Re: Openssl for Java application
So, I hope that I will get sufficient information from you on how to integrate OpenSSL into my Java application. You might find it a lot easier if you were to use Bouncy Castle. http://www.bouncycastle.org/
[PATCH] allow setting make command via env var
Taken from Gentoo Linux, please apply. -- Hanno Böck Blog: http://www.hboeck.de/ GPG: 3DBD3B20 Jabber/Mail:[EMAIL PROTECTED] respect $MAKE if it is set in the environment so we don't get a mix of the host `make` and whatever $MAKE is set to when recursing http://bugs.gentoo.org/146316 --- openssl-0.9.8e/Configure +++ openssl-0.9.8e/Configure @@ -931,6 +931,7 @@ $default_ranlib= &which("ranlib") or $default_ranlib="true"; $perl=$ENV{'PERL'} or $perl=&which("perl5") or $perl=&which("perl") or $perl="perl"; +my $make = $ENV{'MAKE'} || "make"; chop $openssldir if $openssldir =~ /\/$/; chop $prefix if $prefix =~ /\/$/; @@ -1554,7 +1557,7 @@ EOF close(OUT); } else { - my $make_command = "make PERL=\'$perl\'"; + my $make_command = "$make PERL=\'$perl\'"; my $make_targets = ""; $make_targets .= " links" if $symlink; $make_targets .= " depend" if $depflags ne $default_depflags && $make_depend; signature.asc Description: This is a digitally signed message part.
[PATCH] Enable setting CC and AR with environment vars
This patch allows the Configure script to detect the ar and cc command via environment variables. Taken from Gentoo package. Please apply. -- Hanno Böck Blog: http://www.hboeck.de/ GPG: 3DBD3B20 Jabber/Mail:[EMAIL PROTECTED] --- Configure +++ Configure @@ -928,7 +928,8 @@ print "IsMK1MF=$IsMK1MF\n"; my @fields = split(/\s*:\s*/,$table{$target} . ":" x 30 , -1); -my $cc = $fields[$idx_cc]; +my $cc = $ENV{'CC'} || $fields[$idx_cc]; +my $ar = $ENV{'AR'} || "ar"; my $cflags = $fields[$idx_cflags]; my $unistd = $fields[$idx_unistd]; my $thread_cflag = $fields[$idx_thread_cflag]; @@ -951,7 +951,7 @@ my $shared_cflag = $fields[$idx_shared_cflag]; my $shared_ldflag = $fields[$idx_shared_ldflag]; my $shared_extension = $fields[$idx_shared_extension]; -my $ranlib = $fields[$idx_ranlib]; +my $ranlib = $ENV{'RANLIB'} || $fields[$idx_ranlib]; my $arflags = $fields[$idx_arflags]; my $no_shared_warn=0; @@ -1292,6 +1292,7 @@ s/^RMD160_ASM_OBJ=.*$/RMD160_ASM_OBJ= $rmd160_obj/; s/^PROCESSOR=.*/PROCESSOR= $processor/; s/^RANLIB=.*/RANLIB= $ranlib/; + s/^AR=ar /AR= $ar /; s/^ARFLAGS=.*/ARFLAGS= $arflags/; s/^PERL=.*/PERL= $perl/; s/^KRB5_INCLUDES=.*/KRB5_INCLUDES=$withargs{"krb5-include"}/; signature.asc Description: This is a digitally signed message part.
