[openssl.org #2990] Bug Report:openssl timezone issue

2013-02-14 Thread Kavan Modi via RT
Hello,
 
I’ve found there is issue in opensssl for timezone. As I understood if I add 
time zone then it will be create as per that time zone but it has been created 
by adding that much amount of time. As shown below.
 
When I am going to create certificate with –startdate and –enddate in format 
YYMMDDHHMMSSZ as following.
 
-startdate 13021400+0530 –enddate 14123100+0530 then
 
+0530 for IST timezone.
As per IST time zone certificate has been created for time startdate 2013-02-14 
11:00:00 and enddate 2014-12-31 11:00:00.
 
Why this thing happen?
 
Regards,
Kavan Modi
Software Engineer
Cyberoam Technologies Pvt Ltd.
Ahmedabad,
Gujarat
India
 

__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


Re: [openssl.org #2981] BUG: 1.0.1e 64-bit C implementation ECDHE* chiphersuites incompatible with https://google.com

2013-02-14 Thread Andy Polyakov via RT
 Probably this strict aliasing 64-bit optimization bug for 
 crypto/bn/bn_nist.c
 
 What bug are you talking about?  There doesn't seem to be a strict
 aliasing warning in that file, and they use a union to get around
 the problem.
 
 Mac OSX compiler fail test/ectest: cc [Apple LLVM version 4.2 
 (clang-425.0.24) (based on LLVM 3.2svn)] gcc-mp-4.3 gcc-mp-4.4 gcc-mp-4.5 
 gcc-mp-4.6 clang-mp-3.0 clang-mp-3.1 clang-mp-3.2

 Mac OSX compiler test/ectest OK: gcc-apple-4.2 gcc-mp-4.7 gcc-mp-4.8 
 [gcc-mp-4.8 (MacPorts gcc48 4.8-20130203_0+universal) 4.8.0 20130203 
 (experimental)] clang-mp-2.9 clang-mp-3.3 [clang version 3.3 (trunk 173279)]
 
 I can at least reproduce the problem with clang 3.0.

Oh, that I managed to reproduce.
http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=750398acd85a7ae220d272d28a76dff7bb269c31
works around this one.

Serguei, could you test if it fixes even your problem[s]?

 PS: I think at least this patch makes sense, but doesn't change anything:
 --- a/crypto/bn/bn_nist.c
 +++ b/crypto/bn/bn_nist.c
 @@ -530,7 +530,7 @@ int BN_nist_mod_224(BIGNUM *r, const BIGNUM *a, const 
 BIGNUM *field,
 {
 NIST_INT64  acc;/* accumulator */
 unsigned int*rp=(unsigned int *)r_d;
 -   const unsigned int  *bp=(const unsigned int *)buf;
 +   const unsigned int  *bp=(const unsigned int *)buf.ui;
 
 acc  = rp[0];   acc -= bp[7-7];
 acc -= bp[11-7]; rp[0] = (unsigned int)acc; acc = 
 32;

The typo will be fixed as we go.


__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


Re: [openssl.org #2981] BUG: 1.0.1e 64-bit C implementation ECDHE* chiphersuites incompatible with https://google.com

2013-02-14 Thread Andy Polyakov via RT
Hi,

 For reference. Why does it show up with no-asm? bn_nist.c is
 collection of functions for specific moduli, but it's perfectly
 possible to calculate the result using general-purpose subroutines.
 It was found that general-purpose *assembly* code paths deliver
 better performance and it was arranged so that bn_nist is not
 invoked in asm builds (look for #if defined(OPENSSL_BN_ASM_MONT) in
 crypto/ec/ec_cvt.c).
 
 If Configure invoke without no-asm flag, then bn_nist.c compiled,
 but function BN_nist_mod_{192,224,256,384} don't called. If
 Configure invoke with no-asm, OpenSSL use
 BN_nist_mod_{192,224,256,384} functions. Right?

Yes.


__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


Re: [openssl.org #2978] CVS repositories serving stale data

2013-02-14 Thread Vladimir Kotal via RT
On 02/07/13 23:35, Andy Polyakov via RT wrote:
 The CVS repositories on cvs.openssl.org are still up and serving stale
 data. Please turn them off

 If you're referring to http://cvs.openssl.org, then removal would hardly
 be appropriate, because there are references to it in lists and RT. It
 would be appropriate to switch off anonymous CVS access.

