH's

2017-05-31 Thread PGNet Dev
On 5/31/17 3:16 AM, Wouter Verhelst wrote: > On 30-05-17 18:12, PGNet Dev wrote: > [...] >> with lots of apps still not at all v110 >> compatible, or at best broken in their attempts, having local builds of >> both v110x and v102x is extremely useful -- and RPATH'ing

Re: [openssl-users] sha256 digest support in v102l build missing; present in v110f. missing build flag?

2017-05-30 Thread PGNet Dev
On 5/30/17 9:01 AM, Jakob Bohm wrote: Actually, in my testing of earlier 1.0.x releases, sha256 etc. are only missing from the help message, they are actually there, also as commands. On 5/30/17 9:14 AM, Salz, Rich wrote: >> Then I've misunderstood the presence of the "-DSHA256_ASM" flag. >>

Re: [openssl-users] OpenSSL and RPATH's

2017-05-30 Thread PGNet Dev
The only reason why you would ever want to use RPATH with OpenSSL is because you need to install a particular old version of libssl (or libcrypto) that has the same SONAME as the system-default, but where you don't want to use that system-default one -- but why would you want to do that? Security

Re: [openssl-users] sha256 digest support in v102l build missing; present in v110f. missing build flag?

2017-05-30 Thread PGNet Dev
On 5/30/17 8:25 AM, Salz, Rich wrote: The results are both functional, but the v102l build is missing sha{224|256|384|512} digests Right; those digests are not in 1.0.2 Then I've misunderstood the presence of the "-DSHA256_ASM" flag. What's it specifically used for? -- openssl-users

[openssl-users] sha256 digest support in v102l build missing; present in v110f. missing build flag?

2017-05-30 Thread PGNet Dev
I'm building separate local instances of latest Openssl v1.1.0 & v1.0.2 on linux64, to keep not-yet-v110-compliant apps happy. The results are both functional, but the v102l build is missing sha{224|256|384|512} digests v 1.0.2l /usr/local/openssl10/bin/openssl version

[openssl-users] [SOLVED?] Re: openssl 1.0.2h pkcs12 export fails @ "digital envelope routines:EVP_PBE_CipherInit:unknown cipher"

2016-06-28 Thread PGNet Dev
Reading @ https://www.openssl.org/docs/manmaster/apps/pkcs12.html "By default the private key is encrypted using triple DES and the certificate using 40 bit RC2." which clearly implies, with RC2 disabled (it is), that'll cause a problem in default config. Adding the options

[openssl-users] openssl 1.0.2h pkcs12 export fails @ "digital envelope routines:EVP_PBE_CipherInit:unknown cipher"

2016-06-28 Thread PGNet Dev
I'm setting up a new, local CA. The local openssl instance is openssl version OpenSSL 1.0.2h 3 May 2016 config'd/built with ... no-comp no-zlib no-zlib-dynamic \ enable-ec_nistp_64_gcc_128 \ enable-rfc3779 \ enable-ecdsa \

Re: [openssl-users] [THREAD CLOSED]

2016-04-04 Thread PGNet Dev
On 04/04/2016 07:08 PM, Jakob Bohm wrote: On 05/04/2016 02:57, PGNet Dev wrote: Sorry to post this here, but you failed to provide any address of said SPAM-L, nor yourself. Try again. http://bfy.tw/565B Troll! I didn't ask what things in the entire world were historically named "S

Re: [openssl-users] [THREAD CLOSED]

2016-04-04 Thread PGNet Dev
Sorry to post this here, but you failed to provide any address of said SPAM-L, nor yourself. Try again. http://bfy.tw/565B -- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Re: [openssl-users] Fwd: CONGRATULATION____REF#87670

2016-04-04 Thread PGNet Dev
Is there nowhere else this interminable thread can be taken? Some of us actually subscribe to this list to actually follow *openssl* use & issues. Take it up with the list admins directly? On 04/04/2016 05:39 PM, Jakob Bohm wrote: On 05/04/2016 01:47, Johann v. Preußen wrote: '/No one

Re: [openssl-users] 'makedepend' in openssl builds: clarify need and correct usage

2016-03-19 Thread PGNet Dev
On 03/16/2016 02:52 PM, Jeffrey Walton wrote: If I can ask as a user, if I say do this _all the time_, then would it be easiest on you? make depend && make clean && make Or is there something else you would recommend? If it were up to _me_, I'd move to a cmake build system, with

Re: [openssl-users] 'makedepend' in openssl builds: clarify need and correct usage

2016-03-14 Thread PGNet Dev
On 03/14/2016 08:58 AM, PGNet Dev wrote: On 03/14/2016 08:26 AM, PGNet Dev wrote: Which I currently attempt to do, but get the reported errors about not finding the stddef.h include etc. Here, https://rt.openssl.org/Ticket/Display.html?id=4169=guest=guest it simply says "fixed i