Re: Openssl for Java application
Hi, Khoo Wei Hiong, What are you trying to do exactly? If you're doing password-based encryption/decryption with symmetric keys (e.g. AES, 3DES with "openssl enc" on command-line), then the not-yet-commons-ssl java library will help you interop with OpenSSL: http://juliusdavies.ca/commons-ssl/ In particular, here's the link describing the symmetric key password-based-encryption (PBE) stuff: http://juliusdavies.ca/commons-ssl/pbe.html The library can also read any DSA or RSA private key generated by OpenSSL: http://juliusdavies.ca/commons-ssl/pkcs8.html Good luck! yours, Julius On Mon, Jun 2, 2008 at 12:14 AM, Khoo Wei Hiong <[EMAIL PROTECTED]> wrote: > This is my first time to use OpenSSL. I have wrote once to ask for help but > no reply. I would like to write OpenSSL-enabled code in my Java application, > but I have no idea where to start from. What I have explored is that OpenSSL > is meant for C or I might be wrong. > > So, I hope that I will get sufficient information from you on how to > integrate OpenSSL into my Java application. > > > > Thanks. Your help is much appreciated. -- yours, Julius Davies 250-592-2284 (Home) 250-893-4579 (Mobile) http://juliusdavies.ca/ __ OpenSSL Project http://www.openssl.org User Support Mailing Listopenssl-users@openssl.org Automated List Manager [EMAIL PROTECTED]
Re: OpenSSL HTTPS application and Wireshark v1.0.0 (Win32)
Thanks Jean-Marc. Do you think that because my OpenSSL app uses AES-256 for the cipher that that could be the problem? Joe
Re: OpenSSL HTTPS application and Wireshark v1.0.0 (Win32)
Joe Flowers wrote: [...] I can decrypt the HTTPS traffic OK [...] where the HTTPS traffic is initiated from a web browser (IE) on the client machine. BUT, when I try my HTTPS client application (on the client machine, talking to the server machine), the application seems to work correctly other than I am not able to see the decrypted data in Wireshark. [...] Is there a trick to getting Wireshark to work with OpenSSL applications or is there something wrong with my application which prevents Wireshark from decrypting the data? This sounds more like a Wireshark than an openssl question. I suspect, if your configuration of Wireshark is correct, that the negociated ciphersuite uses Diffie-Hellman, so can not be externally decrypted. Two solutions : - configure openssl on your server to disable the DH ciphersuites - use Debian for the server so that's it possible to break the generated DH secret and decrypt the session ;-) __ OpenSSL Project http://www.openssl.org User Support Mailing Listopenssl-users@openssl.org Automated List Manager [EMAIL PROTECTED]
OpenSSL HTTPS application and Wireshark v1.0.0 (Win32)
Hello everyone, Does anyone have ideas on how I can get Wireshark to decrypt my OpenSSL HTTPS client application data? I can decrypt the HTTPS traffic OK to the server machine from the client machine with Wireshark installed on the client machine, where the HTTPS traffic is initiated from a web browser (IE) on the client machine. BUT, when I try my HTTPS client application (on the client machine, talking to the server machine), the application seems to work correctly other than I am not able to see the decrypted data in Wireshark. This is killing me when trying to troubleshoot this application on other client machines. Is there a trick to getting Wireshark to work with OpenSSL applications or is there something wrong with my application which prevents Wireshark from decrypting the data? Thanks for any help or ideas to try! Joe
RE: bug? SSL_ERROR_SSL/EAGAIN from SSL_write()
> The problem is that SSL_write() sometimes returns SSL_ERROR_SSL with > errno equal to EAGAIN. Calling SSL_write() again seems to solve the > problem. I have the impression that SSL_write() should return > SSL_ERROR_WANT_WRITE in this situation. > * the underlying socket is blocking It sounds like you're trying to get some kind of fake halfway-non-blocking operation. This never works quite right. Either use blocking operations on blocking sockets or non-blocking operations on non-blocking sockets. DS __ OpenSSL Project http://www.openssl.org User Support Mailing Listopenssl-users@openssl.org Automated List Manager [EMAIL PROTECTED]
Re: Openssl for Java application
http://noc.kpnw.org/~scott/ http://www.bpsinfo.com/javassl/ http://sponsor.iti.informatik.tu-darmstadt.de/itissl/
bug? SSL_ERROR_SSL/EAGAIN from SSL_write()
