OpenSSL 3.0.0 beta1 link issues on Solaris 10

2021-07-25 Thread Dennis Clarke via openssl-users
and the library search path however that resulted in a pile of undefined symbols. So then I went and deleted my previous 1.1.1k libs and the openssl binary and tried the manual link once again with success. Not sure if anyone else runs into this but I would hope that the previous libs would not be

Dynamic CRL not working when signed by intermediate CA

2021-07-23 Thread Venkata Mallikarjunarao Kosuri via openssl-users
Hi, Dynamic CRL not working when signed by intermediate CA when ca-file (Trusted CA certs bundle) includes only the intermediate CA that signed the CRL. Causing to this the handshake is failing, is there a way to avoid in OpenSSL 1.0.2s-fips 28 May 2019? Br, Malli

Re: query on key usage OIDs

2021-07-16 Thread Jakob Bohm via openssl-users
Question was how to retrieve those lists for any given certificate, using currently supported OpenSSL APIs. The lists of usage bits and extusage OIDs in any given certificate are finite, even if the list of values that could be in other certificates is infinite. On 2021-07-16 06:44, Kyle

Time for OpenSSL 1.1.1l?

2021-07-07 Thread Short, Todd via openssl-users
The cadence of 1.1.1 release is supposed to be quarterly (I seem to recall reading that somewhere, but I can't find it)? It has been almost 4 months since 1.1.1k (25-March-2021) was released. Are there any plans for 1.1.1l (ell)? -- -Todd Short // tsh...@akamai.com // “One if by land, two if by

Re: email notice [was: Not getting some macros for FIPS]

2021-07-01 Thread Jakob Bohm via openssl-users
orporate filter that automagically adds those. And oh boy! openssl-users having almost 3000 subscribers, that's quite a lot of people to chase down and ensure they have destroyed all copies, I tell ya! "Good luck" is probably an appropriate response ;-) Which is why I have set

Re: openssl 1.1.1k: missing d2i_X509 function prototype

2021-06-30 Thread Konstantin Boyandin via openssl-users
On 01.07.2021 08:04, Viktor Dukhovni wrote: > On Thu, Jul 01, 2021 at 12:36:10AM +, Konstantin Boyandin via openssl-users wrote: > >> OpenSSL version: 1.1.1k. >> >> I noticed that >> >> X509 *d2i_X509(X509 **px, const unsigned char **in, long len); &g

openssl 1.1.1k: missing d2i_X509 function prototype

2021-06-30 Thread Konstantin Boyandin via openssl-users
Hello, OpenSSL version: 1.1.1k. I noticed that X509 *d2i_X509(X509 **px, const unsigned char **in, long len); function is no longer defined in openssl/x509.h available in 1.0.x versions, the only one available is now X509 *d2i_X509_AUX(X509 **a, const unsigned char **pp, long length); Do I

Hi

2021-06-29 Thread Jean Sweeny via openssl-users

Re: "Expecting: ANY PRIVATE KEY"

2021-06-28 Thread Mariano Gedisman-Córdoba via openssl-users
> On 28.06.2021, at 01:02, Michel wrote: > > Hi Mariano, > > My quick answer : your key file looks like an (old ?) custom *OpenSSH* format > that *OpenSSL* cannot read natively. > You should easily find an OpenSSH command or other free tools to converts > between for

"Expecting: ANY PRIVATE KEY"

2021-06-27 Thread Mariano Gedisman-Córdoba via openssl-users
log in to my Google cloud instance through browser console, and I get the following error: "Error: Failed to read key. The key file must be ECDSA or RSA in PEM format. " I googled how to achieve this, and tried the following on my local machine: $ openssl rsa -in id_rsa.txt -out

Re: Can OpenSSL handle multiple authentication mechanisms on the same SSL context?

2021-06-21 Thread Benjamin Kaduk via openssl-users
On Tue, Jun 22, 2021 at 04:18:25AM +, Revestual, Raffy [AUTOSOL/PSS/MNL] wrote: > Also asked this question in stackoverflow.com > > https://urldefense.com/v3/__https://stackoverflow.com/questions/68077419/can-openssl-handle-multiple-authentication-mechanisms-on-the-same-ssl-

Re: 3.0 beta1 feedback about (shared) library names

2021-06-21 Thread Benjamin Kaduk via openssl-users
dpkg -S /usr/lib/x86_64-linux-gnu/libssl3.so > libnss3:amd64: /usr/lib/x86_64-linux-gnu/libssl3.so > something up there that should be concerning, because maybe it will cause > confusion. NSS is the mozilla TLS stack, used by firefox/etc. > My newly installed openssl 3 has: > > %ls

Re: reg: question about SSL server cert verification

2021-06-19 Thread Jakob Bohm via openssl-users
On 2021-06-18 17:07, Viktor Dukhovni wrote: On Fri, Jun 18, 2021 at 03:09:47PM +0200, Jakob Bohm via openssl-users wrote: Now the client simply works backwards through that list, checking if each certificate signed the next one or claims to be signed by a certificate in /etc/certs.  This

