X509_digest() and X509_pubkey_digest().

2013-01-22 Thread Viktor Dukhovni
The OpenSSL library includes two very similar functions: int X509_digest( X509 *cert, const EVP_MD *digest, unsigned char *md, int *len); int X509_pubkey_digest( const X509 *cert,

Re: Openssl versions compability

2013-01-23 Thread Viktor Dukhovni
On Wed, Jan 23, 2013 at 09:12:41AM -0500, Ken Goldman wrote: My experience is that you should not expect binary compatibility. Since errors will often be in little used corner cases, it's safer to always recompile. Please do not spread FUD, the OpenSSL project made a commitment a while back

Re: Openssl versions compability

2013-01-23 Thread Viktor Dukhovni
On Wed, Jan 23, 2013 at 09:51:08AM -0500, Jeffrey Walton wrote: Binary compatibility can be tricky, and it brings up all the old wounds of Microsoft's COM. Are you claiming there is binary compatibility among tool vendors? For example, can I build the base with GCC, and then build patches

Re: Openssl versions compability

2013-01-23 Thread Viktor Dukhovni
On Wed, Jan 23, 2013 at 10:12:36AM -0500, Ken Goldman wrote: On 1/23/2013 9:51 AM, Jeffrey Walton wrote: Binary compatibility can be tricky, and it brings up all the old wounds of Microsoft's COM. Are you claiming there is binary compatibility among tool vendors? For example, can I build the

Re: X509_digest() and X509_pubkey_digest().

2013-01-24 Thread Viktor Dukhovni
On Thu, Jan 24, 2013 at 02:49:25PM +0100, Dr. Stephen Henson wrote: This is a rather non-obvious interface, and X509_get_X509_PUBKEY() is not documented. I make no claim this is obvious but... It should be possible to do this in a single call using the ASN1_item_verify interface

Re: How to use a binary public key

2013-01-24 Thread Viktor Dukhovni
On Thu, Jan 24, 2013 at 05:25:48PM +, Tovey, Dwight (LaserJet RD FW Eng.) wrote: On Jan 23, 2013, at 4:18 PM, kap...@mizera.cz wrote: I have build the whole pub-key (in DER) from yours pubkey.bin by adding public key header - as wrote w...@omnigroup.com If I did not make error,

Re: Problems reading PKCS8 private key

2013-01-25 Thread Viktor Dukhovni
On Fri, Jan 25, 2013 at 04:13:02PM +, Ken Allen wrote: Hi All, I'm having a bit of a problem. I need to load a private key (EC, but I'm having the same problem with RSA) from an unecrypted, der encoded, PKCS8 memory buffer. I'm just trying to get it to work loading from a file for now and

Re: Problems reading PKCS8 private key

2013-01-25 Thread Viktor Dukhovni
On Fri, Jan 25, 2013 at 05:10:03PM +, Viktor Dukhovni wrote: On Fri, Jan 25, 2013 at 04:13:02PM +, Ken Allen wrote: Hi All, I'm having a bit of a problem. I need to load a private key (EC, but I'm having the same problem with RSA) from an unecrypted, der encoded, PKCS8 memory

Re: Obtaining a TLS session key

2013-01-29 Thread Viktor Dukhovni
On Wed, Jan 30, 2013 at 05:29:51PM +1300, T J wrote: How does one obtain the session key from a SSL structure after a successful TLS handshake? You don't, but, you shold instead obtain the tls-unique channel binding data ( https://tools.ietf.org/html/rfc5929#section-3 ) and run the result

aNULL cipher order and TLS 1.2 ciphers

2013-01-30 Thread Viktor Dukhovni
With aRSA ciphers we see that the new TLS 1.2 ciphers with SHA-2 MACs are by default preferred over the older TLS 1.1 SHA-1 ciphers. For example, looking at just the AES subset we see groups of 3 in which the first is always GCM, the second SHA-2 and the 3rd SHA-1: $ openssl ciphers -v

Re: Obtaining a TLS session key

2013-01-30 Thread Viktor Dukhovni
On Wed, Jan 30, 2013 at 07:03:09PM +0100, Jakob Bohm wrote: You don't, but, you shold instead obtain the tls-unique channel binding data ( https://tools.ietf.org/html/rfc5929#section-3 ) and run the result through a KDF (HKDF should work well) on both ends to obtain a suitable key for a

Re: Obtaining a TLS session key

2013-01-31 Thread Viktor Dukhovni
On Fri, Feb 01, 2013 at 10:05:15AM +1300, T J wrote: These are sufficient to generate a session unique key via a suitable KDF salted with an application-specific string. OK, great. So I get the master key and run it through the a KDF and I get a 256 bit encryption key for use in my

Re: Null (or default) certificates?

2013-02-01 Thread Viktor Dukhovni
On Fri, Feb 01, 2013 at 01:46:46PM +, Nathan Smyth wrote: Is it possible to have null, untrusted, or shared certificates, to simplify deployment for apps that don't care about SSL? Absolutely. On all servers that don't require client certificates (can't ask for client certs when using an

Re: Null (or default) certificates?

