[openssl-users] Is RC4-MD5 disabled on Openssl-1.0.1h
HI, I have a query for SSl cipher on Openssl-1.0.1h Have an application which is using library compiled with openssl-1.0.1h. Application is failing in func SSL_CTX_set_cipher_list() when input is " RC4-MD5+RC4-SHA" and it gets succeed when input is "RC4-SHA". Not sure whether "RC4-MD5" is disabled by default on openssl-1.0.1h. Earlier application was using openssl-0.9.8d. There it used to work fine.. If that is the case, is there a way to enable RC4-MD5 on openssl-1.0.1h. Tried looking opensource link, couldn't find a way to explicitly enable this algorithm or even if it is diabled by default. Any Inputs for same will be appreciated.. Thanks Mukesh ___ openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] FIPS Linux kernel documentation ?
On Wed, 25 Mar 2015 17:03:04 -0400 Steve Marquess wrote: > I wasn't aware the Linux kernel (the real one, not proprietary > commercial derivatives) had a "FIPS" mode. Please enlighten me. It could very well be that the word 'mode' is not the right one. 'option' would perhaps be better. This article from 2009 sets the foundation: http://www.guerilla-ciso.com/archives/793 I wonder, 6 years later, what the kernel fips option implies. Maybe I could try to contact Neil Horman andéor look into the sources. ___ openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] FIPS Linux kernel documentation ?
On 03/25/2015 04:12 PM, jonetsu wrote: > Hello, > > This is not about OpenSSL, although from experience, maybe some know > the answer. Does anyone know if actual documentation exists for the > Linux kernel FIPS mode apart from the source itself ? There is > nothing in Documentation/ as per 3.18.2. - thanks. I wasn't aware the Linux kernel (the real one, not proprietary commercial derivatives) had a "FIPS" mode. Please enlighten me. -Steve M. -- Steve Marquess OpenSSL Software Foundation, Inc. 1829 Mount Ephraim Road Adamstown, MD 21710 USA +1 877 673 6775 s/b +1 301 874 2571 direct marqu...@opensslfoundation.com marqu...@openssl.com gpg/pgp key: http://openssl.com/docs/0x6D1892F5.asc ___ openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] FIPS Linux kernel documentation ?
On Wed, Mar 25, 2015 at 4:12 PM, jonetsu wrote: > Hello, > > This is not about OpenSSL, although from experience, maybe some know the > answer. Does anyone know if actual documentation exists for the Linux kernel > FIPS mode apart from the source itself ? There is nothing in Documentation/ > as per 3.18.2. - thanks. > NIST should have a security policy on file. The security policy is required documentation. Jeff ___ openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
[openssl-users] FIPS Linux kernel documentation ?
Hello, This is not about OpenSSL, although from experience, maybe some know the answer. Does anyone know if actual documentation exists for the Linux kernel FIPS mode apart from the source itself ? There is nothing in Documentation/ as per 3.18.2. - thanks. Regards. ___ openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
[openssl-users] FIPS: Which DRBG is default ?
Hello, When an application does not define OPENSSL_DRBG_DEFAULT_TYPE nor OPENSSL_DRBG_DEFAULT_FLAGS nor any compilation options (if applicable), is the default DRBG the 256 bit CTR AES (+ deviation function) in FIPS mode ? Regards. ___ openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] ChaCha20/Poly1305 in OpenSSL?
> I see Adam Langley's patch here: > https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9a8646510b > > Any ideas why it was not accepted or not merged? (I'm assuming it was not > merged because it was rejected for some reason). I thought his patch came before the IETF final doc, which changed some things. ___ openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] ChaCha20/Poly1305 in OpenSSL?
On Mon, Mar 23, 2015 at 10:36 AM, Salz, Rich wrote: > It's unlikely to appear in 1.0.2 as it's a new feature. > > CloudFlare has posted patches that seem like they would drop in easily, for > folks that want to do it; see > https://blog.cloudflare.com/do-the-chacha-better-mobile-performance-with-cryptography/ > Thanks Rich. I see Adam Langley's patch here: https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=9a8646510b Any ideas why it was not accepted or not merged? (I'm assuming it was not merged because it was rejected for some reason). Jeff ___ openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] How to get encryption strength?