Re: reg: question about SSL server cert verification

2021-06-18 Thread Jakob Bohm via openssl-users
On 2021-06-18 16:23, Michael Wojcik wrote: From: openssl-users On Behalf Of Jakob Bohm via openssl-users Sent: Friday, 18 June, 2021 07:10 To: openssl-users@openssl.org Subject: Re: reg: question about SSL server cert verification On 2021-06-18 06:38, sami0l via openssl-users wrote: I&#

Re: reg: question about SSL server cert verification

2021-06-18 Thread Jakob Bohm via openssl-users
On 2021-06-18 06:38, sami0l via openssl-users wrote: I'm curious how exactly an SSL client verifies an SSL server's certificate which is signed by a CA. So, during the SSL handshake, when the server sends its certificate, will the SSL client first checks the `Issuer`'s `CN` fiel

reg: question about SSL server cert verification

2021-06-17 Thread sami0l via openssl-users
I'm curious how exactly an SSL client verifies an SSL server's certificate which is signed by a CA. So, during the SSL handshake, when the server sends its certificate, will the SSL client first checks the `Issuer`'s `CN` field from the x509 SSL certificate that it received for example, and comp

Re: openssl verify question

2021-06-17 Thread Jakob Bohm via openssl-users
On 2021-06-17 15:49, Viktor Dukhovni wrote: On Sat, Jun 12, 2021 at 10:20:22PM +0200, Gaardiolor wrote: When I compare those, they are exactly the same. But that's the thing, I think server.sig.decrypted should be prepended with a sha256 designator 30 31 30 0d 06 09 60 86 48 01 65 03 04 02 01 0

Re: using the DSA signature algorithm of OpenSSL

2021-06-14 Thread Elmar Stellnberger via openssl-users
Oops, forgot to sha1; now it works. Am 14.06.21 um 11:20 schrieb Elmar Stellnberger via openssl-users:   I wanna use the DSA signature algorithms of OpenSSL to verify RRSIG and DNSKEY DNSSEC resource records. This is described in RFC2536 (a very short RFC).   As far as I could try it out

using the DSA signature algorithm of OpenSSL

2021-06-14 Thread Elmar Stellnberger via openssl-users
I wanna use the DSA signature algorithms of OpenSSL to verify RRSIG and DNSKEY DNSSEC resource records. This is described in RFC2536 (a very short RFC). As far as I could try it out (see my attachement) there are two ways to sign and verify with OpenSSL/DSA: via the EVP interface and via

Re: enforce ALPN overlap?

2021-06-09 Thread Jan Schaumann via openssl-users
Jan Schaumann via openssl-users wrote: > New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Same for TLS 1.2, btw. (I accidentally copied the default output when writing the email.) -Jan

enforce ALPN overlap?

2021-06-09 Thread Jan Schaumann via openssl-users
Hello, Based on https://alpaca-attack.com/, I was looking at how a TLS connection with ALPN set to e.g., "banana" by the client to a server that has ALPN set to "h2" would behave. For example: $ openssl s_server -www -accept 443 -alpn h2 \ -key /tmp/key.pem -cer

Best practice for distributions that freeze OpenSSL versions and backports

2021-06-08 Thread Jakob Bohm via openssl-users
Dear team, It would be nice if there was a user- and security-friendly best practice document for distributions (such as Linux distributions) that freeze on an OpenSSL release version (such as 1.1.1z) and then backport any important fixes. Perhaps something like the following: 1. The

Checking a single signature from several in S/MIME

2021-06-08 Thread Laurent Blume via openssl-users
er, not all of them? // Signing openssl smime -binary -sign -nodetach -in file -out file.signed -inkey key1.pem -signer cert1.pem -inkey key2.pem -signer cert2.pem // this command fails with signer certificate not found" openssl smime -binary -verify -nointern -noverify -certfile cert

Re: FW: X509_verify_cert() rejects all trusted certs with "default" X509_VERIFY_PARAM

2021-06-01 Thread Jakob Bohm via openssl-users
h "default" X509_VERIFY_PARAM From: openssl-users On Behalf Of Graham Leggett via openssl-users Sent: Friday, 28 May, 2021 06:30 I am lost - I can fully understand what the code is doing, but I can’t see why openssl only trusts certs with “anyExtendedKeyUsage”. Interesting. I wondered if thi

RE: Why can't we get a proper installation method to keep OpenSSL at the latest revision for Linux?

2021-05-31 Thread Michael McKenney via openssl-users
I have never had a break in. The Fortinet 60E firewall does an amazing job. I will just leave it up to Ubuntu to provide the best OpenSSL solutions. Many people complain Ubuntu LTS is never on the latest kernel and lacks other things the 9 month distros like 21.04 and 21.10 give you.I

RE: Why can't we get a proper installation method to keep OpenSSL at the latest revision for Linux?