2013-02-01 Thread Viktor Dukhovni
On Fri, Feb 01, 2013 at 03:22:11PM +, Viktor Dukhovni wrote: On Fri, Feb 01, 2013 at 01:46:46PM +, Nathan Smyth wrote: Is it possible to have null, untrusted, or shared certificates, to simplify deployment for apps that don't care about SSL? Absolutely. On all servers that don't

Re: Null (or default) certificates?

2013-02-01 Thread Viktor Dukhovni
On Fri, Feb 01, 2013 at 04:24:47PM +, Nathan Smyth wrote: On all servers that don't require client certificates (can't ask for client certs when using an anonymous ciphersuite) enable anonymous ciphers,? Is it possible to both - in the sense you can check the peer's certificate IF

Re: Null (or default) certificates?

2013-02-01 Thread Viktor Dukhovni
On Fri, Feb 01, 2013 at 07:22:52PM +, Nathan Smyth wrote: In our current implementation, we assume every process has a certificate associated with it, and thus, from a TLS perspective, clients will validate server certificates, and servers will request and validate client certificates for

Re: 140770FC:SSL routines:SSL23_GET_SERVER_HELLO:unknown protocol Error SMTP

2013-02-02 Thread Viktor Dukhovni
On Thu, Jan 31, 2013 at 05:11:59PM +0100, Alexandru Gheorghe wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hey guys, I've tried openssl s_client -connect host:port -starttls smtp - -crlf and I always get 8564:error:140770FC:SSL routines:SSL23_GET_SERVER_HELLO:unknown

Re: Obtaining a TLS session key

2013-02-06 Thread Viktor Dukhovni
On Thu, Feb 07, 2013 at 11:12:13AM +1300, T J wrote: Sorry to keep hammering away at this, but I think I am missing something here. OpenSSL does all this for a TLS connection anyway right? I mean, after a handshake, encryption keys, IV's etc are generated so that the TLS connection can use

Re: Obtaining a TLS session key

2013-02-07 Thread Viktor Dukhovni
On Thu, Feb 07, 2013 at 08:00:42PM +1300, Trevor Jordan wrote: It is bad practice to clone keys. You should also not depend on OpenSSL negotiating a particular algorithm. OpenSSL's key are for the OpenSSL session only. Keys for your application should be the result of a suitably independent

Re: X509* and Extract Public Key?

2013-02-10 Thread Viktor Dukhovni
On Mon, Feb 11, 2013 at 12:01:49AM -0500, Jeffrey Walton wrote: I'm trying to extract a public key (subjectPublicKeyInfo) form an X509 certificate. from apps/x509.c in the openssl source: EVP_PKEY *pkey; pkey=X509_get_pubkey(x); This is not the

Re: Creating certification requests with no CN and SAN only

2013-02-13 Thread Viktor Dukhovni
On Wed, Feb 13, 2013 at 07:46:10PM -0800, Matthew Hall wrote: Hello, I tried to figure out how to create a certification request which has an empty CN and only uses SANs, in line with the recommendations of the latest PKIX RFC 5280. I tried various permutations of commenting out

Re: Creating certification requests with no CN and SAN only

2013-02-13 Thread Viktor Dukhovni
On Thu, Feb 14, 2013 at 04:11:33AM +, Viktor Dukhovni wrote: You'll naturally need to add the requisite subjectAltName extensions. A more complete example: $ cat openssl.cnf [ req ] distinguished_name = dn req_extensions = san [ dn ] [ san ] subjectAltName

Re: Disable wrapping for EVP_EncodeUpdate?

2013-02-19 Thread Viktor Dukhovni
On Tue, Feb 19, 2013 at 03:57:00AM -0500, Nick wrote: I see EVP_EncodeUpdate adds a newline char after every 64 chars of output (presumably to wrap the output). Can this be disabled? No, but the EVP_EncodeBlock() function does not generate any newlines. You must pass it a multiple of 3-bytes

Re: What is the reason for error SSL negotiation failed: error:04075070:rsa routines:RSA_sign:digest too big for rsa key

2013-02-26 Thread Viktor Dukhovni
On Tue, Feb 26, 2013 at 11:30:18PM +0530, Nayna Jain wrote: Both server and client authenticate each other. And so client also sends the certificate. Here client certificate has RSA 512 bits and md5. Server certificates has RSA 1024 bits and md5. Bottom-line: DO NOT use 512-bit RSA moduli,

Re: What is the reason for error SSL negotiation failed: error:04075070:rsa routines:RSA_sign:digest too big for rsa key

2013-02-26 Thread Viktor Dukhovni
On Wed, Feb 27, 2013 at 12:49:55AM +0530, Thulasi Goriparthi wrote: Or use another hash type for signature which can produce not more than 53 bytes of hashed data. (i.e MD5, SHA1, SHA256, SHA384) while using 512-bit keys. OpenSSL by default uses SHA512 hash for signature. Change the code to

Re: What is the reason for error SSL negotiation failed: error:04075070:rsa routines:RSA_sign:digest too big for rsa key

2013-02-26 Thread Viktor Dukhovni
On Wed, Feb 27, 2013 at 01:55:24AM +0530, Thulasi Goriparthi wrote: Interestingly enough, it is in fact SHA384 that fails with RSA-512. The client and server agree on: ECDHE-RSA-AES256-GCM-SHA384 Signature Hash type is not controlled by the CipherSuite and can be dynamically

Re: Need understanding of SSLv23_xxx_method() API.. It is failing when SSLv23_client_method() connects to TLSv1_2_server_method()

2013-02-27 Thread Viktor Dukhovni
On Wed, Feb 27, 2013 at 11:18:19PM +0530, Nayna Jain wrote: I had asked few questions related to SSLv23_xxx_method API to understand its internals. http://stackoverflow.com/questions/3938824/what-books-will-help-me-learn-everything-i-can-about-ssl-pki -- Viktor.