Re: [openssl-users] 'makedepend' in openssl builds: clarify need and correct usage

2016-03-14 Thread PGNet Dev
On 03/14/2016 08:26 AM, PGNet Dev wrote: Which I currently attempt to do, but get the reported errors about not finding the stddef.h include etc. Specifically, cd test rm -rf * wget https://www.openssl.org/source/openssl-1.0.2g.tar.gz tar zxvf openssl-1.0.2g.tar.gz cd openssl-1.0.2g

Re: [openssl-users] 'makedepend' in openssl builds: clarify need and correct usage

2016-03-14 Thread PGNet Dev
On 03/14/2016 08:24 AM, lists wrote: Did you mean "./config ..."? yep. Must use it, (1) https://wiki.openssl.org/index.php/Compilation_and_Installation Dependencies If you are prompted to run make depend, then you must do so. Which I currently attempt to do, but get

Re: [openssl-users] openssl 1.0.2g build fails with 'no-comp' or 'no-comp no-bio' configure options?

2016-03-10 Thread PGNet Dev
My read of "no-comp Disables compression independent of zlib. OPENSSL_NO_COMP will be defined in the OpenSSL headers." is that this disables compression methods OTHER than zlib. Is the intent, instead, that it disables ALL compression, REGARDLESS of the presence/setting of zlib? This

Re: [openssl-users] openssl 1.0.2g build linking to wrong libs -- 'system' instead of 'own'. How to correct?

2016-03-10 Thread PGNet Dev
On 03/10/2016 11:07 AM, Jeffrey Walton wrote: What's the correct config+build procedure for ending up with self-consistent linking? https://wiki.openssl.org/index.php/Compilation_and_Installation#Using_RPATHs Didn't realize that I'd need to rpath a package within its own build. Appears

Re: [openssl-users] openssl 1.0.2g build fails with 'no-comp' or 'no-comp no-bio' configure options?

2016-03-10 Thread PGNet Dev
On 03/10/2016 10:19 AM, PGNetwork Dev wrote: ./config no-comp ... subsequent 'make' fails make ... enc.c:(.text+0x1253): undefined reference to `BIO_f_zlib' Adding one or both of no-zlib no-zlib-dynamic should handle that. My read of

[openssl-users] openssl 1.0.2g build linking to wrong libs -- 'system' instead of 'own'. How to correct?

2016-03-10 Thread PGNet Dev
I'm building 1.0.2g on linux64. I'm trying to get a self-consistent build, linked to the right libs. Building cd ./openssl-1.0.2g ./config \ --openssldir=/home/dev/ssl --libdir=lib64 \ threads shared zlib -D_GNU_SOURCE -DPURIFY -DTERMIO \

[openssl-users] openssl 1.0.2g build fails with 'no-comp' or 'no-comp no-bio' configure options?

2016-03-10 Thread PGNet Dev
I'm building openssl 1.0.2g on linux64 With my usual ./config ... I end up with a successful build/install openssl version OpenSSL 1.0.2g 1 Mar 2016 If I add ./config no-comp ... subsequent 'make' fails make ...

Re: [openssl-users] 'makedepend' in openssl builds: clarify need and correct usage

2016-03-10 Thread PGNet Dev
Actually, the actual admonition is more emphatic I'm prompted Since you've disabled or enabled at least one algorithm, you need to do the following before building: make depend " Configured for linux-x86_64. *** Because of configuration changes, you MUST do the following

[openssl-users] 'makedepend' in openssl builds: clarify need and correct usage

2016-03-10 Thread PGNet Dev
I'm building openssl 1.0.2g on linux64. After ./configure ... I'm prompted Since you've disabled or enabled at least one algorithm, you need to do the following before building: make depend Exec'ing the 'make depend' stage returns lots of warnings,

getting both OCSP Response Status: successful and an Response Verify Failure error ?

2010-03-24 Thread PGNet Dev
testing an ocsp query to a local openssl ocsp 'server', openssl ocsp \ -issuer /svr/demoCA/certs/CA/CA.cert.pem \ -cert /svr/demoCA/certs/domains/testdomain.cert.pem \ -url http://localhost: \ -resp_text i get what seems to be a successful response of good CertStatus, OCSP Response

Re: getting both OCSP Response Status: successful and an Response Verify Failure error ?

2010-03-24 Thread PGNet Dev
On Wed, Mar 24, 2010 at 4:46 AM, Dr. Stephen Henson st...@openssl.org wrote: The path of the responder certificate has to be validated so you need to pass the root CA using the -CAfile or -CApath command line arguments. adding -CAfile did the trick -- adding it to BOTH the server-launch cmd,

what are the minimal KeyUsage requirements for an OCSP-only, single-purpose cert?