2021-05-31 Thread Michael McKenney via openssl-users
cryptology.The OpenSSL bugs state to upgrade beyond 1.1.1f. -Original Message- From: openssl-users On Behalf Of Mauricio Tavares Sent: Monday, May 31, 2021 7:45 AM To: openssl-users@openssl.org Subject: Re: Why can't we get a proper installation method to keep OpenSSL at the l

RE: Why can't we get a proper installation method to keep OpenSSL at the latest revision for Linux?

2021-05-31 Thread Michael McKenney via openssl-users
Keijser ; openssl-users@openssl.org Subject: Re: Why can't we get a proper installation method to keep OpenSSL at the latest revision for Linux? If you use a supported distro (i.e., one that is not out of life) then the distro is expected to supply CVE issue fixes in form of updates. They us

RE: Why can't we get a proper installation method to keep OpenSSL at the latest revision for Linux?

2021-05-31 Thread Michael McKenney via openssl-users
My wordpress servers are under constant attack. My Fortinet 60E firewall logs are filled. Openssl is constantly reported on The Hacker News and other sites. So I don't need to worry about upgrading OpenSSL in the future to 1.1.1k or above? I can just use what the distro has to off

X509_verify_cert() rejects all trusted certs with "default" X509_VERIFY_PARAM

2021-05-28 Thread Graham Leggett via openssl-users
b.com/openssl/openssl/blob/master/crypto/x509/x509_trs.c#L72 int X509_check_trust(X509 *x, int id, int flags) { X509_TRUST *pt; int idx; /* We get this as a default value */ if (id == X509_TRUST_DEFAULT) return obj_trust(NID_anyExtendedKeyUsage, x,

Re: Support for ECDH One-pass in "openssl cms enc"

2021-05-24 Thread Henning Krause via openssl-users
Hi, after studying the different key generator functions more closely I came to the conclusion that, since the Prime256 curve has a cofactor of 1, both KDF should produce the same value and so everything has cleared up. Kind regards, Henning From: openssl-users

Support for ECDH One-pass in "openssl cms enc"

2021-05-23 Thread Henning Krause via openssl-users
Hi, I'm trying to encrypt an email using the ECDH One-Pass algorithm. I've first created an X509 certificate with an EDSA key based on the curve prime256v1. Then, I ran this command: openssl cms -encrypt -in Unencrypted.eml -binary -recip ecc.cer -aes256 -keyopt ecdh_kdf_md:sha2

Re: I installed Openssl 1.1.1k and Ubuntu 20.04 did an upgrade and reverted it back to 1.1.1f. Usually Ubuntu upgrades don’t break it.

2021-05-21 Thread Jakob Bohm via openssl-users
of the following diagnostic commands (after Ubuntu apparently undid your upgrade). $ dpkg --status libssl1.1 $ dpkg --status libssl-dev $ dpkg --status openssl $ type openssl $ openssl version -a $ ls -alF /usr/lib/x86_64-linux-gnu/libssl* $ ls -alF /usr/locallib/libssl* Oops, my bad, should have

Secure Heap Usage for EC private key

2021-05-21 Thread Barry Fussell (bfussell) via openssl-users
Long shot if someone may know. Secure heap was added long ago for private keys for RSA, DSA and DH however EC key generation does not seem to be included. I see some other EC functions that use secure heap and I also noticed that the CHANGES file stated: "Add secure heap for storage of private k

Re: I installed Openssl 1.1.1k and Ubuntu 20.04 did an upgrade and reverted it back to 1.1.1f. Usually Ubuntu upgrades don’t break it.

2021-05-21 Thread Jakob Bohm via openssl-users
On 2021-05-19 19:56, Michael McKenney wrote: I installed Openssl 1.1.1k and Ubuntu 20.04 did an upgrade and reverted it back to 1.1.1f.   Usually Ubuntu upgrades don’t break it. OpenSSL 1.1.1f  31 Mar 2020 (Library: OpenSSL 1.1.1k  25 Mar 2021) built on: Thu Apr 29 14:11:04 2021 UTC

OpenSSL version 3.0.0-alpha17 published

2021-05-20 Thread OpenSSL
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 OpenSSL version 3.0 alpha 17 released = OpenSSL - The Open Source toolkit for SSL/TLS https://www.openssl.org/ OpenSSL 3.0 is currently in alpha. OpenSSL 3.0 alpha 17 has now been made

SHA digest differences in version 1.0 and 1.1.1

2021-05-14 Thread openssl . org
Hi, I am working with some legacy code which was written to use openssl version 1.0. I am trying to make it work with openssl version 1.1.1 but the following line returns NULL.     const EVP_MD* messageDigest = EVP_get_digestbyname("sha"); I changed it to the following.     co

OpenSSL version 3.0.0-alpha16 published

2021-05-06 Thread OpenSSL
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 OpenSSL version 3.0 alpha 16 released = OpenSSL - The Open Source toolkit for SSL/TLS https://www.openssl.org/ OpenSSL 3.0 is currently in alpha. OpenSSL 3.0 alpha 16 has now been made

Switch hangs for significant amount of time when using RAND_write_file API with openssl version 1.1.1h and above.