Re: Saving the SessionID/Ticket and rebooting. What is needed?

2013-03-06 Thread Viktor Dukhovni
On Wed, Mar 06, 2013 at 08:37:06PM +0100, Peter Sand wrote: I currently can save the SSL_SESSION in RAM and reuse it as SSL Session ID when reconnecting. The idea is to save it in Flash and reuse after power on again. I've looked at saving the Session like it is done in s_client -sess_out

Re: Trust *only* certs signed by intermediate CA

2013-03-09 Thread Viktor Dukhovni
On Sat, Mar 09, 2013 at 11:04:06AM -0600, Ian Pilcher wrote: It's becoming pretty clear that OpenSSL doesn't provide a simple way to do this today. (X509_V_FLAG_PARTIAL_CHAIN will probably enable this, but it will be years before that makes its way into slower moving distributions.)

Re: SSL_VERIFY_PEER

2013-03-12 Thread Viktor Dukhovni
On Tue, Mar 12, 2013 at 10:23:20AM +, Nathan Smyth wrote: Just wondering - if SSL_VERIFY_PEER is set on a connection, if the verification locations have not been loaded (SSL_CTX_load_verify_locations has not been set) - does the connection fail? Or continue as unverified? This is

Re: EVP_get_digestbynid() return NULL

2013-03-13 Thread Viktor Dukhovni
On Thu, Mar 14, 2013 at 11:34:12AM +0800, cellecial wrote: I'm frustrated that I can't get correct result from such a simple API(on openssl 1.0.1c),just like below. md = EVP_get_digestbynid(NID_ecdsa_with_SHA256); //NID_md5 This is because ECDSA-WITH-SHA256 is a signature algorithm, and

Re: EVP_get_digestbynid() return NULL

2013-03-13 Thread Viktor Dukhovni
On Thu, Mar 14, 2013 at 01:05:25PM +0800, cellecial wrote: but I tried md = EVP_get_digestbynid(NID_md5), still NULL PBKAC? $ cat md.c #include openssl/ssl.h #include openssl/evp.h #include stdio.h int main() { int nids[] = {

Re: openssl-user - UTF8 characters in configuration file

2013-03-15 Thread Viktor Dukhovni
On Fri, Mar 15, 2013 at 09:44:13AM +0100, Zbyn?k Krej??k wrote: I tried this some 2yrs ago what seemed to work (at least wins showed the strings in cert correctly) in [ req ] ... distinguished_name= req_distinguished_name attributes= req_attributes string_mask =

Re: compile openssl 1.0.1e failed on Ubuntu 12.10 x64

2013-04-07 Thread Viktor Dukhovni
On Sun, Apr 07, 2013 at 11:57:26PM +0800, Hailei Hu wrote: hi,everyone! I am trying to compile a x64 version of openssl 1.0.1e on Ubuntu 12.10 x64. I use the following command: ./Configure linux-generic64 Try a more sensible target: $ ./Configure LIST | grep '^linux.*64'

Re: SSL / SMTP

2013-04-17 Thread Viktor Dukhovni
On Wed, Apr 17, 2013 at 07:24:23AM +, Joan Moreau wrote: 2013-04-17T09:17:36.573675+02:00 server postfix/smtpd[16725]: warning: TLS library problem: 16725:error:140D308A:SSL routines:TLS1_SETUP_KEY_BLOCK:cipher or hash unavailable:t1_enc.c:597: 2013-04-17T09:17:36.573971+02:00 server

Re: SSL / SMTP

2013-04-17 Thread Viktor Dukhovni
On Wed, Apr 17, 2013 at 04:40:55PM +, Joan Moreau wrote: No. Install a fresh O/S image on new hardware and use that as your mail server. If a fresh install with the default Postfix for the O/S does not work, come back to the Postfix-users list for help. You've already consumed a lot of

Re: POP3 client with OpenSSL issue

2013-04-21 Thread Viktor Dukhovni
On Sun, Apr 21, 2013 at 10:17:31PM -0400, Dave Thompson wrote: scanf(%s,password); This also mishandles passwords containing whitespace. The code looks so poor that my guess is that someone is asking us to do their homework. -- Viktor.

Malware auto-response bot, take care...