Hi all, I'm seeing weird OpenSSL behaviour and I suspect it's a bug in the library. The problem is that SSL_write() sometimes returns SSL_ERROR_SSL with errno equal to EAGAIN. Calling SSL_write() again seems to solve the problem. I have the impression that SSL_write() should return SSL_ERROR_WANT_WRITE in this situation. Please take note that it's very difficult to reproduce the error. I observe it only when sending a particular buffer over SSL and only for some percentage of the tries. With other buffers, everything works ordinarily. Here is some more information about the error. * the error queue contains "rsa routines:RSA_verify:wrong signature length" and "asn1 encoding routines:ASN1_item_verify:EVP lib". * the underlying socket is blocking * I'm using OpenSSL 0.9.8h and Linux 2.6.18 Detailed information about the return values: SSL_write() returned -1 SSL_get_error() returned 1 // the above corresponds to SSL_ERROR_SSL ("A failure in the SSL library occurred, usually a protocol error. The OpenSSL error queue contains more information on the error.") ERR_get_error() returned 67596407 ERR_error_string() returned error:04077077:rsa routines:RSA_verify:wrong signature length ERR_get_error() returned 218910726 ERR_error_string() returned error:0D0C5006:asn1 encoding routines:ASN1_item_verify:EVP lib ERR_get_error() returned 0 errno is 11 // which corresponds to EAGAIN Regards, Aleksander Korzynski __ OpenSSL Project http://www.openssl.org User Support Mailing Listopenssl-users@openssl.org Automated List Manager [EMAIL PROTECTED]
Re: SSL
Hi, There is no way to bypass or override the passphrase associated with your SSL key. The key is encrypted and only the right passphrase can decrypt it to be usable by Apache. If you don't have this passphrase, you should start thinking about generating a new key and acquiring a new SSL certificate. To find what key is Apache using, look in your httpd.conf file to see where the SSL configuration is store and there you will find the path of the SSL key and certificate. Cheers, -- Mounir IDRASSI IDRIX http://www.idrix.fr On Sun, June 1, 2008 11:25 pm, Billy Chan Ting wrote: > Hi there, > > > > Im trying to update an SSL certificate on our server (CentOS) but its > asking for a pass phrase for the server before I can restart httpd and > apache. The guys that created the current expired certificate don't work > here anymore. > > > > How can I overwrite the pass phrase? How do I know which key or > certificate file apache is currently referring to? > > Really need your help as our wireless hotspot login is not working at > the moment because apache is not running. > > > > > > Kind regards, > > Billy Chan-Ting > > Systems Analyst/Webmaster > > Computer Services Limited, Apia, SAMOA > > Tel:(685) 20926 ext 31 > > Mobile: 7702615 > > Email: [EMAIL PROTECTED] > > Ground Floor, SLAC Building > > > > Need a website? www.csl.ws/web > > Having database problems? www.csl.ws/db > > > > > > > > > > __ OpenSSL Project http://www.openssl.org User Support Mailing Listopenssl-users@openssl.org Automated List Manager [EMAIL PROTECTED]
Re: newbie: problem + RSA
Hello, [EMAIL PROTECTED] wrote on 05/30/2008 12:34:15 PM: > Hello, > i have created the following code to test the use of RSA (signautre): > > #include > #include > #include > #include > #include > #include > #include > #include > #include > #include > #include > > main () > { > > long erreur = 0; > char *message="vatos locos para siempre"; > char *encrypt, *decrypt, *sign, hash[SHA_DIGEST_LENGTH],hash1[SHA_DIGEST_LENGTH]; > int longmsg,i,random,ok; > int siglong; > RSA *rsa; > > random= RAND_load_file("/dev/urandom ",1024);//seeding the Pseudo random generator > > rsa = RSA_generate_key(128,13,NULL,NULL);//generating a key having a 128 bits modulus > > SHA1(message,strlen(message),hash);//computing a digest using SHA1 > for(i=0; i<20; ++i){ > printf("%x",hash[i]);} > printf("\n"); > > sign=(unsigned char*)malloc(RSA_size(rsa)); > ok= RSA_sign(NID_sha1,hash,strlen(hash),sign,&siglong,rsa);//generating the > signature using RSA > erreur= ERR_get_error(); > printf("signature = %d \n",ok); > printf("signature length =%d \n",siglong); > printf("erreur =%d \n",erreur); > printf("PRNG random =%d \n",random); > printf("strlen(hash) =%d \n",strlen(hash)); > RSA_free(rsa); > free(sign); > > } > > After i compiled it using: gcc rsa.c -o rsa -lssl > And i received the following results: > ff9c6bffdd1c5dff9157ffdbff93ffab3c23ffe5ffb344ff8b49632 > signature = 0 > signature length =-1209806408 > erreur =67588208 > PRNG random =0 > strlen(hash) =20 > > here are my questions: > 1- why RSA_sign returned a 0 (signautre = 0) which means the failure of the key generation? > 2- why the signautre has a negative value unstead of having 20 bytes length? > 3- why the function RAND_load_file returned zero unstead of returning the number of > bytes obtained after seeding the PRNG? Try: - buffers for RSA_* functions mostly are "unsigned char*", not "char *" - use -Wall at compile time and look at any warnings like "passing argument 2 of ‘RSA_sign’ differ in signedness" - do not use strlen() on signatures, signatures are binary data, not strings - you can not create RSA signature from 160 bit hash using 128 bit RSA key. - add SSL_load_error_strings() and SSL_library_init(). Best regards, -- Marek Marcola <[EMAIL PROTECTED]> :��I"Ϯ��r�m (Z+�K�+1���x��h[�z�(Z+���f�y���f���h��)z{,���
Re: Wider fallout from Debian issue?
