RE: Certificate pass phrase brute force...

2014-09-16 Thread Dave Thompson
From: owner-openssl-us...@openssl.org On Behalf Of Gregory Sloop Sent: Monday, September 15, 2014 22:50 And, one more question: How can I tell what format/encryption my pkcs12 files are in? [I believe for Android platform use, I need p12 certs/keys - so I'm working on the

Re: Certificate pass phrase brute force...

2014-09-16 Thread Gregory Sloop
[SNIP] However this looks like the key is encrypted with 3DES, but I exported it from the Cert+Key with -aes256 - so I'm puzzled why I'd have a 3DES encrypted p12. DT You thought you did but you didn't. DT The doc is a bit subtle, but the -$cipher option is listed under PARSING. DT It

Re: Certificate pass phrase brute force...

2014-09-15 Thread Gregory Sloop
So, hopefully this will be the last post in the thread. [fat chance, eh!?] I've gone back and re-encrypted the private keys [thanks Dave, again!] and this is the result from an asn1parse openssl asn1parse somepk.key 0:d=0 hl=4 l=2463 cons: SEQUENCE 4:d=1 hl=2 l= 73 cons: SEQUENCE

Re: Certificate pass phrase brute force...

2014-09-15 Thread Gregory Sloop
And, one more question: How can I tell what format/encryption my pkcs12 files are in? [I believe for Android platform use, I need p12 certs/keys - so I'm working on the export/conversion part too.] I export my cert+key like so: [openssl pkcs12 -export -aes256 -in somecert.crt -inkey

RE: Certificate pass phrase brute force...

2014-09-09 Thread Michael Wojcik
...@openssl.org [mailto:owner-openssl-us...@openssl.org] On Behalf Of Gregory Sloop Sent: Tuesday, 09 September, 2014 01:19 To: openssl-users@openssl.org Subject: Re: Certificate pass phrase brute force... I used the asn1parse command [thanks Dave!] and while the key looks old style it parses as follows

RE: Certificate pass phrase brute force...

2014-09-09 Thread Kyle Hamilton
cipher. Michael Wojcik Technology Specialist, Micro Focus From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] On Behalf Of Gregory Sloop Sent: Tuesday, 09 September, 2014 01:19 To: openssl-users@openssl.org Subject: Re: Certificate pass phrase brute force... I used

RE: Certificate pass phrase brute force...

2014-09-09 Thread Michael Wojcik
to submit a patch. Michael Wojcik Technology Specialist, Micro Focus From: Kyle Hamilton [mailto:aerow...@gmail.com] Sent: Tuesday, 09 September, 2014 13:43 To: openssl-users@openssl.org; Michael Wojcik Subject: RE: Certificate pass phrase brute force... At least 3DES is *some* encryption

Re: Certificate pass phrase brute force...

2014-09-09 Thread Gregory Sloop
. Michael Wojcik Technology Specialist, Micro Focus From: Kyle Hamilton [mailto:aerow...@gmail.com] Sent: Tuesday, 09 September, 2014 13:43 To: openssl-users@openssl.org; Michael Wojcik Subject: RE: Certificate pass phrase brute force... At least 3DES is *some* encryption. The issue

Re: Certificate pass phrase brute force...

2014-09-09 Thread Kyle Hamilton
to submit a patch. Michael Wojcik Technology Specialist, Micro Focus From: Kyle Hamilton [mailto:aerow...@gmail.com] Sent: Tuesday, 09 September, 2014 13:43 To: openssl-users@openssl.org; Michael Wojcik Subject: RE: Certificate pass phrase brute force... At least 3DES is *some* encryption

RE: Certificate pass phrase brute force...

2014-09-09 Thread Dave Thompson
Of Gregory Sloop Sent: Tuesday, September 09, 2014 01:19 To: mailto:openssl-users@openssl.org openssl-users@openssl.org Subject: Re: Certificate pass phrase brute force... I used the asn1parse command [thanks Dave!] and while the key looks old style it parses as follows: 50:d=4 hl=2 l= 8 prim

RE: Certificate pass phrase brute force...

2014-09-08 Thread Michael Wojcik
any of those figures. Does that help? Michael Wojcik Technology Specialist, Micro Focus From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] On Behalf Of Gregory Sloop Sent: Friday, 05 September, 2014 16:32 To: Salz, Rich Subject: Re: Certificate pass phrase brute force

Re: Certificate pass phrase brute force...

2014-09-08 Thread Gregory Sloop
: Re: Certificate pass phrase brute force... There is nothing special about cracking a certificate password versus any other password. There is a lot of literature out there; a web search will easily give you enough information to be depressed. I think your biggest faulty assumption

Re: Certificate pass phrase brute force...