2013-04-21 Thread Viktor Dukhovni
My previous post generated an auto-response from what is likely a malware auto-response bot. Best bet is to not follow the links. This has been reported to Hotmail via spamcop. [ Looks like Hotmail does not implement RFC 3834 as yet. ] -- Suspected malware response below -- Return-Path:

Re: MD5 in openSSL internals

2013-04-24 Thread Viktor Dukhovni
On Wed, Apr 24, 2013 at 03:18:45PM +, Nikola Vassilev wrote: We are currently analyzing and understanding the security strength of the openSSL internal implementation to certify the products. In version 0.9.8d, TLSv1.0 alone is supported. Can you please answer the following or provide me

Re: handling of expired certificates

2013-04-24 Thread Viktor Dukhovni
On Tue, Apr 23, 2013 at 10:17:54AM -0700, Vijaya Venkatachalam wrote: So at the time of openssl connection establishment, the certificate is valid. But while the connection is still up, the certificate expires. The certificate was valid at the time it was verified, this is sufficient. Is the

Re: MD5 in openSSL internals

2013-04-24 Thread Viktor Dukhovni
On Wed, Apr 24, 2013 at 01:55:36PM -0700, d...@deadhat.com wrote: On Wed, Apr 24, 2013 at 03:18:45PM +, Nikola Vassilev wrote: We are currently analyzing and understanding the security strength of the openSSL internal implementation to certify the products. In version 0.9.8d,

Re: Data and Signature (envelope)

2013-04-24 Thread Viktor Dukhovni
On Wed, Apr 24, 2013 at 10:35:04PM -0400, Dave Thompson wrote: I am assuming RSA though I would like to do ECDSA. These APIs will use any privatekey for which a signature scheme is available; that's RSA DSA ECDSA (or pedantically EC; openssl uses the same EC_KEY struct for ECDSA and

Re: Is it possible to configure only TLSv1.2 ciphers for FIPS?

2013-04-26 Thread Viktor Dukhovni
On Thu, Apr 25, 2013 at 04:40:12AM -0700, Cipher wrote: For FIPS work, we are planning to support only TLSv1.2 ciphers. Is there a configuration option to use *only* TLSv1.2 ciphers? You say ciphers here. we are using apache/mod_ssl engine(v 2.2.16). *SSLProtocol* directive does not

Zero length finished messages with resumed sessions?

2013-05-08 Thread Viktor Dukhovni
Has anyone seen the type of problem reported on the postfix-users list today? http://archives.neohapsis.com/archves/postfix/2013-05/0158.html (and earlier posts upthread). TLS handshakes without session resumption succeed, while resumed sessions always fail, with the server sending a

Re: Zero length finished messages with resumed sessions?

2013-05-08 Thread Viktor Dukhovni
On Thu, May 09, 2013 at 12:11:38AM +, Viktor Dukhovni wrote: Has anyone seen the type of problem reported on the postfix-users list today? http://archives.neohapsis.com/archves/postfix/2013-05/0158.html (and earlier posts upthread). TLS handshakes without session resumption

Re: Zero length finished messages with resumed sessions?

2013-05-09 Thread Viktor Dukhovni
On Thu, May 09, 2013 at 05:58:14PM +0200, Dr. Stephen Henson wrote: However disabling TLS extensions in the client does. With no-tlsext, the server does not resume past sessions. Perhaps the server's implementation of session tickets is the culprit. Has anyone else observed such

Re: Zero length finished messages with resumed sessions?

2013-05-09 Thread Viktor Dukhovni
On Thu, May 09, 2013 at 04:54:33PM +, Viktor Dukhovni wrote: So I'm more interested in any leads about which servers are prone to this misbehaviour. Did any past OpenSSL versions mishandle session tickets and acccept the session only to then fail to negotiate correctly (zero length

Re: Zero length finished messages with resumed sessions?

2013-05-09 Thread Viktor Dukhovni
On Thu, May 09, 2013 at 08:13:57PM +0200, Dr. Stephen Henson wrote: One of the servers is: OpenSSL 0.9.9-dev 09 May 2008 built on: NetBSD 5.1_STABLE platform: NetBSD-x86_64 options: bn(64,64) md2(int) rc4(1x,char) des(idx,cisc,4,int) blowfish(idx)

Re: Apply signature to X509 certificate

2013-05-10 Thread Viktor Dukhovni
On Fri, May 10, 2013 at 11:26:35AM -0400, Ken Goldman wrote: a) get the der encoded value of tbsCertificate field b) hash it c) apply pkcs1 padding and sign it d) put the signature on asn1 form e) add NIDs and other parameters to the cert_info field you identified. I spent a lot of time

Re: SSL_CTX_set{_preferred)_cipher_list?

