Re: S/MIME with attachments

2000-12-07 Thread Simon Josefsson

"Hellan,Kim KHE" wrote:

 Is it possible to also include attachments in an S/MIME message created by
 OpenSSL?
 I can only find code to add plain text.

Attachments _are_ plain text, once encoded, so there's no problem.  Just
be sure to include proper MIME headers in the beginning of the file. 
You can create the encoded MIME object with tools such as "mmencode"
(not sure if I remember the name correctly).  Good luck.
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



SV: S/MIME with attachments

2000-12-07 Thread Hellan,Kim KHE


 Is it possible to also include attachments in an S/MIME message created by
 OpenSSL?
 I can only find code to add plain text.

Attachments _are_ plain text, once encoded, so there's no problem.  Just
be sure to include proper MIME headers in the beginning of the file. 
You can create the encoded MIME object with tools such as "mmencode"
(not sure if I remember the name correctly).  Good luck.

Thanks...
Yes you're right that attachments are plain text as they are BASE64 encoded.

Does anyone have some sourcecode for such a "MIME object" encoder?
I assume that this "MIME object" file can be supplied as the "-in" parameter
to the OpenSSL S/MIME tool.

TIA
Kim Hellan
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: SV: S/MIME with attachments

2000-12-07 Thread Simon Josefsson

"Hellan,Kim KHE" wrote:
 
   Is it possible to also include attachments in an S/MIME message created by
   OpenSSL?
   I can only find code to add plain text.
 
  Attachments _are_ plain text, once encoded, so there's no problem.  Just
  be sure to include proper MIME headers in the beginning of the file.
  You can create the encoded MIME object with tools such as "mmencode"
  (not sure if I remember the name correctly).  Good luck.
 
 Thanks...
 Yes you're right that attachments are plain text as they are BASE64 encoded.
 
 Does anyone have some sourcecode for such a "MIME object" encoder?

Try  "mmencode" from the Metamail package.  It ships with most unices,
try google.org or rpmfind.net to locate the source.

 I assume that this "MIME object" file can be supplied as the "-in" parameter
 to the OpenSSL S/MIME tool.

Yup.
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



SSL client failure during renegotiation with cert request

2000-12-07 Thread Lutz Jaenicke

This message continues the thread about SSL client failure when using
DES-CBC3-SHA and client authentication...

On Wed, Dec 06, 2000 at 02:36:38PM -0800, Jeffrey Ricks wrote:
 Here are the logs I mentioned.  Thanks for offering to look at them. 
 Let me know if you need any more info.

Hi Jeff,

I have looked into the logs you sent and see, that there is some new
fact involved that I didn't know before. I actually don't remember
that you mentioned it to the list and it would have changed the discussion
significantly.
First, let me examine the s_client output from the failing connection:

Here, first an SSL connection is successfully established (without a
client certificate requested):
...
---
No client certificate CA names sent
---
SSL handshake has read 1527 bytes and written 240 bytes
---
New, TLSv1/SSLv3, Cipher is DES-CBC3-SHA
Server public key is 1024 bit
SSL-Session:
Protocol  : TLSv1
Cipher: DES-CBC3-SHA
...

Then, application data is succcessfully exchanged and only later the server
invokes a renegotiation with the request of a client certificate:
...
SSL_connect:SSL renegotiate ciphers
SSL_connect:SSLv3 write client hello A
SSL_connect:SSLv3 read server hello A
depth=1 /C=US/ST=MyState/L=MyCity/O=MyCompany/OU=Client Certificate Authority/CN
=Test Root (1024RSA) dev
verify return:1
depth=0 /C=US/ST=MyState/L=MyCity/O=MyCompany/OU=Client Certificate Authority/CN
=voodoo
verify return:1
SSL_connect:SSLv3 read server certificate A
SSL3 alert write:fatal:illegal parameter
SSL_connect:error in SSLv3 read server key exchange A
7305:error:1408E098:SSL routines:SSL3_GET_MESSAGE:excessive message size:s3_both
.c:302:

Here the failure occurs. The behaviour shown does match what can be seen from
the ssldump output. After 4.5 seconds the initial handshake is finished and
your application is sending data. After some data has been sent, a
renegotiation is started and excessive data (note the size of the last message)
is being sent from the server:
...
1 6  0.2077 (0.)  CSV3.1(1)  ChangeCipherSpec
1 7  0.2077 (0.)  CSV3.1(40)  Handshake
1 8  0.2217 (0.0140)  SCV3.1(1)  ChangeCipherSpec
1 9  0.2217 (0.)  SCV3.1(40)  Handshake
1 10 4.5120 (4.2902)  CSV3.1(80)  application_data
1 11 4.5250 (0.0129)  CSV3.1(40)  application_data
1 12 4.5250 (0.)  CSV3.1(40)  application_data
1 13 4.5250 (0.)  CSV3.1(24)  application_data
1 14 4.5250 (0.)  CSV3.1(40)  application_data
1 15 4.5250 (0.)  CSV3.1(56)  application_data
1 16 4.5250 (0.)  CSV3.1(48)  application_data
1 17 4.5250 (0.)  CSV3.1(40)  application_data
1 18 4.5257 (0.0007)  SCV3.1(32)  Handshake
1 19 4.5260 (0.0003)  CSV3.1(72)  Handshake
1 20 4.5268 (0.0007)  SCV3.1(96)  Handshake
1 21 4.5298 (0.0030)  SCV3.1(1408)  Handshake
1 22 4.5300 (0.0001)  SCV3.1(9920)  Handshake

According to the s_client output, the error is caused in
"SSLv3 read server key exchange A", that would mean in ssl3_get_message()
called at line ssl/s3_clnt.c:851. Here a maximum message size is defined:
n=ssl3_get_message(s,
SSL3_ST_CR_KEY_EXCH_A,
SSL3_ST_CR_KEY_EXCH_B,
-1,
1024*8, /* ?? */
ok);
As 99208192, the error condition is triggered.

So by now we know what we are looking for in the next step: is the message
size of 9920 reasonable? In this case the 1024*8 is unreasonable and a
client error. Or is the server in error in sending this large message size?

I must think and read about it, so I hand this analysis to the list,
maybe somebody else also can also add his $0.02.

Best regards,
Lutz

-- 
Lutz Jaenicke [EMAIL PROTECTED]
BTU Cottbus   http://www.aet.TU-Cottbus.DE/personen/jaenicke/
Lehrstuhl Allgemeine Elektrotechnik  Tel. +49 355 69-4129
Universitaetsplatz 3-4, D-03044 Cottbus  Fax. +49 355 69-4153
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



ARGH: Help me PLEASE :(

2000-12-07 Thread mjvolders


Hi,

I hope somebody will help me.
For the last two weeks i am trying to write RSA keys to disk.
I want two files, one with the private Key and one with the Public key (this one
is distributed).
For some unknown reason nothing I have tried will work. I tried to write the
files with and without BIO and FP, I have tried to convert from ASN to DER and
then write to disk. But always something fails, then the write succeeds but the
readback fails, then the write fails en the readback succeeds. 

Can anybody please construct a very simple but effective piece of source which
writes an RSA keypair into two files and reads them back in one RSA structure ??
I don't care in which way it is done, if only it works.

Thanks you very much. I am supposed to have my application done on a deadline
but in the way this is going I will netver get it done on time.


Thanks,

Thijs.

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



RE: ARGH: Help me PLEASE :(

2000-12-07 Thread Yuriy Stul

Hi Thijs,
try this:

int nPrivateKeyLength = i2d_RSAPrivateKey(pRSA, 0); // You receive length in
bytes.
char* pcPrivateKey = new char[nPrivateKeyLength];   // Allocate memory.
i2d_RSAPrivateKey(pRSA, pcPrivateKey );// Store Private key 
into memory.

Now you may write pcPrivateKey to the file (fwrite or something else).

Same approach you may use for public key.