2021-05-06 Thread Sravani Maddukuri via openssl-users
Hi, I have updated the openssl version running on the switch from 1.1.1g to 1.1.1h and eventually to 1.1.1k. Starting 1.1.1h, I am observing that the switch hangs for a significant amount of time (> 3 minutes) when the call RAND_write_file is invoked from the switch software. The same c

Request Assistance::No X509TrustManager implementation available

2021-04-30 Thread K V Rao via openssl-users
Dear Sir/Madam, Greetings for the day! We have provided an application which invokes https URL. App server used is TOMCAT. The team who administers the application installed certificates under CACERTS. The certificate is available in a .JKS file. Now the application works well for some

Re: Linker failure after compilation with "enable-crypto-mdebug"

2021-04-28 Thread Robert Smith via openssl-users
M EDT, Jan Just Keijser wrote: Hi, On 26/04/21 20:29, Robert Smith via openssl-users wrote: Hello everyone. I'm trying to recompile OpenSSL version 1.1.1k under Windows 10 with the following configuration flag enable-crypto-mdebug and getting the following linker error:

Linker failure after compilation with "enable-crypto-mdebug"

2021-04-26 Thread Robert Smith via openssl-users
Hello everyone. I'm trying to recompile OpenSSL version 1.1.1k under Windows 10 with the following configuration flag enable-crypto-mdebug and getting the following linker error:    Creating library apps\openssl.lib and object apps\openssl.expopenssl.obj : error LNK2019: unresolved ext

OpenSSL version 3.0.0-alpha15 published

2021-04-22 Thread OpenSSL
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 OpenSSL version 3.0 alpha 15 released = OpenSSL - The Open Source toolkit for SSL/TLS https://www.openssl.org/ OpenSSL 3.0 is currently in alpha. OpenSSL 3.0 alpha 15 has now been made

req command with -multivalue-rdn set

2021-04-19 Thread Alberto Martin via openssl-users
I'm trying to create a certificate request with a multivalue RDN which involves CN+UID. I achieved the encoded multi-value RDN, but I want the UID being encoded first and then the CN. I always get the CN first, no matter what I put in the -subj "/CN=value+UID=value" or "/UID=value+CN=value". Changi

Re: OpenSSL 3.0 - providing entropy to EVP_RAND ?

2021-04-16 Thread Bala Duvvuri via openssl-users
/implementations/rands/test_rng.c and the code to run NIST test. Still finding it a bit difficult to wrap around these new APIs In the old implementation using OpenSSL 1.1.1, to generate random numbers: a> we have set the callback for custom entropy (using RAND_DRBG_set_callbacks) for

Re: PKCS7_decrypt vs RSA OAEP padding

2021-04-15 Thread Jakob Bohm via openssl-users
On 2021-04-15 12:57, Michal Moravec wrote: Follow-up on my previous email: I modified my proof-of-problem program to load PKCS7 file into PKCS7 and convert it to CMS_ContentInfo using the BIO (See convert.c in the attachment). It is similar to this: handle_encrypted_content(SCEP *handle, SC

Re: OpenSSL 3.0 - providing entropy to EVP_RAND ?

2021-04-14 Thread Bala Duvvuri via openssl-users
s invoked for the entropy/nonce consumption (any specific callbacks set)? Can you please explain the steps or example of the usage? 2> Also, we need set DRBG for CAVS test (Input: EntropyInput, Nonce, PersonalizationString, AdditionalInput, EntropyInputPR, AdditionalInput, EntropyInputPR),

Strange warnings while linking to openssl version 1.1.1k

2021-04-12 Thread Robert Smith via openssl-users
Hi, I am getting the following warning while linking my app to openssl version 1.1.1k. Could you advise what can cause these warnings and how to resolve them? Thanks ../../../artifacts/openssl/arm3531/lib/libcrypto.a(async_posix.o): In function `ASYNC_is_capable': async_posix.c:(.text

Re: Symbols X509_set_notAfter and X509_set_notBefore are missing

2021-04-09 Thread Robert Smith via openssl-users
te.cpp:202: undefined reference to `X509_set_notAfter' Any idea? On Friday, April 9, 2021, 04:13:32 PM EDT, Benjamin Kaduk wrote: They are macros now.  You should still be able to build code that uses them. -Ben On Fri, Apr 09, 2021 at 08:03:28PM +, Robert Smith via openssl-users wrot

Re: Symbols X509_set_notAfter and X509_set_notBefore are missing

2021-04-09 Thread Benjamin Kaduk via openssl-users
They are macros now. You should still be able to build code that uses them. -Ben On Fri, Apr 09, 2021 at 08:03:28PM +, Robert Smith via openssl-users wrote: > Hello, > I am porting application from openSSL version 1.0.2u to 1.1.1k and linker > complaints that symbols X509_set_not

Symbols X509_set_notAfter and X509_set_notBefore are missing

2021-04-09 Thread Robert Smith via openssl-users
Hello, I am porting application from openSSL version 1.0.2u to 1.1.1k and linker complaints that symbols X509_set_notAfter and X509_set_notBefore are missing. I've checked both versions 1.0.2u and 1.1.1k and I see that these symbols really are not present in 1.1.1k.  user@ubuntu_dev_vm:~/