Yves Rutschle wrote: On Wed, May 28, 2008 at 07:55:35PM +1200, Deane Sloan wrote: Finally - how real is this concern? What is the probability that say a 2048bit generated key could fall into the 32,767 keys in the metasploit SSH example on unaffected systems? 32,768 = 2^15 number of 2048 bit keys: 2^2048 I think that's really oversimplified. If you look at the OpenSSL RSA key generator, you'll notice that RSA keys are built from 2 prime numbers of 1024 bits. Well not really 1024 bits but 1022 bits because top and bottom bit are always set. Also not all 2^1022 odd numbers between 2^1023 + 1 and 2^1024 - 1 are prime numbers. Also those prime numbers are generated using the output of the OpenSSL RNG which is commonly (assuming no entropy from uninitialized memory, which should be the case on Linux, and no .rnd file) seeded only with the 2^15 bit PID and ENTROPY_NEEDED (32) bytes from urandom. This would mean an upper limit 2^(15+256) = 2^271 keys that can be generated from OpenSSL (within those parameters). Probability that a "proper" key falls in the space of the "bad debian" keys: 2^15 / 2^2048 = 1 / 2^2033. That's a lot of zeros before the first non-zero digit. I get 2^15 / 2^271 = 1 / 2^256 which is a lot less impressive than your figure but still a very small probability. Sincerely, -- Mathias Brossard begin:vcard fn:Mathias Brossard n:Brossard;Mathias org:OpenTrust;R&D email;internet:[EMAIL PROTECTED] title:Senior Architect x-mozilla-html:FALSE version:2.1 end:vcard
Re: SSL
If you don't know the passphrase, you must generate a new keypair, and get that public key certified into a new certificate. (For more information, including the appropriate commands, please refer to the FAQ on openssl.org and any special instructions provided by your CA.) Apache will use PrivateKeyFile and CertificateFile directives (in the httpd.conf) to figure out what files to load from. It will load without a passphrase complaint if the private key is not encrypted by a passphrase. As a side note, if the machine has the ability to start Apache without a passphrase complaint on bootup but is having trouble when you try to start it manually, then the passphrase is somewhere on the disk (probably in the rc.d script to start Apache, or referenced from there). You might be able to locate it by looking through the startup scripts. Good luck. -Kyle H On Sun, Jun 1, 2008 at 2:25 PM, Billy Chan Ting <[EMAIL PROTECTED]> wrote: > Hi there, > > > > Im trying to update an SSL certificate on our server (CentOS) but its asking > for a pass phrase for the server before I can restart httpd and apache. The > guys that created the current expired certificate don't work here anymore. > > > > How can I overwrite the pass phrase? How do I know which key or certificate > file apache is currently referring to? > > Really need your help as our wireless hotspot login is not working at the > moment because apache is not running. > > > > > > Kind regards, > > Billy Chan-Ting > > Systems Analyst/Webmaster > > Computer Services Limited, Apia, SAMOA > > Tel:(685) 20926 ext 31 > > Mobile: 7702615 > > Email: [EMAIL PROTECTED] > > Ground Floor, SLAC Building > > Need a website? www.csl.ws/web > > Having database problems? www.csl.ws/db > > > > > > __ OpenSSL Project http://www.openssl.org User Support Mailing Listopenssl-users@openssl.org Automated List Manager [EMAIL PROTECTED]
Openssl for Java application
This is my first time to use OpenSSL. I have wrote once to ask for help but no reply. I would like to write OpenSSL-enabled code in my Java application, but I have no idea where to start from. What I have explored is that OpenSSL is meant for C or I might be wrong. So, I hope that I will get sufficient information from you on how to integrate OpenSSL into my Java application. Thanks. Your help is much appreciated.