2013-05-10 Thread Viktor Dukhovni
On Fri, May 10, 2013 at 01:00:21PM -0600, Salz, Rich wrote: What is the difference between SSL_CTX_SET_cipher_list and SSL_CTX_set_preferred_cipher_list? Which version of OpenSSL has the preferred version? I don't see this in master. When and why would I use the preferred version? I

Re: Self-signed certificates and keyUsage extension

2013-05-11 Thread Viktor Dukhovni
On Sat, May 11, 2013 at 10:49:40AM +0200, Stefan H. Holek wrote: On 10.05.2013, at 18:48, no_spam...@yahoo.com wrote: openssl verify -check_ss_sig -CAfile ./my-ss-cert.pem ./my-ss-cert.pem I get the following error: error 20 at 0 depth lookup:unable to get local issuer certificate

Re: FIPS Capable Ciphers List

2013-05-14 Thread Viktor Dukhovni
On Wed, May 15, 2013 at 12:58:37AM +, Santhosh Kokala wrote: I have a use case where an admin can configure the Ciphers from UI. I have this code in the backend that tries to set the cipher meth = TLSv1_client_method(); ctx = SSL_CTX_new(meth); sslretval =

Re: FIPS Capable Ciphers List

2013-05-14 Thread Viktor Dukhovni
On Tue, May 14, 2013 at 09:42:08PM -0500, Salz, Rich wrote: Viktor gave some excellent advice. I'd tweak it by removing 'export' as something to support. And perhaps use weak, good, strong -- whatever, keep the number of choices very small. I'd suggest to not use default since folks will

Re: FIPS Capable Ciphers List

2013-05-15 Thread Viktor Dukhovni
On Wed, May 15, 2013 at 01:07:23PM +0200, Jakob Bohm wrote: If the underlying choices need to be configurable, that should generally not be via the UI, rather via a configuration file of some sort. This assumes your users are normal users, not SSL protocol testers who want fine-grained

Re: FIPS Capable Ciphers List

2013-05-15 Thread Viktor Dukhovni
On Wed, May 15, 2013 at 09:59:52AM -0600, Salz, Rich wrote: I was talking about a user interface to specify settings without requiring a rebuild of the applications. And on this, we completely agree :) +1 for no application rebuilds. Hard-coded cipherlists is not what I had mind, if

Re: How to create CSR with SN attribute

2013-05-20 Thread Viktor Dukhovni
On Mon, May 20, 2013 at 05:58:43PM +0200, Per Edlund wrote: Is there a way with openssl to create a key/csr with SN attribute? [dn_req] surname = Smith Likewise with the -subj option use: -subj /surname=Smith. or -subj /SN=Smith. As I can see, only CN, O, OU etc are

Re: Build error with 1.0.1e on Win64 with VC++ 2010 and nasm

2013-05-21 Thread Viktor Dukhovni
On Tue, May 21, 2013 at 10:14:27AM -0600, Phillip Hellewell wrote: Good news, I found the bug! I got thinking, why is x86_64-gf2m the only one giving me a problem? So I compared x86_64-gf2m.pl to the others and found that it has this line: open STDOUT,| \$^X\ $xlate $flavour $output;

Re: [openssl-users] Display CSR w/ subjectAltName

2013-05-23 Thread Viktor Dukhovni
On Thu, May 23, 2013 at 06:12:39PM +0200, Erwann Abalea wrote: Le 23/05/2013 17:41, Craig White a ?crit : I want to be able to view CSR's with subjectAltName's but I can't figure out any way to make it happen. I have poured over the man pages and googled it to death already. openssl req

Callback access to X509_STORE_CTX-untrusted?

2013-06-03 Thread Viktor Dukhovni
I've implemented DANE support for Postfix, but want to make the implementation a bit more robust in the face of possible future changes in OpenSSL. I want to use SSL_CTX_set_cert_verify_callback() to how certificate verification is performed. I need to be able to selectively add/remove from the

Re: Callback access to X509_STORE_CTX-untrusted?

2013-06-04 Thread Viktor Dukhovni
On Mon, Jun 03, 2013 at 11:32:31PM +, Viktor Dukhovni wrote: I want to use SSL_CTX_set_cert_verify_callback() to customize how certificate verification is performed. I need to be able to selectively add/remove from the set of untrusted additional certificates in X509_STORE_CTX

Re: Callback access to X509_STORE_CTX-untrusted?

2013-06-04 Thread Viktor Dukhovni
On Tue, Jun 04, 2013 at 04:38:42PM +0200, Dr. Stephen Henson wrote: Note, to implement DANE, I using 1.0.0 or later only. So if with 1.x.y there is a reasonable expectation that libcrypto versions with the same SONAME don't vary in the offset of the untrusted member in X509_STORE_CTX,

Re: A question on EVP_PKEY_copy_parameters

2013-06-14 Thread Viktor Dukhovni
On Wed, Jun 12, 2013 at 12:02:52PM -0700, anu.engineer wrote: Just before signing the certificate the code executes this fragment pktmp=X509_get_pubkey(ret); if (EVP_PKEY_missing_parameters(pktmp) !EVP_PKEY_missing_parameters(pkey)) EVP_PKEY_copy_parameters(pktmp,pkey);

Re: Authorized_keys

2013-06-16 Thread Viktor Dukhovni
On Sun, Jun 16, 2013 at 09:35:58PM -0400, David Geib wrote: I am trying to implement functionality similar to what ssh does with authorized_keys. I have a list of valid public keys (really public key fingerprints in my case) and I want to verify whether the peer has one of the valid keys.

Re: Is it possible to grab CA certificate?