Regards,
Yuriy Stul, Tashilon Core Technology Manager

[mailto:[EMAIL PROTECTED]]
[http://www.tashilon.com]

 -Original Message-
 From: [EMAIL PROTECTED]
 [mailto:[EMAIL PROTECTED]]On Behalf Of
 [EMAIL PROTECTED]
 Sent: Thursday, December 07, 2000 14:23
 To: [EMAIL PROTECTED]
 Subject: ARGH: Help me PLEASE :(



 Hi,

 I hope somebody will help me.
 For the last two weeks i am trying to write RSA keys to disk.
 I want two files, one with the private Key and one with the
 Public key (this one
 is distributed).
 For some unknown reason nothing I have tried will work. I tried
 to write the
 files with and without BIO and FP, I have tried to convert from
 ASN to DER and
 then write to disk. But always something fails, then the write
 succeeds but the
 readback fails, then the write fails en the readback succeeds.

 Can anybody please construct a very simple but effective piece of
 source which
 writes an RSA keypair into two files and reads them back in one
 RSA structure ??
 I don't care in which way it is done, if only it works.

 Thanks you very much. I am supposed to have my application done
 on a deadline
 but in the way this is going I will netver get it done on time.


 Thanks,

 Thijs.

 __
 OpenSSL Project http://www.openssl.org
 User Support Mailing List[EMAIL PROTECTED]
 Automated List Manager   [EMAIL PROTECTED]


__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



How to add X509V3 extensions..

2000-12-07 Thread chandu



Hi all,

I have one doubt regarding the X509 v3 
extensions. 
How to add the X509 v3 extension attributes to the 
certificate request?

Regards
Suram


Re: ARGH: Help me PLEASE :(

2000-12-07 Thread Dr S N Henson



[EMAIL PROTECTED] wrote:
 
 Hi,
 
 I hope somebody will help me.
 For the last two weeks i am trying to write RSA keys to disk.
 I want two files, one with the private Key and one with the Public key (this one
 is distributed).
 For some unknown reason nothing I have tried will work. I tried to write the
 files with and without BIO and FP, I have tried to convert from ASN to DER and
 then write to disk. But always something fails, then the write succeeds but the
 readback fails, then the write fails en the readback succeeds.
 

OK if it'll make you happy :-)

#include openssl/pem.h
main()
{
RSA *rsa, *rsa_pub, *rsa_priv;
FILE *in, *out;

/* Generate RSA key */
rsa =RSA_generate_key(1024,0x10001,NULL,NULL);

out = fopen("pubkey.pem", "w");
PEM_write_RSAPublicKey(out, rsa);
fclose(out);

out = fopen("privkey.pem", "w");
PEM_write_RSAPrivateKey(out, rsa, NULL, NULL, 0, NULL, NULL);
fclose(out);

in = fopen("pubkey.pem", "r");
rsa_pub = PEM_read_RSAPublicKey(in, NULL, NULL, NULL);
fclose(in);

in = fopen("privkey.pem", "r");
rsa_priv = PEM_read_RSAPrivateKey(in, NULL, NULL, NULL);
fclose(in);

printf("Public Key:\n");
RSA_print_fp(stdout, rsa_pub, 0);

printf("\n\nPrivate Key:\n");
RSA_print_fp(stdout, rsa_priv, 0);

}

In practice error checking would be performed after the reads and the
fopen calls but that's been omitted to keep it simple.

Steve.
-- 
Dr Stephen N. Henson.   http://www.drh-consultancy.demon.co.uk/
Personal Email: [EMAIL PROTECTED] 
Senior crypto engineer, Celo Communications: http://www.celocom.com/
Core developer of the   OpenSSL project: http://www.openssl.org/
Business Email: [EMAIL PROTECTED] PGP key: via homepage.

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



form signing

2000-12-07 Thread Libor Bubik

Hi,
I am writing an utility for HTML form signing for Microsoft IE. I am using
ActiveX object and Crypto API library. I am sending HTML form to Apache
server.
Can you help me, how can I write application for verifying signed form or
can you send me any web link to some example?

Thanks Libor

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: SSL client failure during renegotiation with cert request

2000-12-07 Thread Jeffrey Ricks

Lutz,

After working with Eric R. a bit last night to get ssldump to decrypt
my messages, I discovered that with openssl-0.9.6 at both the client
and server, the cipher problem goes away.  Unfortunately, this doesn't
help me because at least for now, I'm stuck using 0.9.4 all around.