2010-03-23 Thread PGNet Dev
I'm planning to run openssl ocsp in server mode, openssl ocsp \ -index /svr/demoCA/index.txt \ -port \ -CA /svr/demoCA/certs/CA/CA.cert.pem \ -rsigner /svr/demoCA/crl/OCSP.cert.pem \ -rkey /svr/demoCA/crl/OCSP.privkey.pem \ -text -out /var/log/ocsp.log where OCSP.cert.pem is a

Re: what are the minimal KeyUsage requirements for an OCSP-only, single-purpose cert?

2010-03-23 Thread PGNet Dev
hi, On Tue, Mar 23, 2010 at 4:56 PM, Dr. Stephen Henson st...@openssl.org wrote: Which, if any/all, of the Digital Signature, Non Repudiation, Key Encipherment KeyUsage specifications are required, if this cert will be used ONLY for/by the OCSP responder daemon? Well Key Encipherment is not

Re: what are the minimal KeyUsage requirements for an OCSP-only, single-purpose cert?

2010-03-23 Thread PGNet Dev
On Tue, Mar 23, 2010 at 4:54 PM, Patrick Patterson ppatter...@carillonis.com wrote: where OCSP.cert.pem is a single-purpose cert, only for the OCSP responder. I hope you realize that there are MANY warnings against doing this for other than test purposes - for one thing, the server will fall

Re: what are the minimal KeyUsage requirements for an OCSP-only, single-purpose cert?

2010-03-23 Thread PGNet Dev
On Tue, Mar 23, 2010 at 5:41 PM, Dr. Stephen Henson st...@openssl.org wrote: If you aren't sorry you did you might be the first person who isn't. Just warning you... noted. It's a deprecated extension from long ago. Best leave it out all together. didn't realize. do now,

Re: openssl 098j + fips 1.2 fails @ 'make test', but only for target 'linux-generic32'

2009-01-11 Thread PGNet
On Fri, Jan 9, 2009 at 8:18 AM, Dr. Stephen Henson st...@openssl.org wrote: So either use a box supporting SSE2 or use a pure C build (no-asm) which will have poorer performance. config with, ./Configure shared --prefix=/usr/local/ssl --openssldir=/usr/local/ssl \ linux-generic32 no-asm

Re: openssl 098j + fips 1.2 fails @ 'make test', but only for target 'linux-generic32'

2009-01-11 Thread PGNet
On Sun, Jan 11, 2009 at 7:11 AM, Steve Marquess marqu...@oss-institute.org wrote: As an uncontrolled document the User Guide can contain extraneous detail and can be amended as often as necessary, and I try hard to keep it as technically complete and accurate as possible. So yes, the Security

which algorithms are enabled by default with fips?

2009-01-11 Thread PGNet
With the addition of fips object to the 'mix' of available build options, is openssl configure with ./Configure ... enable-rc5 enable-mdc2 fips (iiuc, CHANGES' stmt that 'idea' *is* enabled by default still holds?) sufficient to enable _all_ available algorithms, with the option to disable

Re: which algorithms are enabled by default with fips?

2009-01-11 Thread PGNet
Hi Steve, On Sun, Jan 11, 2009 at 10:14 AM, Steve Marquess marqu...@oss-institute.org wrote: Here you are presumably using a FIPS compatible standard OpenSSL distribution, i.e. 0.9.8j. yes, openssl version OpenSSL 0.9.8j-fips 07 Jan 2009 The fips option means find and reference the ...

Re: which algorithms are enabled by default with fips?

2009-01-11 Thread PGNet
On Sun, Jan 11, 2009 at 3:42 PM, Steve Marquess marqu...@oss-institute.org wrote: Long story short, OpenSSH really needs some source mods to gracefully invoke and run in FIPS mode. Hrm ... I'd have thought that openssh would be amoong the 1st/best @ compliance. Several people, myself

Re: openssl 098j + fips 1.2 fails @ 'make test', but only for target 'linux-generic32'

2009-01-09 Thread PGNet
Hi Stephen, On Fri, Jan 9, 2009 at 8:18 AM, Dr. Stephen Henson st...@openssl.org wrote: You can get the answer with openssl errstr or by checking the source file referenced. Noted. Thanks. So either use a box supporting SSE2 or use a pure C build (no-asm) which will have poorer performance.

Re: openssl 098j + fips 1.2 fails @ 'make test', but only for target 'linux-generic32'

2009-01-09 Thread PGNet
On Fri, Jan 9, 2009 at 12:25 PM, Kyle Hamilton aerow...@gmail.com wrote: In the fips-1.2 configuration step, use ./config fipscanisterbuild no-asm As I had alread noted above, I did. So either use a box supporting SSE2 or use a pure C build (no-asm) which will have poorer performance.