2013-06-18 Thread Viktor Dukhovni
On Tue, Jun 18, 2013 at 04:50:06PM -0400, Dave Thompson wrote: From: owner-openssl-us...@openssl.org On Behalf Of Carl Young Sent: Tuesday, 18 June, 2013 07:10 Sorry for top-post - webmail :( In TLS, the server should not send the root certificate - it sends the chain up to, but

Re: libssl 1.0.1 breaking program

2013-06-26 Thread Viktor Dukhovni
On Wed, Jun 26, 2013 at 02:57:15PM +0200, Marios Makassikis wrote: By enabling debug information in the program, I was able to obtain these error messages: pppd[2236]: EAP-TLS SSL error stack: pppd[2236]: error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib and

Re: libssl 1.0.1 breaking program

2013-06-26 Thread Viktor Dukhovni
On Wed, Jun 26, 2013 at 05:29:52PM +0200, Marios Makassikis wrote: By enabling debug information in the program, I was able to obtain these error messages: pppd[2236]: EAP-TLS SSL error stack: pppd[2236]: error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib and

Plans for DANE TLSA (RFC 6698) support in 1.0.2?

2013-07-04 Thread Viktor Dukhovni
On the IETF dane mailing list I reported some issues with the initial DANE TLSA implementation in the OpenSSL 1.0.2 development branch. Are there any plans to address these? Who should I reach out to move this forward? http://www.ietf.org/mail-archive/web/dane/current/threads.html#05712 --

PATCH (PR 1766): Don't clear starttls_proto.

2013-07-11 Thread Viktor Dukhovni
From 44a9138f1aa3a815abdf32021cc4c38adfaaef3b Mon Sep 17 00:00:00 2001 From: Viktor Dukhovni postfix-us...@dukhovni.org Date: Thu, 11 Jul 2013 10:33:17 -0400 Subject: [PATCH 1/1] Don't clear starttls_proto. It may be needed for reconnect. See PR1766. --- apps/s_client.c |4 1 file

Re: libssl 1.0.1 breaking program

2013-07-25 Thread Viktor Dukhovni
On Thu, Jul 25, 2013 at 07:08:30PM +0200, Dr. Stephen Henson wrote: openssl verify -CAfile root.pem -untrusted allcerts.pem ee.pem where allcerts.pem is the complete peer chain and ee.pem is the peer certificate. I'd be interested to see what that commands produces for different version. If

Re: BREACH vuln and ciphers

2013-08-06 Thread Viktor Dukhovni
On Tue, Aug 06, 2013 at 09:20:06AM -0500, Rodney Beede wrote: Why can't we get a simplified version of TLS that has only one option of the most secure cipher and isn't vulnerable to things like BEAST, CRIME, or BREACH? These are not TLS problems, these are a special case of cross-site

Re: DLL hell

2013-08-16 Thread Viktor Dukhovni
On Fri, Aug 16, 2013 at 07:17:22AM -0700, Thomas J. Hruska wrote: I think a lot of the init logic heralds from the original SSLeay days. There seems to be intent that initialization is supposed to happen in main() in the application and libraries shouldn't be calling initialization routines

Re: Using X509_verify with various chains.

2013-08-26 Thread Viktor Dukhovni
On Mon, Aug 26, 2013 at 12:29:21PM -0400, Salz, Rich wrote: Suppose I have a three-length chain: rootCA, interCA, userCert. If I call X509_verify with depth 1 and only interCA in the trusted list, will that pass? Yes, with the as yet unreleased 1.0.2 development branch. No with 1.0.1e or

Re: Add SubjAltName to openssl command line?

2013-08-29 Thread Viktor Dukhovni
On Thu, Aug 29, 2013 at 04:38:17PM -0700, Erich Weiler wrote: I was wondering if there was also a way to quickly create a certificate and key file in a similar fashion while also designating SubjAltName options on the openssl command line? The bash script below uses inline command file

Re: Implementing TLSv1.2 protocol

2013-08-30 Thread Viktor Dukhovni
On Fri, Aug 30, 2013 at 09:46:11AM -0400, The Phoenix wrote: I am newbee to openssl stuff. My application just need to run only on TLSv1.2 protocol. Which one is the correct way of implementing it: When you say only, do you mean only this specific version, or TLSv1.2 or later (when someday

OpenSSL prime EDH parameters

2013-09-01 Thread Viktor Dukhovni
In: http://archives.neohapsis.com/archives/postfix/2013-09/0003.html Peer Heinlein reports that some Exim SMTP clients fail to establish a TLS session with Postfix SMTP servers because Exim enforces a minimum prime size of 2048-bits for MODP EDH. My reply in:

Re: OpenSSL prime EDH parameters

2013-09-02 Thread Viktor Dukhovni
On Sun, Sep 01, 2013 at 07:24:24PM +, Viktor Dukhovni wrote: http://archives.neohapsis.com/archives/postfix/2013-09/0003.html Peer Heinlein reports that some Exim SMTP clients fail to establish a TLS session with Postfix SMTP servers because Exim enforces a minimum prime size