The other thing is that I don't know where that 9920 long message is
coming from... none of the tests I'm running have anything returned
that's even close to that size.

If you or anyone else needs any more details on this, please let me
know.

Thanks,

Jeff



--- Lutz Jaenicke [EMAIL PROTECTED] wrote:
 This message continues the thread about SSL client failure when using
 DES-CBC3-SHA and client authentication...
 
 On Wed, Dec 06, 2000 at 02:36:38PM -0800, Jeffrey Ricks wrote:
  Here are the logs I mentioned.  Thanks for offering to look at
 them. 
  Let me know if you need any more info.
 
 Hi Jeff,
 
 I have looked into the logs you sent and see, that there is some new
 fact involved that I didn't know before. I actually don't remember
 that you mentioned it to the list and it would have changed the
 discussion
 significantly.
 First, let me examine the s_client output from the failing
 connection:
 
 Here, first an SSL connection is successfully established (without a
 client certificate requested):
 ...
 ---
 No client certificate CA names sent
 ---
 SSL handshake has read 1527 bytes and written 240 bytes
 ---
 New, TLSv1/SSLv3, Cipher is DES-CBC3-SHA
 Server public key is 1024 bit
 SSL-Session:
 Protocol  : TLSv1
 Cipher: DES-CBC3-SHA
 ...
 
 Then, application data is succcessfully exchanged and only later the
 server
 invokes a renegotiation with the request of a client certificate:
 ...
 SSL_connect:SSL renegotiate ciphers
 SSL_connect:SSLv3 write client hello A
 SSL_connect:SSLv3 read server hello A
 depth=1 /C=US/ST=MyState/L=MyCity/O=MyCompany/OU=Client Certificate
 Authority/CN
 =Test Root (1024RSA) dev
 verify return:1
 depth=0 /C=US/ST=MyState/L=MyCity/O=MyCompany/OU=Client Certificate
 Authority/CN
 =voodoo
 verify return:1
 SSL_connect:SSLv3 read server certificate A
 SSL3 alert write:fatal:illegal parameter
 SSL_connect:error in SSLv3 read server key exchange A
 7305:error:1408E098:SSL routines:SSL3_GET_MESSAGE:excessive message
 size:s3_both
 .c:302:
 
 Here the failure occurs. The behaviour shown does match what can be
 seen from
 the ssldump output. After 4.5 seconds the initial handshake is
 finished and
 your application is sending data. After some data has been sent, a
 renegotiation is started and excessive data (note the size of the
 last message)
 is being sent from the server:
 ...
 1 6  0.2077 (0.)  CSV3.1(1)  ChangeCipherSpec
 1 7  0.2077 (0.)  CSV3.1(40)  Handshake
 1 8  0.2217 (0.0140)  SCV3.1(1)  ChangeCipherSpec
 1 9  0.2217 (0.)  SCV3.1(40)  Handshake
 1 10 4.5120 (4.2902)  CSV3.1(80)  application_data
 1 11 4.5250 (0.0129)  CSV3.1(40)  application_data
 1 12 4.5250 (0.)  CSV3.1(40)  application_data
 1 13 4.5250 (0.)  CSV3.1(24)  application_data
 1 14 4.5250 (0.)  CSV3.1(40)  application_data
 1 15 4.5250 (0.)  CSV3.1(56)  application_data
 1 16 4.5250 (0.)  CSV3.1(48)  application_data
 1 17 4.5250 (0.)  CSV3.1(40)  application_data
 1 18 4.5257 (0.0007)  SCV3.1(32)  Handshake
 1 19 4.5260 (0.0003)  CSV3.1(72)  Handshake
 1 20 4.5268 (0.0007)  SCV3.1(96)  Handshake
 1 21 4.5298 (0.0030)  SCV3.1(1408)  Handshake
 1 22 4.5300 (0.0001)  SCV3.1(9920)  Handshake
 
 According to the s_client output, the error is caused in
 "SSLv3 read server key exchange A", that would mean in
 ssl3_get_message()
 called at line ssl/s3_clnt.c:851. Here a maximum message size is
 defined:
 n=ssl3_get_message(s,
 SSL3_ST_CR_KEY_EXCH_A,
 SSL3_ST_CR_KEY_EXCH_B,
 -1,
 1024*8, /* ?? */
 ok);
 As 99208192, the error condition is triggered.
 