SSL
Hi there, Im trying to update an SSL certificate on our server (CentOS) but its asking for a pass phrase for the server before I can restart httpd and apache. The guys that created the current expired certificate don't work here anymore. How can I overwrite the pass phrase? How do I know which key or certificate file apache is currently referring to? Really need your help as our wireless hotspot login is not working at the moment because apache is not running. Kind regards, Billy Chan-Ting Systems Analyst/Webmaster Computer Services Limited, Apia, SAMOA Tel:(685) 20926 ext 31 Mobile: 7702615 Email: [EMAIL PROTECTED] Ground Floor, SLAC Building Need a website? www.csl.ws/web Having database problems? www.csl.ws/db <>
Strategy for freeing EVP and RSA keys
I'd like confirmation that I understand how to free RSA keys. I create an RSA *key. I then use it to create an EVP_PKEY using EVP_PKEY_new() and EVP_PKEY_assign_RSA(). Later, want to free everything. I _think_ that EVP_PKEY_free() will free both the EVP_PKEY and the RSA objects. Is that correct - that there's an implied free of the RSA object? If so, is this the correct strategy: If the EVP_PKEY was created correctly free the EVP_KEY else if the RSA key created correctly free the RSA key -- Ken Goldman [EMAIL PROTECTED] 914-784-7646 (863-7646) __ OpenSSL Project http://www.openssl.org User Support Mailing Listopenssl-users@openssl.org Automated List Manager [EMAIL PROTECTED]
Install Error OpenSSL-0.9.8h
Greetings, I am receiving the following errors when attempting to install OpenSSL-0.9.8h on SuSE Linux Enterprise 9. However, there was no issue with "make" and "make test". Please advise, Thanks, -Eric ;., SSL.3 => ssl.3 making install in crypto... make[1]: Entering directory `/usr/local/src/openssl-0.9.8h/crypto' cp: cannot create regular file `usr/local/include/openssl/crypto.h': No such file or directory chmod: cannot access `usr/local/include/openssl/crypto.h': No such file or directory cp: cannot create regular file `usr/local/include/openssl/tmdiff.h': No such file or directory chmod: cannot access `usr/local/include/openssl/tmdiff.h': No such file or directory cp: cannot create regular file `usr/local/include/openssl/ opensslv.h': No such file or directory chmod: cannot access `usr/local/include/openssl/opensslv.h': No such file or directory cp: cannot create regular file `usr/local/include/openssl/ opensslconf.h': No such file or directory chmod: cannot access `usr/local/include/openssl/opensslconf.h': No such file or directory cp: cannot create regular file `usr/local/include/openssl/ebcdic.h': No such file or directory chmod: cannot access `usr/local/include/openssl/ebcdic.h': No such file or directory cp: cannot create regular file `usr/local/include/openssl/ symhacks.h': No such file or directory chmod: cannot access `usr/local/include/openssl/symhacks.h': No such file or directory cp: cannot create regular file `usr/local/include/openssl/ ossl_typ.h': No such file or directory chmod: cannot access `usr/local/include/openssl/ossl_typ.h': No such file or directory make[1]: *** [install] Error 1 make[1]: Leaving directory `/usr/local/src/openssl-0.9.8h/crypto' make: *** [install_sw] Error 1 __ OpenSSL Project http://www.openssl.org User Support Mailing Listopenssl-users@openssl.org Automated List Manager [EMAIL PROTECTED]
Developing application with OpenSSL support
Look at this book: Network Security With OpenSSL
openssl 0.9.8 with fips
Hi, I'm wondering about integrating fips into openssl-0.9.8g. We were previously using openssl-0.9.7m, and have noted that the fips1.0 directory is absent in the 0.9.8g release, and also that the "./Configure" script does not contain any of the fips functionality. I did note in some of the documentation that there is an openssl-0.9.8 fips build, I'm wondering if this is currently validated? Also, is this a build that anyone can download? Thank you so much for your time. Sincerely, Beth E. Okun
Debugging i2d_X509() segfault
Subject says it: What a good approach to debugging a segfault in i2d_X509()? The X509 certificate succeeds when I use X509_sign(). But when I sign "by hand", adding the two signature algorithms, signing with RSA_Sign(), and adding the signature to the structure, X509_print_fp() segfaults. The X509 structure (before serialization) verifies. X509_print_fp() on the structure also succeeds. Is there, for example, a way to i2d() the X509 parts to narrow down the problem? -- Ken Goldman [EMAIL PROTECTED] 914-784-7646 (863-7646) __ OpenSSL Project http://www.openssl.org User Support Mailing Listopenssl-users@openssl.org Automated List Manager [EMAIL PROTECTED]