Re: openssl 098j + fips 1.2 fails @ 'make test', but only for target 'linux-generic32'

2009-01-09 Thread PGNet
My mistake. That's for fipscanisterbuild. Trying now ... __ OpenSSL Project http://www.openssl.org User Support Mailing Listopenssl-users@openssl.org Automated List Manager

Re: openssl 098j + fips 1.2 fails @ 'make test', but only for target 'linux-generic32'

2009-01-09 Thread PGNet
per advice, ./config fipscanisterbuild no-asm completes without error, but, now, make fails @, ... /usr/bin/ranlib ../libssl.a || echo Never mind. make[1]: Leaving directory `/usr/local/src/openssl/openssl-fips-1.2/ssl' make[1]: Entering directory `/usr/local/src/openssl/openssl-fips-1.2'

Re: openssl 098j + fips 1.2 fails @ 'make test', but only for target 'linux-generic32'

2009-01-09 Thread PGNet
Kyle, On Fri, Jan 9, 2009 at 2:37 PM, Kyle Hamilton aerow...@gmail.com wrote: Delete the directory, untar it fresh, and reconfigure with that config line. ok, rm -rf openssl-fips-1.2 tar zxf openssl-fips-1.2.tar.gz cd openssl-fips-1.2/ Directory: /usr/local/src/openssl/openssl-fips-1.2

Re: openssl 098j + fips 1.2 fails @ 'make test', but only for target 'linux-generic32'

2009-01-09 Thread PGNet
On Fri, Jan 9, 2009 at 3:29 PM, Kyle Hamilton aerow...@gmail.com wrote: If you read it, you too will see this. :) Actually, I HAD already read section 4.2.1 of the UserGuide for *v1.2*, 4.2.1Building the FIPS Object Module from Source The specification of any other options on the command line,

Re: openssl 098j + fips 1.2 fails @ 'make test', but only for target 'linux-generic32'

2009-01-09 Thread PGNet
and, just for reference, per guidance above, finally, uname -a Linux dt.loc 2.6.27.7-9-default #1 SMP 2008-12-04 18:10:04 +0100 i686 i686 i386 GNU/Linux openssl version OpenSSL 0.9.8j-fips 07 Jan 2009 thanks! __ OpenSSL

Re: Repeating crashes @ fips 1.2 'make' on OSX

2009-01-08 Thread PGNet
Hi, On Thu, Jan 8, 2009 at 12:42 AM, Kyle Hamilton aerow...@gmail.com wrote: Which version of Xcode do you have installed? XCode v3.1.2, build 1149 Which version of gcc are you using (3.x or 4.x)? gcc version 4.2.1 (Apple Inc. build 5566) On Wed, Jan 7, 2009 at 12:41 PM, PGNet pgnet.trash

Re: Repeating crashes @ fips 1.2 'make' on OSX

2009-01-08 Thread PGNet
As a test, ignoring the UserGuide's admonition about user-config options to FIPS build, with a TARGET = darwin-ppc-cc, this, ./config --prefix=/usr/local/ssl-fips fipscanisterbuild make make install installs FIPS as directed in /usr/local/ssl-fips. Then, building openssl 098j, mv

Re: Repeating crashes @ fips 1.2 'make' on OSX

2009-01-08 Thread PGNet
On Thu, Jan 8, 2009 at 7:58 AM, Dr. Stephen Henson st...@openssl.org wrote: If you want to move the validated module elsewhere afterwards you can do provided you keep to the permission requirements of the security policy. Once you've installed the validated module you can then use OpenSSL

openssl 098j + fips 1.2 fails @ 'make test', but only for target 'linux-generic32'

2009-01-08 Thread PGNet
I've managed to build/install openssl 098j+fips12 on (1) a PPC mac, running OSX 10.5.6 uname -a Darwin mac 9.6.0 Darwin Kernel Version 9.6.0: Mon Nov 24 17:39:01 PST 2008; root:xnu-1228.9.59~1/RELEASE_PPC Power Macintosh (2) a shared, Debian host, uname -a Linux cobra

Repeating crashes @ fips 1.2 'make' on OSX

2009-01-07 Thread PGNet
I'm building fips 1.2 on OSX, uname -a Darwin pb.local 9.6.0 Darwin Kernel Version 9.6.0: Mon Nov 24 17:39:01 PST 2008; root:xnu-1228.9.59~1/RELEASE_PPC Power Macintosh Config, cd /usr/local/src/openssl-fips-1.2 ./config fipscanisterbuild completes without an apparent hitch.