 So by now we know what we are looking for in the next step: is the
 message
 size of 9920 reasonable? In this case the 1024*8 is unreasonable and
 a
 client error. Or is the server in error in sending this large message
 size?
 
 I must think and read about it, so I hand this analysis to the list,
 maybe somebody else also can also add his $0.02.
 
 Best regards,
   Lutz
 
 -- 
 Lutz Jaenicke
 [EMAIL PROTECTED]
 BTU Cottbus  
 http://www.aet.TU-Cottbus.DE/personen/jaenicke/
 Lehrstuhl Allgemeine Elektrotechnik  Tel. +49 355
 69-4129
 Universitaetsplatz 3-4, D-03044 Cottbus  Fax. +49 355
69-4153


__
Do You Yahoo!?
Yahoo! Shopping - Thousands of Stores. Millions of Products.
http://shopping.yahoo.com/
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   

Netscape SSL with IMAP problem

2000-12-07 Thread Jason Keltz

Hi..

My department has purchased two certificates from Equifax Secure --
one for our SSL-enabled web server (www.cs.yorku.ca), and the other for
our SSL-enabled IMAP mail server (mail.cs.yorku.ca).

For the web server, we are using Apache 1.3.14 + SSL 1.42.
For IMAP, we are using University of Washington's imap 2000 with SSL.
I have installed OpenSSL 0.9.6.

When I received the e-mail from Equifax with the certificates, I was sent
three pieces:
1) The Equifax Secure E-Business CA-2 certificate
   (C=US, O=Equifax Secure Inc, CN=Equifax Secure E-Business CA-2)
   which is signed by:
C=ZA, ST=Western Cape, L=Cape Town, O=Thawte Consulting cc,
OU=Certification Services Division, CN=Thawte Server
[EMAIL PROTECTED]
2) The mail.cs.yorku.ca certificate
3) The www.cs.yorku.ca certificate

I copied the equifax certificate into /usr/local/ssl/certs.
I got the Thawte public certificate and put it into /usr/local/ssl/certs.
I got the hash values for each of these files with:
openssl x509 -in file -hash
and symlinked the name to the hash value.0 for each file.

I then concatenated the mail.cs.yorku.ca with the private key that we
generated when we generated our CSR and I did the same thing for WWW.

I was able to "openssl verify" both certificates.  Both were "OK".

If I try to connect to our secure web server with both Netscape and
Internet Explorer, everything works fine.

If I try to connect to our IMAP SSL server with Unix Pine mail reader, I
can see that the appropriate hash files are read, and the session is
encrypted.

If I try to connect to our IMAP SSL server with Outlook Express, Outlook
doesn't show any signs of being connected to an encrypted link, but a
snoop shows that the connection is indeed encrypted.  (I am sort of
surprised that Outlook Express doesn't have a method by which you can view
the certificate chain like in Internet Explorer?)

Finally, if I try to connect to the IMAP SSL server with Netscape
Communicator v4.75 and v6 -- the *SAME* Netscape Communicator that talks
to our SSL enabled web server without complaining suddenly says that it
does not does not recognize the authority who signed its Certificate".
If I continue, the session is indeed encrypted, but I specifically
purchased a certificate for the mail server so that the signer would be
trusted, and that message wouldn't come up -- otherwise, I could have just
use a self-signed certificate!  I have spent an entire day trying to
figure out why this happens, and I cannot.  Does anyone have any ideas?

The only fishy thing to me is that in the Netscape signer list, I see:
Equifax Premium CA
Equifax Secure CA
*not* Equifax Secure E-Business CA-2

But Netscape happily accepts the web connection, so it must be using a
fingerprint that is the same as one of the other two because all my other
certificate lists (other than "Signers") are empty.

Any help you could provide would be (very) much appreciated.