That's what I meant.

Thanks,


v.


__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


[openssl.org #2988] Makefiles should (usually) remove target before re-generating

2013-02-14 Thread Stephen Henson via RT
On Thu Feb 14 04:35:05 2013, rs...@akamai.com wrote:

  Unfortunately some platforms can't automatically build the files
 e.g. WIN32, VMS.

 Okay, so those targets shouldn't get invoked?
 Or are you saying that you WANT the build to fail on those
 platforms?


Ah so you're saying the files would be retained in tarballs and under version
control just deleted before being recreated?

[I might have misinterpeted this. Sometimes it is suggested that all auto
generated files should be deleted from the tarballs... which we can't do for
the reasons stated]

  # objects.pl both reads and writes obj_mac.num
 
 obj_mac.h: objects.pl objects.txt obj_mac.num
  + $(RM)
 obj_mac.num $@
  $(PERL) objects.pl objects.txt obj_mac.num $@
 @sleep 1; touch
  obj_mac.h; sleep 1
  + chmod 444 obj_mac.num
 $@
 

  Deleting obj_mac.num is a bad idea. It contains the NID
 values which are added to over time. If you delete that file the
 recreated version is almost certain to have a different NID
 assignment which breaks binary compatibility.

 Okay. Then would
 you be interested in patch to objects.pl and the Makefile that
 created obj_mac.new and the Makefile replaced the file?


Can you explain the problem with the current system?

Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org

__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


RE: [openssl.org #2988] Makefiles should (usually) remove target before re-generating

2013-02-14 Thread Salz, Rich via RT
We extract a tarball and make everything read-only.  Sometimes an item in the 
distribution gets re-made. This can fail because of permissions. So, on 
platforms where this would happen, we'd like to remove the file first.  I 
wasn't advocating to remove them from the distro, I understand we need to be 
kind to our crippled (cough vms:) brethren.

Is this more clear? 

--  
Principal Security Engineer
Akamai Technology
Cambridge, MA


__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


Adding more options

2013-02-14 Thread Salz, Rich
I see that we've used up all 32 bits of options in the SSL structure.  Any 
thought given on how to extend that?  A 64-bit long long seems simplest, but 
might have issues with some of your older platforms.

/r$

--
Principal Security Engineer
Akamai Technology
Cambridge, MA




1.0.1e test suite fails with OPENSSL_NO_TLS1_2_CLIENT

2013-02-14 Thread Pierre Schmitz
Hi,

if openssl 1.0.1e is compiled with the -DOPENSSL_NO_TLS1_2_CLIENT
option make test fails with:

Testing AES256-GCM-SHA384
Available compression methods:
  1: zlib compression
ERROR in CLIENT
4147160712:error:140740B5:SSL routines:SSL23_CLIENT_HELLO:no ciphers
available:s23_clnt.c:486:
TLSv1.2, cipher (NONE) (NONE)
1 handshakes of 256 bytes done
Failed AES256-GCM-SHA384

This still fails when using the latest git 1.0.1 stable branch. We use
this option as a workaround for PR#2771.

Greetings,

Pierre

-- 
Pierre Schmitz, https://pierre-schmitz.com
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


Re: [openssl.org #2279] Bug Report

2013-02-14 Thread Andy Polyakov
 This bug about an incompatibility of cms-test.pl with old Perl versions
 has been fixed in 2011 for trunk by Andy (thanks!), but not been
 backported to any release branch. I verified it today for 1.0.1 on
 Solaris 8. It would be nice if the simple change could be applied to at
 least some of the release branches.
 
 http://rt.openssl.org/Ticket/Display.html?id=2279

populated. thanks for reminder.
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


Fwd: Openssl-0.9.8q

2013-02-14 Thread Rajeswari K
Forwarding to dev team as well

-- Forwarded message --
From: Rajeswari K raji.kotamr...@gmail.com
Date: Thu, Feb 14, 2013 at 4:58 PM
Subject: Openssl-0.9.8q
To: openssl-us...@openssl.org


Hello Team,

Our project uses openssl to perform ssl handshake and uses hardware crypto
engine to encrypt and decrypt. Once we receive first Encrypted message in
ssl handshake (i.e FINISHED message), we forward it to hardware crypto
engine to decrypt.