OpenSSL version 3.0.0-alpha14 published

2021-04-08 Thread OpenSSL
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 OpenSSL version 3.0 alpha 14 released = OpenSSL - The Open Source toolkit for SSL/TLS https://www.openssl.org/ OpenSSL 3.0 is currently in alpha. OpenSSL 3.0 alpha 14 has now been made

Compilation issue with 1.1.1k version

2021-04-07 Thread Boris Shpoungin via openssl-users
Hello, I am using cross compiler toolchain (arm-hisiv200-linux-gnueabi) to compile openssl library for arm based custom board. I had no problems to compile version 1.1.1a, however I am having troubles to compile versions 1.1.1i and 1.1.1k: ${LDCMD:-arm-hisiv200-linux-gnueabi-gcc} -pthread -Wa

Re: Using SSL_CTX_set_min_proto_version

2021-04-07 Thread Tamara Kogan via openssl-users
> From: Matt Caswell > Subject: Re: Using SSL_CTX_set_min_proto_version > Date: April 6, 2021 at 2:13:02 PM EDT > To: openssl-users@openssl.org > > > On 06/04/2021 18:45, Tamara Kogan via openssl-users wrote: >> Hello, >> In our client application we are try

Using SSL_CTX_set_min_proto_version

2021-04-06 Thread Tamara Kogan via openssl-users
Hello, In our client application we are trying to set TLS 1.2 in ClientHello message. The OpenSSL version is 1.1.1h We use the function SSL_CTX_set_min_proto_version(ssl->ctx, TLS1_2_VERSION); If I test the version right after setting it does return 1.2 SSL_CTX_get_proto_version(ssl-&

stunnel 5.59 released

2021-04-05 Thread Michał Trojnara via openssl-users
Dear Users, I have released version 5.59 of stunnel. ### Version 5.59, 2021.04.05, urgency: HIGH * Security bugfixes   - OpenSSL DLLs updated to version 1.1.1k. * New features   - Client-side "protocol = ldap" support (thx to Bart     Dopheide and Seth Grover). * Bugfixes   - The

Re: Porting to version 1.1.1 with old Linux kernel 3.0.8

2021-04-05 Thread Boris Shpoungin via openssl-users
er it describes ALL required modification? On Monday, April 5, 2021, 03:57:36 PM EDT, Viktor Dukhovni wrote: > On Apr 5, 2021, at 11:16 AM, Boris Shpoungin via openssl-users > wrote: > > Is there minimal requirements for Linux kernel for usage of openssl library > versio

Porting to version 1.1.1 with old Linux kernel 3.0.8

2021-04-05 Thread Boris Shpoungin via openssl-users
Hello, Is there minimal requirements for Linux kernel for usage of openssl library version 1.1.1? I have old application based on Linux kernel 3.0.8 which uses openssl version 1.0.2. My question is whether it is possible to port this application to use openssl version 1.1.1 in Linux 3.0.8

Australia's DTCA/DSGL Criminalisation of Encryption based Technologies.

2021-03-30 Thread openssl
...I do actually have Australian Department of Defence, Defence Export Control, approval for FooStegCypher.   FooCrypt.6.0.0.Core provides you with the total peace of mind over the SECURITY & PRIVACY of YOUR DATA. FooCrypt.6.0.0.OpenSSL utilises OpenSSL 1.1.1(a-k) & 3.0.0.Alpha13

Unable to load the FIPs config file OpenSSL 3.0

2021-03-30 Thread Bala Duvvuri via openssl-users
ail:crypto/provider_core.c:557:name=fips 00FFF2406000:error:076D:configuration file routines:(unknown function):module initialization error:crypto/conf/conf_mod.c:242:module=providers, value=provider_sect retcode=-1 Version: OpenSSL 3.0.0-alpha13 11 Mar 2021 ~ # ls -lrt providers/ -rwxrwxrwx

FIPs algorithm code vs default implementation

2021-03-28 Thread Bala Duvvuri via openssl-users
Hi All, This is a basic question regarding FIPs algorithm code in OpenSSL 3.0, can you kindly let me know: 1> Can you please help to understand the differences in the FIPs algorithm implementation code vs default? Are there additional validations performed in FIPs code? Can

libcrypto.a and FIPs module in OpenSSL 3.0

2021-03-26 Thread Bala Duvvuri via openssl-users
Hi All, We build the "crypto" code in OpenSSL to generate "libcrypto.a" for MIPs platform. Our application links statically with "libcrypto.a" and uses the OpenSSL crypto API's accordingly. With this compilation model, will it be feasible to integrate with

OpenSSL Security Advisory

2021-03-25 Thread OpenSSL
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 OpenSSL Security Advisory [25 March 2021] = CA certificate check bypass with X509_V_FLAG_X509_STRICT (CVE-2021-3450) Severity: High

OpenSSL version 1.1.1k published

2021-03-25 Thread OpenSSL
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 OpenSSL version 1.1.1k released === OpenSSL - The Open Source toolkit for SSL/TLS https://www.openssl.org/ The OpenSSL project team is pleased to announce the release of version 1.1.1k of our open

OpenSSL 3.0 - providing entropy to EVP_RAND ?

