Re: DTLSv1_get_timeout/DTLSv1_handle_timeout on server for each connection

2012-01-25 Thread Michael Tuexen
On Jan 25, 2012, at 7:08 AM, Manish Yadav wrote:

 Hi all,
 
 could you please confirm if dtls timers are implemented at client side only 
 and not on server side (only client retries/attempts to establish connection) 
 or why they should be implemented on server side also.
You need timers on the server side also. However, 
DTLSv1_get_timeout/DTLSv1_handle_timeout is only necessary if you use select.
 
 
 after looking at :  http://crypto.stanford.edu/~nagendra/papers/dtls.pdf
 
 i understood that i need to call DTLSv1_get_timeout/DTLSv1_handle_timeout 
 incase of non-blocking socket. but after looking at example available on net 
 dtls_udp_echo2.c, i see only client side take care of this. i feel only 
 client side should try to reconnect, why server should try to resend message 
 to client.
Not sure about dtls_udp_echo2.c. You might want to take a look at the examples 
available at
http://sctp.fh-muenster.de/dtls-samples.html
 
 please share if you know any example on this.
Maybe Robin has more examples...

Best regards
Michael
 
 thanks,
 manish
 
 

__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


Re: DTLSv1_get_timeout/DTLSv1_handle_timeout on server for each connection

2012-01-25 Thread Manish Yadav
Hi Michael,

thanks for quick response. i had one more question, is it possible to do
decoupling of ssl object and socket fd to avoid rehandshake? (i am thinking
to create socketfd only for active clients, if it is inactive for sometime
then close the connection/socket and for inactive clients keep the ssl
object cached, whenever inactive clients send data create new fd and
associate with old ssl object, similar to
http://net-snmp.sourceforge.net/dev/agent/snmpDTLSUDPDomain_8c_source.html).
is it possible?

if i look at DTLSv1_listen, i am thinking i can not distinguish between
active/inactive client? is it possible based on error value from
DTLSv1_listen to tell if i received hello message or invalid message or
invalid hello message/wrong cookie.

thanks,
manish

On Wed, Jan 25, 2012 at 3:24 PM, Michael Tuexen 
michael.tue...@lurchi.franken.de wrote:

 On Jan 25, 2012, at 7:08 AM, Manish Yadav wrote:

  Hi all,
 
  could you please confirm if dtls timers are implemented at client side
 only and not on server side (only client retries/attempts to establish
 connection) or why they should be implemented on server side also.
 You need timers on the server side also. However,
 DTLSv1_get_timeout/DTLSv1_handle_timeout is only necessary if you use
 select.
 
 
  after looking at :  http://crypto.stanford.edu/~nagendra/papers/dtls.pdf
 
  i understood that i need to call
 DTLSv1_get_timeout/DTLSv1_handle_timeout incase of non-blocking socket. but
 after looking at example available on net dtls_udp_echo2.c, i see only
 client side take care of this. i feel only client side should try to
 reconnect, why server should try to resend message to client.
 Not sure about dtls_udp_echo2.c. You might want to take a look at the
 examples available at
 http://sctp.fh-muenster.de/dtls-samples.html
 
  please share if you know any example on this.
 Maybe Robin has more examples...

 Best regards
 Michael
 
  thanks,
  manish
 
 

 __
 OpenSSL Project http://www.openssl.org
 Development Mailing List   openssl-dev@openssl.org
 Automated List Manager   majord...@openssl.org



OpenSSL validation question

2012-01-25 Thread Adriano Godinho
Hi,

Does the FIPS module certification is missed if the fipscanister module is
compiled to a configuration (architecture, compiler version etc) different
from those listed on OpenSSL security policy? Our concern is if a change to
something on the build tools like compiler version or architecture can
invalidate the certification.

Thanks
-- 
Adriano Godinho


Re: DTLSv1_get_timeout/DTLSv1_handle_timeout on server for each connection

2012-01-25 Thread Michael Tuexen
On Jan 25, 2012, at 2:21 PM, Manish Yadav wrote:

 Hi Michael,
 
 thanks for quick response. i had one more question, is it possible to do 
 decoupling of ssl object and socket fd to avoid rehandshake? (i am thinking 
 to create socketfd only for active clients, if it is inactive for sometime 
 then close the connection/socket and for inactive clients keep the ssl object 
 cached, whenever inactive clients send data create new fd and associate with 
 old ssl object, similar to 
 http://net-snmp.sourceforge.net/dev/agent/snmpDTLSUDPDomain_8c_source.html). 
 is it possible?
If you make sure that you don't send anything locally...
Why not close the DTLS connection after some time and let the client do a new 
connect. You can cache the session
and the client can use session resumption.
 