Very helpful. Thank you Steve. Dirk On 25.03.2015 16:35, Dr. Stephen Henson wrote: > On Wed, Mar 25, 2015, Dirk Menstermann wrote: > >> Hello, >> >> which API function can I use to obtain the bit strength of the key exchange >> (size of the DH or ECDH parameters)? >> >> There is the function SSL_get_cipher_bits, but this is only for the symmetric >> cipher, not including the key exchange. >> > > This is only supported in OpenSSL 1.0.2 and later. You can call > SSL_get_server_tmp_key() to get the peer temporary key. This returns an > EVP_PKEY structue which you can then analyse further. > > Check out the function ssl_print_tmp_key() in apps/s_cb.c for a simple > example. > > Steve. > -- > Dr Stephen N. Henson. OpenSSL project core developer. > Commercial tech support now available see: http://www.openssl.org > ___ > openssl-users mailing list > To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users > ___ openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] Regarding server side sessions support
On Wed, Mar 25, 2015 at 03:32:08PM +, Dr. Stephen Henson wrote: > > I am trying to implement server side caching support for sessions by > > using callback functions. However, the callback functions are never > > being called, even though connection happens successfully without > > session resumption. For your reference some of the sample code I am > > pasting below: > > > > ssl_session_ctx_id = 1; > > SSL_CTX_set_session_id_context (c, (void *)&ssl_session_ctx_id, sizeof > > (ssl_session_ctx_id)); > > SSL_CTX_set_session_cache_mode(c, SSL_SESS_CACHE_SERVER | > > SSL_SESS_CACHE_NO_INTERNAL); > > SSL_CTX_sess_set_new_cb (c, custom_new_session_cb ); > > SSL_CTX_sess_set_remove_cb (c, custom_remove_session_cb ); > > SSL_CTX_sess_set_get_cb (c, custom_get_session_cb); > > > > > > Can somebody kindly help me as to what I am missing out here? What > > could be the reason behind the callback functions not being called? > > The client could be using session tickets which don't use a session cache. You > can try disabling them by setting SSL_OP_NO_TICKET. I would NOT recommend disabling session tickets, they are better than server-side caches. That said, Postfix supports both, ahd the callbacks are called. See lines 624-669 of: https://github.com/vdukhovni/postfix/blob/master/postfix/src/tls/tls_server.c -- Viktor. line 165: static const char server_session_id_context[] = "Postfix/TLS"; lines 624-669: if (cachable || ticketable || props->set_sessid) { /* * Initialize the session cache. * * With a large number of concurrent smtpd(8) processes, it is not a * good idea to cache multiple large session objects in each process. * We set the internal cache size to 1, and don't register a * "remove_cb" so as to avoid deleting good sessions from the * external cache prematurely (when the internal cache is full, * OpenSSL removes sessions from the external cache also)! * * This makes SSL_CTX_remove_session() not useful for flushing broken * sessions from the external cache, so we must delete them directly * (not via a callback). * * Set a session id context to identify to what type of server process * created a session. In our case, the context is simply the name of * the mail system: "Postfix/TLS". */ SSL_CTX_sess_set_cache_size(server_ctx, 1); SSL_CTX_set_session_id_context(server_ctx, (void *) &server_session_id_context, sizeof(server_session_id_context)); SSL_CTX_set_session_cache_mode(server_ctx, SSL_SESS_CACHE_SERVER | SSL_SESS_CACHE_NO_AUTO_CLEAR); if (cachable) { app_ctx->cache_type = mystrdup(props->cache_type); SSL_CTX_sess_set_get_cb(server_ctx, get_server_session_cb); SSL_CTX_sess_set_new_cb(server_ctx, new_server_session_cb); } /* * OpenSSL ignores timed-out sessions. We need to set the internal * cache timeout at least as high as the external cache timeout. This * applies even if no internal cache is used. We set the session * lifetime to twice the cache lifetime, which is also the issuing * and retired key validation lifetime of session tickets keys. This * way a session always lasts longer than the server's ability to * decrypt its session ticket. Otherwise, a bug in OpenSSL may fail * to re-issue tickets when sessions decrypt, but are expired. */ SSL_CTX_set_timeout(server_ctx, 2 * scache_timeout); } ___ openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] How to get encryption strength?
On Wed, Mar 25, 2015, Dirk Menstermann wrote: > Hello, > > which API function can I use to obtain the bit strength of the key exchange > (size of the DH or ECDH parameters)? > > There is the function SSL_get_cipher_bits, but this is only for the symmetric > cipher, not including the key exchange. > This is only supported in OpenSSL 1.0.2 and later. You can call SSL_get_server_tmp_key() to get the peer temporary key. This returns an EVP_PKEY structue which you can then analyse further. Check out the function ssl_print_tmp_key() in apps/s_cb.c for a simple example. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org ___ openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
Re: [openssl-users] Regarding server side sessions support
On Wed, Mar 25, 2015, Sahib Jakhar wrote: > Hi, > > I am trying to implement server side caching support for sessions by > using callback functions. However, the callback functions are never > being called, even though connection happens successfully without > session resumption. For your reference some of the sample code I am > pasting below: > > ssl_session_ctx_id = 1; > SSL_CTX_set_session_id_context (c, (void *)&ssl_session_ctx_id, sizeof > (ssl_session_ctx_id)); > SSL_CTX_set_session_cache_mode(c, SSL_SESS_CACHE_SERVER | > SSL_SESS_CACHE_NO_INTERNAL); > SSL_CTX_sess_set_new_cb (c, custom_new_session_cb ); > SSL_CTX_sess_set_remove_cb (c, custom_remove_session_cb ); > SSL_CTX_sess_set_get_cb (c, custom_get_session_cb); > > > Can somebody kindly help me as to what I am missing out here? What > could be the reason behind the callback functions not being called? > The client could be using session tickets which don't use a session cache. You can try disabling them by setting SSL_OP_NO_TICKET. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org ___ openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
[openssl-users] Regarding server side sessions support
Hi, I am trying to implement server side caching support for sessions by using callback functions. However, the callback functions are never being called, even though connection happens successfully without session resumption. For your reference some of the sample code I am pasting below: ssl_session_ctx_id = 1; SSL_CTX_set_session_id_context (c, (void *)&ssl_session_ctx_id, sizeof (ssl_session_ctx_id)); SSL_CTX_set_session_cache_mode(c, SSL_SESS_CACHE_SERVER | SSL_SESS_CACHE_NO_INTERNAL); SSL_CTX_sess_set_new_cb (c, custom_new_session_cb ); SSL_CTX_sess_set_remove_cb (c, custom_remove_session_cb ); SSL_CTX_sess_set_get_cb (c, custom_get_session_cb); Can somebody kindly help me as to what I am missing out here? What could be the reason behind the callback functions not being called? Thanks Sahib ___ openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users
[openssl-users] How to get encryption strength?
Hello, which API function can I use to obtain the bit strength of the key exchange (size of the DH or ECDH parameters)? There is the function SSL_get_cipher_bits, but this is only for the symmetric cipher, not including the key exchange. Thanks Dirk ___ openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users