Jason Keltz ([EMAIL PROTECTED])
Technical Support
Department of Computer Science
York University
Toronto, Ontario CANADA


__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Help with Outlook

2000-12-07 Thread SBNelson

I am having troubles getting Outlook to accept my signed e-mail.  When I
send the same e-mail to Netscape on linux, it works fine.  Outlook complains
that the sender does not match the certificate, and it shows the sender as
being blank.  When I look at the message source, I don't see any problems?

If someone wants me to send a signed message, please let me know...

Scott Nelson
Thermeon Corporation - St. Louis
Voice: (314) 316-6010
E-Mail: [EMAIL PROTECTED]

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



RE: Experiencing error when installing a Verisign certificate!

2000-12-07 Thread Wilt, Paul

Jean-Marc/Others:

I found my problem.  The SSLCACertificateFile was pointing to the *wrong*
*.pem file.  Thanks for all the help.  By the way everyone, thanks for
putting up with me asking questions on this list.  After I sent the
original email I came to realize that I probably should have contacted
the mod_ssl mailing list instead.  You all have shown yourselves to be
very forgiving of my foolishness and I greatly appreciate it!

Paul E Wilt 
Principal Software Engineer

XanEdu, Inc. ( a division of Bell+Howell InformationLearning)
http://www.XanEdu.com
mailto:[EMAIL PROTECTED]
mailto:[EMAIL PROTECTED]
300 North Zeeb Rd   Phone: (734) 975-6021  (800)
521-0600 x6021
Ann Arbor, MI 48106 Fax:(734) 973-0737




-Original Message-
From: Wilt, Paul [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, December 06,2000 2:12 PM
To: '[EMAIL PROTECTED]'
Subject: RE: Experiencing error when installing a Verisign certificate!


Jean-Marc:

I hate to be totally stupid but what is the CRL and where are the CA
PEM files supposed to be located?  What does the directory where those
PEM files are located supposed to look like?  Sorry for all the bone-
headed questions but I have not been able to trace this down!

Thanks
Paul E Wilt 
Principal Software Engineer

XanEdu, Inc. ( a division of Bell+Howell InformationLearning)
http://www.XanEdu.com
mailto:[EMAIL PROTECTED]
mailto:[EMAIL PROTECTED]
300 North Zeeb Rd   Phone: (734) 975-6021  (800)
521-0600 x6021
Ann Arbor, MI 48106 Fax:(734) 973-0737




-Original Message-
From: Jean-Marc Desperrier [mailto:[EMAIL PROTECTED]]
Sent: Wednesday, December 06,2000 1:46 PM
To: [EMAIL PROTECTED]
Subject: Re: Experiencing error when installing a Verisign certificate!


"Wilt, Paul" wrote:

 [04/Dec/2000 12:09:21 5411938] [info]  Init: Initializing OpenSSL library
 [04/Dec/2000 12:09:21 5411938] [info]  Init: Loading certificate  private
 key of SSL-aware server storefront.xanedu.com:8443

There apache loads your server and private key.
It work ok : No error.
I can tell there is no password on your private key, or there would be log
that
says the password has been read from user.

 [04/Dec/2000 12:09:24 5523600] [error] Init: (storefront.xanedu.com:8443)

 Unable to configure verify locations for client authentication (OpenSSL
 library error follows)

There apache tries to load the PEM certificate of the CA that must be used
for
user verification in SSLv3.
It doesn't work.
There seem to be a problem with the end of line.

 [04/Dec/2000 12:09:24 5523600] [error] OpenSSL: error:0B084009:x509
 certificate routines:X509_load_cert_crl_file:missing asn1 eos

I must say I'm not completely sure if it's the loading of the CA certficates
that fails, or the loading of the CRL that's associated to that CA.

Anyway this should help you to search in the right direction.

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: Netscape SSL with IMAP problem

2000-12-07 Thread Oscar Jacobsson

Jason Keltz wrote:
 Can someone explain why the server has to pass along the certificates from
 the CAs though?  I don't quite understand.  I'm new to this all.  Isn't it
 up to the server to send out just the certificate, and then up to the
 client to do the checks? 