 if i look at DTLSv1_listen, i am thinking i can not distinguish between 
 active/inactive client? is it possible based on error value from 
 DTLSv1_listen to tell if i received hello message or invalid message or 
 invalid hello message/wrong cookie.
I don't think so. Robin?
 
 thanks,
 manish
 
 On Wed, Jan 25, 2012 at 3:24 PM, Michael Tuexen 
 michael.tue...@lurchi.franken.de wrote:
 On Jan 25, 2012, at 7:08 AM, Manish Yadav wrote:
 
  Hi all,
 
  could you please confirm if dtls timers are implemented at client side only 
  and not on server side (only client retries/attempts to establish 
  connection) or why they should be implemented on server side also.
 You need timers on the server side also. However, 
 DTLSv1_get_timeout/DTLSv1_handle_timeout is only necessary if you use select.
 
 
  after looking at :  http://crypto.stanford.edu/~nagendra/papers/dtls.pdf
 
  i understood that i need to call DTLSv1_get_timeout/DTLSv1_handle_timeout 
  incase of non-blocking socket. but after looking at example available on 
  net dtls_udp_echo2.c, i see only client side take care of this. i feel 
  only client side should try to reconnect, why server should try to resend 
  message to client.
 Not sure about dtls_udp_echo2.c. You might want to take a look at the 
 examples available at
 http://sctp.fh-muenster.de/dtls-samples.html
 
  please share if you know any example on this.
 Maybe Robin has more examples...
 
 Best regards
 Michael
 
  thanks,
  manish
 
 
 
 __
 OpenSSL Project http://www.openssl.org
 Development Mailing List   openssl-dev@openssl.org
 Automated List Manager   majord...@openssl.org
 

__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


Re: OpenSSL 1.0.1 on OpenServer 5.0.7

2012-01-25 Thread Andy Polyakov
 Open crypto/modes/gcm128.c in text editor, locate line that
 has '/* check MMX bit */' comment and replace '123' with '125'.
 
 Changing crypto/modes/gcm128.c gets test to pass.
 
 Another test to perform is following. Revert back to '123', then open
 crypto/modes/asm/ghash-x86.pl in text editor and locate line that reads
 'if (0) {{ # May MMX version is kept for reference Replace '(0)'
 with '(!$sse2)'...
 
 [ reverting crypto/modes/gcm128.c ]
 This change to crypto/modes/asm/ghash-x86.pl works also.

http://cvs.openssl.org/chngview?cn=22074.
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


Re: OpenSSL validation question

2012-01-25 Thread Steve Marquess
 Hi,

 Does the FIPS module certification is missed if the fipscanister
 module is compiled to a configuration (architecture, compiler version
 etc) different from those listed on OpenSSL security policy? Our
 concern is if a change to something on the build tools like compiler
 version or architecture can invalidate the certification.

That's a very general question, so I can't give a specific answer.  It
depends.

A rough rule of thumb is that if you create a FIPS module
(fipscanister.o) on a formally tested platform (O/S and processor as
listed in the Security Policy), and if that binary file when copied
as-is to another platform executes successfully, then you are
*generally* justified in claiming it as validated.

The Implementation Guidance document
(http://csrc.nist.gov/groups/STM/cmvp/documents/fips140-2/FIPS1402IG.pdf) is
a more official discussion.  See in particular section G.5.

-Steve M.

-- 
Steve Marquess
OpenSSL Software Foundation, Inc.
1829 Mount Ephraim Road
Adamstown, MD  21710
USA
+1 877 673 6775 s/b
+1 301 874 2571 direct
marqu...@opensslfoundation.com


Re: OpenSSL validation question

2012-01-25 Thread Thor Lancelot Simon
On Wed, Jan 25, 2012 at 06:35:58PM -0500, Steve Marquess wrote:
 
 A rough rule of thumb is that if you create a FIPS module
 (fipscanister.o) on a formally tested platform (O/S and processor as
 listed in the Security Policy), and if that binary file when copied

Does the Security Policy list the compiler?  When I did this, years ago,
I think we did not have to specify the compiler even when we applied
for our algorithm certificates.  That seemed very, very wrong, since one
of the changes most likely to break a highly optimized implementation of
an algorithm is a change to the compiler!

__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org