Patches for CVE-2008-0891 and CVE-2008-1672
Hi I am looking for the patches for the recently announced security vulnerabilities(CVE-2008-0891 and CVE-2008-1672) in version 0.9.8f of Openssl. Please let me know if the patches are available in the Openssl site or from Openssl. Thanks & Regards Harini
Re: Wider fallout from Debian issue?
On Thu, May 29, 2008 at 10:14:12AM -0400, Victor Duchovni wrote: > And then knowing that attackers never choose these keys, users start > using these keys because attakers avoid them, and then attackers start > checking these first again, ... This way lies madness. Fix your premise > and don't change it in flight. Agreed. Let's assume that users tend to pick the password "password" when given a choice. Now adversaries try the most common password, namely "password", first. Security conscious admins ban the word "password" as a password. Yes, this does reduce the keyspace a tiny bit. Do adversaries generally stop trying the password "password"? Not generally. For every security-conscious admin or user, there are 99 who are not. For every cutting-edge security expert, there are 99 bottom-feeders who will only get this information years later. I still hear of people trying to tftp /etc/passwd. I think that people will still be trying to brute-force their way in with these keys for ten years. I would ban the use of these keys to gain entry to anything, much like security-conscious admins ban easily-guessed passwords. Only the key space here is much, much larger than typical 8-character passwords, so this loss will be unnoticeable. I personally don't like the idea of generating keys that people will try, or using a weak/known key with small probability, but in this case I think it's so small that simply scanning for and banning such keys is good enough. I was hoping someone would release a tool to search for them in the authorized_keys files on any OS (e.g. my OpenBSD box), but AFAIK, nobody has. I certainly don't want a kluge to the RNG. -- Crypto ergo sum. https://www.subspacefield.org/~travis/ Truth does not fear scrutiny or competition, only lies do. If you are a spammer, please email [EMAIL PROTECTED] to get blacklisted. __ OpenSSL Project http://www.openssl.org User Support Mailing Listopenssl-users@openssl.org Automated List Manager [EMAIL PROTECTED]
newbie: problem + RSA
Hello, i have created the following code to test the use of RSA (signautre): *#include #include #include #include #include #include #include #include #include #include #include main () { long erreur = 0; char *message="vatos locos para siempre"; char *encrypt, *decrypt, *sign, hash[SHA_DIGEST_LENGTH],hash1[SHA_DIGEST_LENGTH]; int longmsg,i,random,ok; int siglong; RSA *rsa; random= RAND_load_file("/dev/urandom ",1024);//seeding the Pseudo random generator rsa = RSA_generate_key(128,13,NULL,NULL);//generating a key having a 128 bits modulus SHA1(message,strlen(message),hash);//computing a digest using SHA1 for(i=0; i<20; ++i){ printf("%x",hash[i]);} printf("\n"); sign=(unsigned char*)malloc(RSA_size(rsa)); ok= RSA_sign(NID_sha1,hash,strlen(hash),sign,&siglong,rsa);**//generating the signature using RSA* * erreur= ERR_get_error(); printf("signature = %d \n",ok); printf("signature length =%d \n",siglong); printf("erreur =%d \n",erreur); printf("PRNG random =%d \n",random); printf("strlen(hash) =%d \n",strlen(hash)); RSA_free(rsa); free(sign); } * After i compiled it using: *gcc rsa.c -o rsa -lssl *And i received the following results: * ff9c6bffdd1c5dff9157ffdbff93ffab3c23ffe5ffb344ff8b49632 signature = 0 **signature length** =-1209806408 erreur =67588208 PRNG random =0 strlen(hash) =20 * here are my questions: 1- why RSA_sign returned a 0 (signautre = 0) which means the failure of the key generation? 2- why the signautre has a negative value unstead of having 20 bytes length? 3- why the function RAND_load_file returned zero unstead of returning the number of bytes obtained after seeding the PRNG? Thank you for your help. have a nice day. -- Aymen
How java application to access OpenSSL toolkit
