Thanks Dave, Eric and jeffrey. I would truly be lost without your help!
:confused:

Im not sure how I would be able to encode/decode files before transmission
Dave. Would it be possible to encode them using OAEP before transmission?

I am an novice and Im not 2 sure how I can utilise your advice you have
given me correctly. So below is my step by step process I would personally
use to create a key and certificate file for use in apache2. How could these
steps be modified to include encryption using more secure padding (OAEP if
possible)? I want to if possible encrypt the connection without the hassle
of encrypting files then transmitting them. PS I am using Linux/Ubuntu as my
operating system

If this is not a feasible solution then I shall stand corrected. If so I
would need help to know how to encrypt selected files.

Again thanks in advance for any feedback I receive from you.

******************************************************************************************************************************************
// Build Self CA key 
1. 
sudo openssl genrsa -des3 -out ca.key 1024

// Build Self CA certificate . Note [x] is the duration of days you wish
your CA certificate to last. 
2. 
sudo openssl req -new -x509 -days [x] -key ca.key -out ca.crt

// One Key file = ca.key | One certificate file = ca.crt

        * Enter Country Code
        * Enter Region
        * Enter City
        * Enter Organisation Name
        * Enter Section
        * Enter Common Name + "CA"
        * Enter Email Address
        * Enter Passphrase 


// Build SSL Server key 
3. 
sudo openssl genrsa -des3 -out server.key 1024

// Build SSL Server certificate. Note - IT IS IMPORTANT YOU REMEMBER YOUR
PASSPHRASE CREATED IN STEPS 2 AND 4.
4. 
sudo openssl req -new -key server.key -out server.csr

// One Key file = server.key | One certificate file = server.crt

        * Enter Country Code
        * Enter Region
        * Enter City
        * Enter Organisation Name
        * Enter Section
        * Enter Common Name + "CA"
        * Enter Email Address
        * Enter Passphrase 
                
        * Enter Organisation Name

// 
5. 
sudo openssl x509 -req -days [x] -in server.csr -CA ca.crt -CAkey ca.key
-set_serial 01 -out server.crt

// Enable SSL Module
6. 
sudo a2enmod ssl

******************************************************************************************************************************************





Eric S. Eberhard-2 wrote:
> 
> I would point out in that last approach -- encrypting and sending un 
> secure (which is a good idea in many cases) does have a few 
> considerations.  If the data is sensitive (like magnetic strip data 
> from a credit card) this is completely NOT ALLOWED.  PCI and PA-DSS 
> won't allow it to hit the disk.  If you do hit the disk and you care 
> about security on either end, you also need a secure delete 
> program.  Simply deleting a file does not remove the data from the 
> disk.  It takes about 5 lines of C to make a secure delete which if 
> anyone likes I can give them.
> 
> Eric
> 
> 
> At 08:44 PM 6/6/2011, Dave Thompson wrote:
>> > From: owner-openssl-us...@openssl.org On Behalf Of greenelephant
>> > Sent: Sunday, 05 June, 2011 05:20
>>
>> > Thanks for the reply Dave. I am grateful for your advice. I
>> > am a novice as you have probably gathered.
>> > If I am not wrong in my judgement you seem to have some expertise on
>> > cryptology.
>>
>>Some, not a whole lot.
>>
>> > I have stated SSL in my first post that I would like help
>> > with as you know.
>> > But with your expertise is there a better solution to use
>> > except SSL in
>> > terms of security using openssl?
>>
>>SSL/TLS (preferably the newest version supported, today
>>usually TLS 1.1 or maybe 1.2) is a good general solution
>>for security of Internet endpoint communication
>>(particularly, but not only, web traffic using HTTPS).
>>OpenSSL is a good implementation of SSL/TLS, plus some
>>related (crypto) functionality, but not the only one;
>>any other conforming and well-tested implementation
>>available to you should be fine. For examples, Java
>>includes its own SSL/TLS implementation (for Java),
>>and I understand dot-NET does (for C#, VB, etc.)
>>
>>There are other protocols that may be better in specific
>>situations (e.g. SSH as below) or necessary (e.g. IPsec
>>and DNSsec are done at a level below where SSL can work).
>>
>> > Also is SSL an ideal security solution for secured FTP
>> > transmissions using
>> > the openssl module to enable me to subvert any efforts to
>> > sabotage or breach
>> > security perpetrated by intruders or hackers using the
>> > methods of attacks
>> > (side channeling  for instance) previously mentioned?
>>
>>FTP over SSL (FTPS) is a secure means of file transfer,
>>if supported by both your server(s) and your client(s),
>>which in my experience is not very common. When it is
>>supported, the server and client code determines what
>>module is used; it might be OpenSSL or something else.
>>
>>Another good and in my experience more common method
>>of securing file transfer is SFTP, part of the SSH
>>protocol suite. The crypto used in SSH is generally
>>similar (though not identical) to SSL/TLS, and in fact
>>the most widespread implementation OpenSSH uses libcrypto
>>from OpenSSL, but the trust model is different (simpler).
>>Instead of creating and verifying certificates, SSH
>>requires you to manually verify a key fingerprint on
>>the first connection between a given client and server
>>(or else manually pre-transfer the encoded publickey).
>>This isn't very good for communications with strangers
>>(like sites you found on Google), but works okay for
>>people that already have some contact (like your friends,
>>customers of your company, etc).
>>
>>Another approach is to secure the files themselves,
>>rather than just the transfer. That is, encrypt and
>>perhaps sign the files when (or before) they are
>>placed on the sending system(s), transfer them
>>using plain FTP or HTTP or other, and decrypt and
>>perhaps verify them on the receiving system(s).
>>
>>
>>
>>______________________________________________________________________
>>OpenSSL Project                                 http://www.openssl.org
>>User Support Mailing List                    openssl-users@openssl.org
>>Automated List Manager                           majord...@openssl.org
> 
> 
> Eric S. Eberhard
> (928) 567-3727          Voice
> (928) 567-6122          Fax
> (928) 301-7537                           Cell
> 
> Vertical Integrated Computer Systems, LLC
> Metropolis Support, LLC
> 
> For Metropolis support and VICS MBA Support!!!!    http://www.vicsmba.com
> 
> Pictures of Snake in Spring
> 
> http://www.facebook.com/album.php?aid=115547&id=1409661701&l=1c375e1f49
> 
> Pictures of Camp Verde
> 
> http://www.facebook.com/album.php?aid=12771&id=1409661701&l=fc0e0a2bcf
> 
> Pictures of Land Cruiser in Sedona
> 
> http://www.facebook.com/album.php?aid=50953&id=1409661701
> 
> Pictures of Flagstaff area near our cabin
> 
> http://www.facebook.com/album.php?aid=12750&id=1409661701
> 
> Pictures of Cheryl in a Horse Show
> 
> http://www.facebook.com/album.php?aid=32484&id=1409661701
> 
> 
> Pictures of the AZ Desert
> 
> http://www.facebook.com/album.php?aid=58827&id=1409661701
> 
> (You can see why we love this state :-) )
> 
> 
> 
> 
> 
> 
> 
> 
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           majord...@openssl.org
> 
> 

-- 
View this message in context: 
http://old.nabble.com/Using-PCKS-Padding-in-OpenSSL-tp31728673p31829449.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to