2021-03-23 Thread Bala Duvvuri via openssl-users
Hi All, In OpenSSL 1.1.1 version, we were using RAND_DRBG for random number generation. Using "RAND_DRBG_set_callbacks", we were able to call into our custom API for entropy and nonce generation. How can this be achieved with EVP_RAND implementation i.e. does it allow entropy to b

OpenSSL version 3.0.0-alpha13 published

2021-03-11 Thread OpenSSL
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 OpenSSL version 3.0 alpha 13 released = OpenSSL - The Open Source toolkit for SSL/TLS https://www.openssl.org/ OpenSSL 3.0 is currently in alpha. OpenSSL 3.0 alpha 13 has now been made

Re: OpenSSL 3.0.0 APIs for creating an EVP_PKEY from a p256 private key octet string

2021-03-08 Thread Benjamin Kaduk via openssl-users
make an EVP_PKEY with > > EC group parameters at > > https://github.com/openssl/openssl/issues/14258#issuecomment-783351031 > > but the translation to also specify OSSL_PKEY_PARAM_PRIV_KEY > > (and possibly OSSL_PKEY_PARAM_PUB_KEY; I forget if you need > > to pass bot

Re: OpenSSL 3.0.0 APIs for creating an EVP_PKEY from a p256 private key octet string

2021-03-07 Thread Benjamin Kaduk via openssl-users
Hi Stephen :) The API you'll want to use is EVP_PKEY_fromdata(); there's a stubbed out example of using it to make an EVP_PKEY with EC group parameters at https://github.com/openssl/openssl/issues/14258#issuecomment-783351031 but the translation to also specify OSSL_PKEY_PARAM_PRI

Re: Query on SSL Mutual Authentication on Server

2021-03-02 Thread Jakob Bohm via openssl-users
if (calist == NULL) { /* log error loading client CA names */ } SSL_CTX_set_client_CA_list(server_ctx, calist); If yes, Is it expected to do the IP or hostname validation? Neither, authorization of the client is up to you. OpenSSL will check the dates, validity of the signa

Re: PEM file line size

2021-02-25 Thread Benjamin Kaduk via openssl-users
On Thu, Feb 25, 2021 at 03:30:43PM -0800, Frank Liu wrote: > Looking at test cases > https://urldefense.com/v3/__https://github.com/openssl/openssl/blob/OpenSSL_1_1_1-stable/test/recipes/04-test_pem.t__;!!GjvTz_vk!A42D2c2brOwptas6T1iBt9i7pMWhwehkKAmeCuILgR-6iv5n0TQPQ6tkkVgG9A$ > &g

Re: ASN.1 encoding error

2021-02-25 Thread John Robson via openssl-users
hat I am seeing. Thanks, John On Thu, 25 Feb 2021 at 17:29, Benjamin Kaduk wrote: > That sounds like the certificate is encoded using ASN.1 BER rules, that > openssl > accepts, but the python library is insisting on DER encoding (per the > spec). > > -Ben > > On Thu, Feb 25

Re: ASN.1 encoding error

2021-02-25 Thread Benjamin Kaduk via openssl-users
That sounds like the certificate is encoded using ASN.1 BER rules, that openssl accepts, but the python library is insisting on DER encoding (per the spec). -Ben On Thu, Feb 25, 2021 at 05:19:32PM +, John Robson via openssl-users wrote: > Hi all, > > I'm encountering an error

ASN.1 encoding error

2021-02-25 Thread John Robson via openssl-users
27;, 'illegal padding'), ('asn1 encoding routines', > 'asn1_template_noexp_d2i', 'nested asn1 error'), ('asn1 encoding routines', > 'asn1_template_noexp_d2i', 'nested asn1 error'), ('SSL routines', > 'tls_proce

stunnel 5.58 released

2021-02-20 Thread Michał Trojnara via openssl-users
(thx to Martin Stein).   - Fixed a double free with OpenSSL older than 1.1.0 (thx to     Petr Strukov).   - OpenSSL DLLs updated to version 1.1.1j. * New features   - New 'protocolHeader' service-level option to insert custom     'connect' protocol negotiation headers.  This feat

OpenSSL version 3.0.0-alpha12 published

2021-02-18 Thread OpenSSL
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 OpenSSL version 3.0 alpha 12 released = OpenSSL - The Open Source toolkit for SSL/TLS https://www.openssl.org/ OpenSSL 3.0 is currently in alpha. OpenSSL 3.0 alpha 12 has now been made

OpenSSL Security Advisory

2021-02-16 Thread OpenSSL
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 OpenSSL Security Advisory [16 February 2021] Null pointer deref in X509_issuer_and_serial_hash() (CVE-2021-23841) Severity: Moderate