I am new to openssl. Now I am writing a simple server and client simulators using Java. I would like to know: 1. what are the files that i need to have, in order to use OpenSSL toolkit from my java application? 2. After getting those files, which file i need to access in order to use the methods/functions to build secure communication in my application? 3. For those private key or certificates, can i generate them by writing code in my application or i must use OpenSSL command tool to generate them? Thanks. Your help is very much appreciated.
Re: Wider fallout from Debian issue?
* John Parker wrote on Sat, May 31, 2008 at 15:35 -0500: > > Probability that a "proper" key falls in the space of the > > "bad debian" keys: 2^15 / 2^2048 = 1 / 2^2033. > > > > That's a lot of zeros before the first non-zero digit. > > Put differently, if you were to start generating keys now at a rate > of, say, 1000/s, how long would you have to wait before you got one of > the Debian keys? This is a fun math problem for probability theory > students. wow, big numbers, John! Cool idea to make such a time estimation :) Maybe we should say `a million keys per second', sounds much more but just are three digits less in the result :) Is the calculation that complicated? Aren't the keys independent of each other, so that each key always have the same probability, since we are not `searching' but `guessing' when generating? (beside, that all those values are so horrible big that practically it does not matter of course :-)) With Victor's number of 2013 bits probablility, couldn't we statistically expect half of that? With a million per second does this give (2^2012) / 10^6 / 60 / 60 / 24 / 365.25 years which the 593 digit number 14902094353953870165214353410981143707238235188212334084836694330488\ 81602740116106914618746657670317636941551690018457525299578948872878\ 36765806488289940028625838604817603080995646449473721456572544453618\ 55782431446798772374819591436871325406930507575507226972337350924070\ 18286766525605611643878663746554436287030227901811414516143083673080\ 28892637223535933402770689260083725677906317276399679998875094201786\ 41124284757024653658707346461288521262653417342296719918707161098486\ 04762949019240046008945125630714069482285597143371578237868834348990\ 3212246280855279993597997641265155474006217516831 of years? Seems there even is a number word[1], so are that around a hundred quintillion nonagintacentillions? lol Assuming the age of the universe beeing 13.73 * 10^9 year (http://en.wikipedia.org/wiki/Age_of_the_universe), (2^2012) / 10^6 / 60 / 60 / 24 / 365.25 / (13.73 * 10^9) or `in short': 10853673965006460426230410350314015810078831164029376609495043212300\ 66717217855868109700470981551578759607830801178774599635527275216954\ 38285365250029089605699809617492791756005569154751435875143877970588\ 89863387798105442370589651447102203501041884614353406389175055297938\ 95329036071089301998454962670469363646780938020255946479346747030648\ 42602066441031269776235024952719392336421207047632687544701452441213\ 70083237259304190574440893271149687736819677598176780712823860960295\ 73753058280582699205349690918218550242014273228966917871718014820823\ 249253188700311725680844693464323049818 universe ages would be needed, slighty more than 10^582, which is a funny big number... Even when using `googols' (10^100) as factor it remains terrible... lol SCNR. oki, Steffen [1] http://en.wikipedia.org/wiki/Names_of_large_numbers#Extensions_of_the_standard_dictionary_numbers About Ingenico Throughout the world businesses rely on Ingenico for secure and expedient electronic transaction acceptance. Ingenico products leverage proven technology, established standards and unparalleled ergonomics to provide optimal reliability, versatility and usability. This comprehensive range of products is complemented by a global array of services and partnerships, enabling businesses in a number of vertical sectors to accept transactions anywhere their business takes them. www.ingenico.com This message may contain confidential and/or privileged information. If you are not the addressee or authorized to receive this for the addressee, you must not use, copy, disclose or take any action based on this message or any information herein. If you have received this message in error, please advise the sender immediately by reply e-mail and delete this message. Thank you for your cooperation. __ OpenSSL Project http://www.openssl.org User Support Mailing Listopenssl-users@openssl.org Automated List Manager [EMAIL PROTECTED]
Re: Wider fallout from Debian issue?