When used* openssl0.9.8g* version, and tried to connect from browser
handshake was successful and hardware crypto engine successfully decrypted
the FINISHED message.
When ported with *OPENSSL0.9.8q* version, and tried to connect from browser
handshake is not successful and hardware crypto engine is returning an
error.

After contacting hardware crypto engine team for the reason for failure,
they responded that  AUTH key used at openssl for the MAC calculation is
incorrect/wrong.

Observations :
   1)  TLS1.0  SSL3.0 handshakes were successful with OPENSSL0.9.8g
   2)  SSL3.0 handshake with OPENSSL0.9.8q is successful
   3)  *TLS1.0* handshake with *OPENSSL0.9.8q is failed*.

Please provide some pointers if anyone come across similar kind of
situation.

Thanks in advance,
Rajeswari.


[openssl.org #2991] Certifacte verification with a RSA-SHA512 hash algorithm fails

2013-02-14 Thread Dominic Wollner via RT
Hi,

there is a problem with certificate verification. Windows allows the generation 
of CA certificates which uses RSA-SHA512 as the hash algorithm. But this hash 
algorithm is currently not supported by OpenSSL. Will this issue be fixed in 
future or is there a workaround for this?

Regards,
Dominic

Dominic Wollner
Dipl.-Inf. (FH)
Development  Research Linux

IGEL Technology - The world's most advanced thin clients
Many Functions. One Device. ®
IGEL Technology GmbH
Annastr. 11
86150 Augsburg, Germany

Email:   woll...@igel.com mailto:mate...@igel.com
Phone:  +49 (0)821 34 32 08 - 233
Fax:  +49 (0)821 34 32 08 - 9
www.igel.com http://www.igel.com/ - www.igel.de http://www.igel.de/
IGEL Technology is a member of the Melchers group.
Managing Directors: Heiko Gloge, Nicolas C. S. Helms, Dirk Dördelmann, Andreas 
Schönduve
District Court Bremen (Germany) HRB 20636, VAT: DE 219524359
Confidentiality Note: The information contained in this transmission is legally 
privileged and confidential, intended only for the use of the individual or 
entity named above. If the reader of this message is not the intended 
recipient, you are hereby notified that any dissemination, distribution, or 
copying of this communication is strictly prohibited. If you receive this 
communication in error, please notify us immediately by telephone call to +49 
(0)821 34 32 08 - 233 and delete the message. Thank you!
P Please consider the environment before printing this email or its 
attachments. Many thanks...


__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


[openssl.org #2991] Certifacte verification with a RSA-SHA512 hash algorithm fails

2013-02-14 Thread Stephen Henson via RT
On Thu Feb 14 18:14:37 2013, woll...@igel.com wrote:
 Hi,

 there is a problem with certificate verification. Windows allows the
 generation of CA certificates which uses RSA-SHA512 as the hash
 algorithm. But this hash algorithm is currently not supported by
 OpenSSL. Will this issue be fixed in future or is there a
 workaround for this?


SHA512 has been supported in OpenSSL for some time. What version are you using
and what verification error do you get?

If possible please include a sample certificate that fails with the command
line utilities.

Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org

__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


Re: Adding more options

2013-02-14 Thread Dr. Stephen Henson
On Thu, Feb 14, 2013, Salz, Rich wrote:

 I see that we've used up all 32 bits of options in the SSL structure.  Any
 thought given on how to extend that?  A 64-bit long long seems simplest,
 but might have issues with some of your older platforms.
 

OpenSSL 1.0.2 has added an extra cert_flags field as part of the CERT
structure. Adding things to CERT has the advantage that it is one of the
few structures in the ssl library that has always been opaque.

Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


RE: Adding more options

2013-02-14 Thread Salz, Rich
 OpenSSL 1.0.2 has added an extra cert_flags field as part of the CERT 
 structure. Adding things to
 CERT has the advantage that it is one of the few structures in the ssl 
 library that has always been opaque.

And so do you change the options from a raw hex number (0x08000 etc) to a 
bitnumber (17)?

We have some additional options on the SSL structure that we'd like to 
contribute.  Right now we use long long  What should we do, in order to make 
it most likely you'll take them?

/r$

--  
Principal Security Engineer
Akamai Technology
Cambridge, MA

__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org