OpenSSL version 1.1.1j published

2021-02-16 Thread OpenSSL
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 OpenSSL version 1.1.1j released === OpenSSL - The Open Source toolkit for SSL/TLS https://www.openssl.org/ The OpenSSL project team is pleased to announce the release of version 1.1.1j of our open

Re: Encoding of AlgorithmIdentifier with NULL parameters

2021-01-28 Thread Jakob Bohm via openssl-users
: *openssl-users-bounce on behalf of openssl-users *Organization: *WiseMo A/S *Reply-To: *Jakob Bohm *Date: *Thursday, January 28, 2021 at 21:10 *To: *openssl-users *Subject: *Re: Encoding of AlgorithmIdentifier with NULL parameters Also note that the official ASN.1 declaration for

Re: Encoding of AlgorithmIdentifier with NULL parameters

2021-01-28 Thread Jakob Bohm via openssl-users
wrote: I am trying to provide a test certificate generated by openssl-3.0.0-alpha10 to a third party certificate parser/manager. This software expects AlgorithmIdentifier to either have parameters or to have null encoded (05 00) parameters which seems to be missing in the certificate. Cer

OpenSSL version 3.0.0-alpha11 published

2021-01-28 Thread OpenSSL
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 OpenSSL version 3.0 alpha 11 released = OpenSSL - The Open Source toolkit for SSL/TLS https://www.openssl.org/ OpenSSL 3.0 is currently in alpha. OpenSSL 3.0 alpha 11 has now been made

Re: PKCS12 APIs with fips 3.0

2021-01-28 Thread Jakob Bohm via openssl-users
If that is a hypothetical context, what context is the official design goal of the OpenSSL Foundation for their validation effort? On 2021-01-28 11:26, Tomas Mraz wrote: This is a purely hypothetical context. Besides, as I said below - the PKCS12KDF should not be used with modern PKCS12 files

Re: PKCS12 APIs with fips 3.0

2021-01-28 Thread Jakob Bohm via openssl-users
If the context does not limit the use of higher level compositions, then OpenSSL 3.0 provides no way to satisfy the usual requirement that a product can be set into "FIPS mode" and not invoke the non-validated lower level algorithms in the "default" provider. The usual contex

Re: PKCS12 APIs with fips 3.0

2021-01-28 Thread Jakob Bohm via openssl-users
ode can be easily achieved with OpenSSL 3.0 - either by loading just the fips and base provider, or by loading both default and fips providers but using the "fips=yes" default property (without the "?"). The PKCS12KDF does not work because it is not an FIPS approved KDF algorithm s

Re: PKCS12 APIs with fips 3.0

2021-01-28 Thread Jakob Bohm via openssl-users
Does that mean that OpenSSL 3.0 will not have a true "FIPS mode" where all the non-FIPS algorithms are disabled, but the FIPS-independent schemes/protocols in the "default" provider remains available? Remember that in other software systems, such as OpenSSL 1.0.x and MS

Re: PKCS12 APIs with fips 3.0

2021-01-26 Thread Jakob Bohm via openssl-users
On 2021-01-25 17:53, Zeke Evans wrote: Hi, Many of the PKCS12 APIs (ie: PKCS12_create, PKCS12_parse, PKCS12_verify_mac) do not work in OpenSSL 3.0 when using the fips provider.  It looks like that is because they try to load PKCS12KDF which is not implemented in the fips provider.  These

Re: Parsing and generating CBOR certificates?

2021-01-20 Thread Benjamin Kaduk via openssl-users
X.509-conformant certificates). > > Thanks > > Regards, > Uri > > > On Jan 20, 2021, at 19:26, Kaduk, Ben wrote: > > > > No. OpenSSL does not include any CBOR protocol support. > > I'm also not sure what you mean by "CBOR-encoded certificate"

Re: Parsing and generating CBOR certificates?

2021-01-20 Thread Kaduk, Ben via openssl-users
No. OpenSSL does not include any CBOR protocol support. I'm also not sure what you mean by "CBOR-encoded certificate"; I don't know of any such thing other than https://datatracker.ietf.org/doc/draft-mattsson-cose-cbor-cert-compress/ which is very much still a wor

Re: Fwd: channel binding

2021-01-11 Thread Benjamin Kaduk via openssl-users
ck with the Finished-based channel bindings; the exporter > > interface is a new protocol mechanism and the whole protocol/ecosystem has > > to be expecting to use it. > > Right. So we have implementations out there using it; will the OpenSSL > project consider promoting it to suppor

Re: Fwd: channel binding

2021-01-11 Thread Benjamin Kaduk via openssl-users
On Mon, Jan 11, 2021 at 09:26:30PM +, Jeremy Harris wrote: > On 11/01/2021 08:20, Benjamin Kaduk wrote: > > Current recommendations are not to use the finished message as the channel > > binding but instead to define key exporter label for the given usage > > (see > > https://urldefense.com/v3