* [EMAIL PROTECTED] wrote on Fri, May 30, 2008 at 06:51 -0500: > Back in the day, DES was the de facto encryption algorithm. [...] > In an ideal world, I think the system should throw an exception > then and let the calling application feed it another key. > However, I think the general consensus was that we should just > ignore it. I don't know what the general consensus was, but applications I know do not ignore this situation but handle it by actively rejecting it. Do you meant this by `ignore'? I think best is to consider a weak or semi-weak [3-]DES[1] key as a [3-]DES key acceptable and thus refuse to generate, store or use it[2]. In practice usually it shouldn't be a big deal to iterate a 16 elements table at key generation, which probably usually is much more expensive. So to say that DES is not defined / allowed for those numbers (keys). I think it is a little like division by zero: it simply cannot be done. BTW, testing that can be difficult and probably needs special considerations (e.g. some test driver with special `PRNG without random' generating bits that lead to a weak key to check if the generator correctly detects and refuses it). oki, Steffen [1] A 3DES key with one weak or semi-weak key half should be considered weak (not essentially stronger than single DES). [2] http://en.wikipedia.org/wiki/Weak_key tells as a main countermeasure: `Checking generated keys against a list of known weak keys, or building rejection of weak keys into the key scheduling.' About Ingenico Throughout the world businesses rely on Ingenico for secure and expedient electronic transaction acceptance. Ingenico products leverage proven technology, established standards and unparalleled ergonomics to provide optimal reliability, versatility and usability. This comprehensive range of products is complemented by a global array of services and partnerships, enabling businesses in a number of vertical sectors to accept transactions anywhere their business takes them. www.ingenico.com This message may contain confidential and/or privileged information. If you are not the addressee or authorized to receive this for the addressee, you must not use, copy, disclose or take any action based on this message or any information herein. If you have received this message in error, please advise the sender immediately by reply e-mail and delete this message. Thank you for your cooperation. __ OpenSSL Project http://www.openssl.org User Support Mailing Listopenssl-users@openssl.org Automated List Manager [EMAIL PROTECTED]
Re: Developing application with OpenSSL support
Hi Just got a tutorial and started to write some basic code, will test tomorrow and if it works then will continue with certificates but don't understand too much. I have implemented the urgent code in PHP and it is working, but still want to do it in C++ with my own program, have tested it right now and connects without problems, tomorrow will try I/O through the SSL and if it works will see how to manage the certificates that are not too clear by now, but hope to understand soon. Thanks for your help > Consider "stunnel". Naive, ground-up implementations of SSL/TLS often > accidentally fail to do the job securely. Use an SSL proxy to connect your > non-SSL code to an SSL webserver (provided your execution environment > can restrict access to the proxy, if "stunnel" unix-domain sockets for > the local end-point, file permissions on that is a reasonable approach > on multi-user systems). > > Perhaps there are C++ class libraries that offer a high-level HTTPS > connection primitive (and reasonably robust/flexible server certificate > verification interface). > > -- > Viktor. > __ > OpenSSL Project http://www.openssl.org > User Support Mailing Listopenssl-users@openssl.org > Automated List Manager [EMAIL PROTECTED] > __ OpenSSL Project http://www.openssl.org User Support Mailing Listopenssl-users@openssl.org Automated List Manager [EMAIL PROTECTED]