Re: OpenSSL prime EDH parameters

2013-09-03 Thread Viktor Dukhovni
On Tue, Sep 03, 2013 at 03:16:06PM +0200, Dr. Stephen Henson wrote: Incidentally, I just noticed the undocumented SSL_CTX_set_tmp_ecdh_callback(), which has the same interface as SSL_CTX_set_tmp_dh_callback(3) and it seems is also called with keylength equal to either 512 or 1024. What

Re: OpenSSL prime EDH parameters

2013-09-03 Thread Viktor Dukhovni
On Tue, Sep 03, 2013 at 04:53:52PM +0200, Dr. Stephen Henson wrote: The SSL_CONF_cmd interface in OpenSSL 1.0.2 and later might be useful too. It's designed to provide a common format for configuration. Thanks, I'll take a look at that when I get a chance. [ I'm still concerned about the

Re: TLS authentication for ldap

2013-09-23 Thread Viktor Dukhovni
On Mon, Sep 23, 2013 at 10:54:04AM -0400, Salz, Rich wrote: Another option is to use LDAP's STARTTLS support on port 389. It seems the config to require it is a bit obscure; http://www.openldap.org/lists/openldap-technical/201202/msg00414.html might be useful. Note, the above is for

Re: TLS authentication for ldap

2013-09-23 Thread Viktor Dukhovni
On Mon, Sep 23, 2013 at 11:27:06AM -0400, Salz, Rich wrote: Note, the above is for enforcing STARTTLS on the server. If the decision is left to the client, the configuration is less opaque. And less secure. :) If policy is to use SSL/TLS, then the server must enforce it; trusting the

Re: possible SSL_connect/accept bug?

2013-09-27 Thread Viktor Dukhovni
On Fri, Sep 27, 2013 at 07:49:06AM -0700, Roger Miller wrote: My initial call to 'connect' was returning 'WSAEWOULDBLOCK' (to be expected on a non-blocking socket). At that point the appropriate thing to do is to select the socket for write in your event loop. Once the socket reports ready

Re: reason behind error message

2013-10-08 Thread Viktor Dukhovni
On Tue, Oct 08, 2013 at 02:52:33PM +0530, Mithun Kumar wrote: I am getting the following error from openssl. Any inputs where things are going wrong? error:140A4044:SSL routines:SSL_clear:internal error int SSL_clear(SSL *s) { if (s-method == NULL) {

Re: Signature did not match the certificate request

2013-10-08 Thread Viktor Dukhovni
On Tue, Oct 08, 2013 at 06:00:39AM -0700, Rahul Tolani wrote: I'm signing a CSR that is generated by Windows Phone. But in that CSR I have a null character in the subject property. You're not signing the CSR, the phone did that, which is why you can't modify it. You're trying to issue a

Re: Strange OpenSSL error when my server accepts a new OpenSSL connection while existing ones are active

2013-10-09 Thread Viktor Dukhovni
On Wed, Oct 09, 2013 at 07:54:34PM -0700, Jeremy Friesner wrote: If you're interested in trying to reproduce the fault yourself, let me know and I can upload the code I'm testing with. Are you using SSL_pending(), BIO_pending() or anything similar anywhere in your code? With SSL sessions

Re: Strange OpenSSL error when my server accepts a new OpenSSL connection while existing ones are active

2013-10-10 Thread Viktor Dukhovni
On Wed, Oct 09, 2013 at 10:46:35PM -0700, Jeremy Friesner wrote: With SSL sessions created via SSLv23_method(), use of this primitive will lead to the failure in question when invoked before the SSL session has switched to SSLv3, TLSv1, ? Aha! Yes, that appears to be my problem. As a

Re: How to retrieve the certificate from remote SMTPS/POP3S mail server and store them locally?

2013-10-21 Thread Viktor Dukhovni
On Sun, Oct 20, 2013 at 02:00:27PM +0100, Michael Zintakis wrote: Viktor Dukhovni wrote: You left out the first three lines of the command which starts with: $ (sleep 2; printf QUIT\r\n) | 2/dev/null \ openssl s_client -showcerts -starttls smtp -connect smtp.gmail.com:587

Re: OpenSSL and DH parameters

2013-10-25 Thread Viktor Dukhovni
On Thu, Oct 24, 2013 at 11:52:36PM -0700, Patrick Pelletier wrote: (For EC, the specified curve must also be acceptable to client(s) per ClientHello extension, which encourages using the callback or choosing a popular curve like P-256.) So, my understanding is that if the tmp_ecdh is set to

Re: OpenSSL and DH parameters

2013-10-25 Thread Viktor Dukhovni
On Fri, Oct 25, 2013 at 06:35:08AM -0700, LN wrote: I mean in a typical usage of OpenSSL is it mandatory to call SSL_CTX_set_tmp_dh() if I call SSL_CTX_use_certificate() and SSL_CTX_use_PrivateKey(). No, this is optional. I know that for RSA keys, for example, the session key exchange is

Re: Differences on output between OpenSSL and CryptoTool

2013-10-28 Thread Viktor Dukhovni
On Mon, Oct 28, 2013 at 11:48:22PM +0100, Luis Rocha wrote: + Filename topsecret.txt which only contains the character 'a' + Encrypt it with DES using CBC mode with key and iv = 0 produces the result '32ea a0fa 4f77 fb92' user@debian:~$ openssl enc -des-cbc -K 0 -iv 0 -nosalt -in