Re: Fwd: channel binding

2021-01-11 Thread Benjamin Kaduk via openssl-users
On Sun, Jan 10, 2021 at 02:44:38PM +, Jeremy Harris wrote: > Hi, > > What is the status of SSL_get_finidhed() / SSL_get_peer_finished() ? > > I do not find them documented at > > https://urldefense.com/v3/__https://www.openssl.org/docs/manmaster/man3/__;!!GjvTz_vk!FUYwEktTkE4ZmFeJKSFeBQe32

Re: Random and rare Seg faults at openssl library level

2021-01-08 Thread Jakob Bohm via openssl-users
On 2021-01-07 18:05, Ken Goldman wrote: On 1/7/2021 10:11 AM, Michael Wojcik wrote: $ cat /etc/redhat-release && openssl version CentOS Linux release 7.9.2009 (Core) OpenSSL 1.0.2k-fips  26 Jan 2017 Ugh. Well, OP should have made that clear in the original message. And this is on

OpenSSL version 3.0.0-alpha10 published

2021-01-07 Thread OpenSSL
-BEGIN PGP SIGNED MESSAGE- Hash: SHA256 OpenSSL version 3.0 alpha 10 released = OpenSSL - The Open Source toolkit for SSL/TLS https://www.openssl.org/ OpenSSL 3.0 is currently in alpha. OpenSSL 3.0 alpha 10 has now been made

URI with commas in crlDistributionPoints

2021-01-04 Thread Andrew via openssl-users
erent computer with OpenSSL 1.1.1i for root CA key generation and intermediate CA signing, not WSL. I'm trying to sign the intermediate certificate, but I get this error: $ openssl ca -batch -in subca.req -extensions v3_subca -config ca.conf Using configuration from ca.conf Error Loading extensi

Re: Failing unit tests after adding public key check to pkey_ec_derive()

2020-12-31 Thread Patrick Jakubowski via openssl-users
KEY public/private keypair and then overrides it with the server public key, so the generation was a waste anyway. Instead, it should create a parameters-only EVP_PKEY. (This is a consequence of OpenSSL using the same type for empty key, empty key with key type, empty key with key type + parameters,

Failing unit tests after adding public key check to pkey_ec_derive()

2020-12-29 Thread Patrick Jakubowski via openssl-users
Hi all, I've been tasked with making some modifications to OpenSSL 1.1.1 in order to bring it into compliance with FIPS 140-2. One of the items on the to-do list was to implement the required key agreement scheme assurances specified in NIST SP.800-56Ar3 Section 9. This involves performing

BIO_s_file() and files that are larger than int - how is overflow handled?

2020-12-24 Thread Graham Leggett via openssl-users
Hi all, According to the manpage at https://www.openssl.org/docs/man1.1.0/man3/BIO_s_file.html the macro BIO_tell() casts to int: /opt/local/include//openssl/bio.h:# define BIO_tell(b) (int)BIO_ctrl(b,BIO_C_FILE_TELL,0,NULL) What happens if the file being parsed is larger than can fit in

RE: [EXTERNAL] RE: DH_compute_key () - replacement in 3.0

2020-12-17 Thread Sands, Daniel via openssl-users
From: Narayana, Sunil Kumar Sent: Thursday, December 17, 2020 8:17 AM To: Sands, Daniel ; openssl-users@openssl.org Subject: [EXTERNAL] RE: DH_compute_key () - replacement in 3.0 Hi, For the equivalent replacement of DH_compute_key in 3.0, we tried to perform the steps

RE: [EXTERNAL] RE: DH_compute_key () - replacement in 3.0

2020-12-16 Thread Sands, Daniel via openssl-users
version. Note that the inputs are same in both scenario. The generated key should be random. So unless you seed your PRNG with a constant value, you should always generate a different public/private keypair. Between OpenSSL versions, the PRNG may have changed, so I would not depend on them to

p12 bundle for Android (WiFi EAP-TLS)

2020-12-16 Thread Kostya Berger via openssl-users
Hello, everyone! I'm creating a p12 bundled certificate (I used it for Android phone). Used both easyrsa command and, alternatively, openssl command as shown in many manuals, like this: openssl pkcs12 -export -in client.crt -inkey client.key -certfile ca.crt -name "name" -out cli

RE: [EXTERNAL] RE: DH_compute_key () - replacement in 3.0

2020-12-15 Thread Sands, Daniel via openssl-users
We do have generated the key using EVP_PKEY_gen as suggested in earlier emails, but since this was a non-ephemeral and we wanted to store the key in "raw" octet bytes, so we did extracted the whole DH priv/pub key pair out from the key generated via EVP_PKEY_gen ( using as suggested… EVP_PKEY

RE: DH_compute_key () - replacement in 3.0

2020-12-14 Thread Sands, Daniel via openssl-users
to exactly replace this we are generating “pubparam_key/priparam_key” using bn_publicKey/dh->priv_key as below OSSL_PARAM_BLD *pubparamsbld = NULL, priparamsbld = NULL; OSSL_PARAM *pubparams = NULL, priparams = NULL; EVP_PKEY *pubparam_key = NULL, *priparam_key = NULL; EVP_PKEY_CTX *pubctx =

<    1   2   3   4   5   6   7   8   9   10   >