2014-09-08 Thread Jeffrey Walton
I think it's safe to assume that 3DES is almost certainly a lousier choice than AES or Camellia on multiple fronts. Two key triple DES provides about 80-bits of security, and three key triple DES provides 112-bits of security. Do you know which they are using? AES-128 provides about 128-bits of

Re: Certificate pass phrase brute force...

2014-09-08 Thread Gregory Sloop
Well, as I said, given my reading of the code, the newest version of EasyRSA [line 861] shows the following: local crypto=-des3 It's in the set_pass function. [On further review of the code, this appears to only be used by the set-rsa-pass or set-ec-pass functions, and I can't determine what

RE: Certificate pass phrase brute force...

2014-09-08 Thread Dave Thompson
For the legacy formats (dashes-BEGIN PRIVATE RSA KEY or PRIVATE EC KEY) just look on the DEK-Info: header line. For PKCS#8 format (dashes-BEGIN ENCRYPTED PRIVATE KEY) do openssl asn1parse key.pem and the third line will be an OBJECT (really OID) in the form pbeWithhashandcipher.

Certificate pass phrase brute force...

2014-09-05 Thread Gregory Sloop
General question: I've done a number of searches and can't find a lot about the subject. [I've searched the list archives too...at least as best I could.] In several cases, the most obvious being OpenVPN, I use client certificates generated by openssl, with a pass-phrase [password]. This

RE: Certificate pass phrase brute force...

2014-09-05 Thread Salz, Rich
There is nothing special about cracking a certificate password versus any other password. There is a lot of literature out there; a web search will easily give you enough information to be depressed. I think your biggest faulty assumption is that your users will pick truly random 10char

Re: Certificate pass phrase brute force...

2014-09-05 Thread dave paxton
From: Gregory Sloop gr...@sloop.net Date:09/05/2014 1:36 PM (GMT-05:00) To: openssl-users@openssl.org Cc: Subject: Certificate pass phrase brute force... General question: I've done a number of searches and can't find a lot about the subject. [I've searched the list archives too

RE: Certificate pass phrase brute force...

2014-09-05 Thread Michael Wojcik
[mailto:owner-openssl-us...@openssl.org] On Behalf Of Gregory Sloop Sent: Friday, 05 September, 2014 13:37 To: openssl-users@openssl.org Subject: Certificate pass phrase brute force... General question: I've done a number of searches and can't find a lot about the subject. [I've searched

Re: Certificate pass phrase brute force...

2014-09-05 Thread flgirl799901
-users@openssl.org Cc: Subject: Re: Certificate pass phrase brute force... That is easy. Just restrict the number of different passwords per day. Any account. Thus the old school brute force idea passes out the window. Most of what you are looking at it a signing issue. Basically one person

Re: Certificate pass phrase brute force...

2014-09-05 Thread dave paxton
, but deplore your rudeness Sent via the Samsung GALAXY S® 5, an ATT 4G LTE smartphone Original message From: dave paxton dpax...@me.com Date:09/05/2014 3:33 PM (GMT-05:00) To: openssl-users@openssl.org Cc: Subject: Re: Certificate pass phrase brute force... That is easy

Re: Certificate pass phrase brute force...

2014-09-05 Thread netout net
PM (GMT-05:00) To: openssl-users@openssl.org Cc: Subject: Re: Certificate pass phrase brute force... That is easy. Just restrict the number of different passwords per day. Any account. Thus the old school brute force idea passes out the window. Most of what you are looking at it a signing

RE: Certificate pass phrase brute force...

2014-09-05 Thread Michael Wojcik
Original message From: Gregory Sloop gr...@sloop.netmailto:gr...@sloop.net Date:09/05/2014 1:36 PM (GMT-05:00) To: openssl-users@openssl.orgmailto:openssl-users@openssl.org Cc: Subject: Certificate pass phrase brute force... General question: I've done a number of searches and can't find

Re: Certificate pass phrase brute force...

2014-09-05 Thread Gregory Sloop
There is nothing special about cracking a certificate password versus any other password. There is a lot of literature out there; a web search will easily give you enough information to be depressed. I think your biggest faulty assumption is that your users will pick truly random 10char

Re: Certificate pass phrase brute force...

2014-09-05 Thread Kyle Hamilton
:33 PM (GMT-05:00) To: openssl-users@openssl.org Cc: Subject: Re: Certificate pass phrase brute force... That is easy. Just restrict the number of different passwords per day. Any account. Thus the old school brute force idea passes out the window. Most of what you are looking