On one side, it's because the TLS1 spec (haven't got an URL to the SSL3
drafts handy) says so. The self-signed certificate at the top level can
optionally be omitted though, since it will need to be explicitly
trusted (and thus, I presume, known) or the client-side verification
will fail.

On a more practical note, I think it is a very convenient thing to do,
given the fact that there's still, to my knowledge, no standardized way
for a given TLS client to be able to perform path discovery, meaning
that it won't necessarily be able to contruct a given chain on its own.

Even were it able to, it would conceivably run in to problems anyway due
to the "ship first, ask questions later" approach taken by a great deal
(kind of an understatement) of the PKIs I've come across so far. I can't
actually think of a single one that I've actually managed to verify
without hiccups, however minor, against the path validation algorithms
in either X.509 or RFC 2459. This might very well be a problem with me,
my diligence, or my memory though; in all fairness.

 I mean, isn't it counter-productive -- couldn't
 the server (be it imap or http) somehow send along fake CA certificates
 that make the real certificate look as if it were truly signed when it's
 not?

It would still need to compromise the private key of a certificate that
were trusted by the client in order to create a chain it would be able
to verify.

//oscar
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Help: Link and use libraries of OPENSSL in C++ Builder 5

2000-12-07 Thread Zhang Jianyu

I have some problems of using "ssleay32.dll" and "libeay32.dll" in BCB5 on Windows 
platform.
I did my job as follows:
1. Used implib.exe of CB to obtain .lib files--
implib.exe ssleay32.lib ssleay32.dll
implib.exe libeay32.lib libeay32.dll
2. Added the two .lib files in my CB application project.
3. Included .h files of openssl in my project--
   when I compiled my project without modifying the .h files,there were some link 
errors 
like "Unresolved external..". So I added a line in each .h files:
   #define IMPORT __declspec(dllimport) __stdcall
   then added "IMPORT" in the definition of EACH function(that's so tiring!! :(( ):
   EVP_PKEY * IMPORT EVP_PKEY_new(void);
   I built the project again,this time it was OK.

   I did not know wether the way of modifying .h files was a FORMAL  PROPER way!! :(( 
   Although it worked,it did not work well. There were unovercomed link errors when I 
wanted to call another format API like that:
   #define PEM_write_RSAPublicKey(fp,x)   PEM_ASN1_write((int 
(*)())i2d_RSAPublicKey.
   int IMPORT PEM_ASN1_write_bio(int (*i2d)(),const char *name..
   PEM_write_RSAPublicKey was not a directly defined function.
   Have somebody met the same problem like me?
   Who can tell me a correct way of link and call APIs of Openssl in C++ Builer?
   Thanx!!!
   

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



[Announce] M2Crypto 0.05p1 and Win32 binaries]

2000-12-07 Thread Ng Pheng Siong

Hello,

M2Crypto 0.05p1 is now available, in source and Win32 binary
packages.

M2Crypto is a Python interface to OpenSSL's ciphers, message 
digests and SSL and S/MIME functionality.

Get it here:

http://www.post1.com/home/ngps/m2


As usual, feedback is welcome.
-- 
Ng Pheng Siong [EMAIL PROTECTED] * http://www.post1.com/home/ngps
__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]



Re: Netscape SSL with IMAP problem

2000-12-07 Thread Michael T. Babcock

Jason Keltz wrote:

 Can someone explain why the server has to pass along the certificates from
 the CAs though?  I don't quite understand.  I'm new to this all.  Isn't it
 up to the server to send out just the certificate, and then up to the
 client to do the checks?  I mean, isn't it counter-productive -- couldn't
 the server (be it imap or http) somehow send along fake CA certificates
 that make the real certificate look as if it were truly signed when it's
 not?

I believe I once saw on the Equifax site that they use signing certificates signed
by Thawte -- so its possible that their certificate is not in the browser but that
the browser can verify the Equifax certificate against the Thawte cert, and then
verify yours against the Equifax cert.

__
OpenSSL Project http://www.openssl.org
User Support Mailing List[EMAIL PROTECTED]
Automated List Manager   [EMAIL PROTECTED]