Re: Differences on output between OpenSSL and CryptoTool

2013-10-29 Thread Viktor Dukhovni
On Tue, Oct 29, 2013 at 03:18:44PM +0100, Luis Rocha wrote: In the cryptool I'm only able to introduce the 8 bytes key and not the IV. The documentation from CrypTool says CBC mode is used with zero initialization vector and X.923 padding. user@debian:~$ openssl enc -des-cbc -K

Re: Differences on output between OpenSSL and CryptoTool

2013-10-29 Thread Viktor Dukhovni
On Tue, Oct 29, 2013 at 03:54:50PM +0100, Luis Rocha wrote: The X.923 padding attaches to a complete message block another block of zeros: A = 00 00 00 00 00 00 00 00 I would expect the last padding byte to be 08, not 00, since 8 padding bytes were added. PKCS#7 padding for the same complete

Re: Differences on output between OpenSSL and CryptoTool

2013-10-29 Thread Viktor Dukhovni
On Tue, Oct 29, 2013 at 05:26:39PM +0100, Luis Rocha wrote: btw a interesting phenomenon where encrypting with the same key reveals the plaintext. There are two such keys among the 4 weak DES keys: 0101010101010101 fefefefefefefefe 1f1f1f1f1f1f1f1f e0e0e0e0e0e0e0e0

Re: Signature Algorithm that was disabled because that algorithm is not secure

2013-10-30 Thread Viktor Dukhovni
On Wed, Oct 30, 2013 at 06:13:51PM +, Paul Suhler wrote: Note that SHA-1 is being deprecated by NIST for generating new signatures. You may want to consider a SHA-2 algorithm (e.g., SHA-224 or SHA-256). In principle it's still okay to *validate* legacy signatures, e.g., SHA-1.

Re: SSL/TLS encryption algorithms

2013-11-01 Thread Viktor Dukhovni
On Fri, Nov 01, 2013 at 09:56:10PM +0100, Walter H. wrote: Which one of the following two is better (1) or (2)? (1) SSL_CIPHER=DHE-RSA-CAMELLIA256-SHA $ openssl ciphers -v DHE-RSA-CAMELLIA256-SHA DHE-RSA-CAMELLIA256-SHA SSLv3 Kx=DH Au=RSA Enc=Camellia(256) Mac=SHA1 (2)

Re: SSL/TLS encryption algorithms

2013-11-01 Thread Viktor Dukhovni
$ openssl ciphers -v DHE-RSA-CAMELLIA256-SHA DHE-RSA-CAMELLIA256-SHA SSLv3 Kx=DH Au=RSA Enc=Camellia(256) Mac=SHA1 $ openssl ciphers -v AES128-SHA256 AES128-SHA256 TLSv1.2 Kx=RSA Au=RSA Enc=AES(128) Mac=SHA256 Does your application need to

Re: SSL/TLS encryption algorithms

2013-11-03 Thread Viktor Dukhovni
On Sun, Nov 03, 2013 at 06:18:38PM +0100, Walter H. wrote: how would I define forward-secrecy on Apache webserver? If the server negotiated both ciphers, it already supports forward-secrecy (aka PFS) if the client does too. What about a browser that shows this SSL_CIPHER=RC4-MD5

Re: ssl handshake failure in 1.0.1 but not 1.0.0

2013-11-07 Thread Viktor Dukhovni
On Thu, Nov 07, 2013 at 12:29:13PM +, Ben Arnold wrote: I am using SSL_CTX_set_client_cert_cb to provide the client certificate when needed. I have a problem in that OpenSSL 1.0.1e does not trigger this callback for all websites that I expect it to, only some. Instead on the failing

Re: sha256, was RE: SSL_set_msg_callback for application_data(23)

2013-11-07 Thread Viktor Dukhovni
On Thu, Nov 07, 2013 at 03:51:38PM -0500, Dave Thompson wrote: To support the (four original) SHA-2 hashes as such, yes. But: if you want to sign (and I think verify?) SHA2 and DSA or ECDSA, you need the new signature/hash mechanism in 1.0.0, and if you want TLSv1.2 suites using

Re: EC private key generation problem

2013-11-08 Thread Viktor Dukhovni
On Fri, Nov 08, 2013 at 01:37:21PM +0200, Serhat Sevki Dincer wrote: On windows 7 with OpenSSL 1.0.1e, I get the following output: $ openssl.exe genpkey -out priv.pem -aes128 -algorithm EC -pkeyopt ec_paramgen_curve:secp224r1 parameter setting error 3512:error:06089094:digital envelope

Re: EC private key generation problem

2013-11-08 Thread Viktor Dukhovni
On Fri, Nov 08, 2013 at 01:37:21PM +0200, Serhat Sevki Dincer wrote: what's the correct commandline? You can alternatively generate ec keys with ecparam(1): $ umask 077 $ openssl ecparam -genkey -name prime256v1 | openssl pkey -aes128 -out priv.pem -- Viktor.

  1   2   3   4   5   6   7   8   9   10   >