Re: [openssl-dev] [TLS] Update spec to match current practices for certificate chain order

2015-05-07 Thread Viktor Dukhovni
On Thu, May 07, 2015 at 08:49:21AM +0300, Yoav Nir wrote: I think there was also discussion on this list at some point suggesting changing that MAY for omitting the root CA cert to a SHOULD or a MUST. (I think the argument for the latter was to reduce wasted bandwidth) Sorry, this is

[openssl-dev] [openssl.org #3829] Bug Report

2015-05-07 Thread Rich Salz via RT
- Log - commit 8dfe1e4dd27c21a0ccebbb97d9b6a3612e8d54ef Author: Viktor Dukhovni openssl-us...@dukhovni.org Date: Thu May 7 13:43:36 2015 -0400 Fix typo in valid_star Reviewed-by: Rich Salz rs...@akamai.com

[openssl-dev] [openssl.org #3829] Bug Report

2015-05-07 Thread Rich Salz via RT
Fixed on both master and 1.0.2 the other commit: - Log - commit 8dfe1e4dd27c21a0ccebbb97d9b6a3612e8d54ef Author: Viktor Dukhovni openssl-us...@dukhovni.org Date: Thu May 7 13:43:36 2015 -0400 Fix typo in valid_star Reviewed-by:

Re: [openssl-dev] [openssl-users] Kerberos

2015-05-07 Thread Viktor Dukhovni
On Thu, May 07, 2015 at 08:00:17PM -0400, Nathaniel McCallum wrote: There have been some conversations behind Red Hat doors about improving the state of Kerberos/TLS in both standards and implementations. Could we maybe have a broader conversation about how to fix this situation? To be

Re: [openssl-dev] [openssl-users] Kerberos

2015-05-07 Thread Jeffrey Altman
On 5/7/2015 8:40 PM, Viktor Dukhovni wrote: On Thu, May 07, 2015 at 08:00:17PM -0400, Nathaniel McCallum wrote: There have been some conversations behind Red Hat doors about improving the state of Kerberos/TLS in both standards and implementations. Could we maybe have a broader conversation

[openssl-dev] [openssl.org #1715] DTLS: Finished message is not buffered for retransmition

2015-05-07 Thread Matt Caswell via RT
Don't know when this was fixed - but this is no longer the case. Closing this ticket. Matt ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

[openssl-dev] [openssl.org #1716] Bug report for DTLS

2015-05-07 Thread Matt Caswell via RT
I believe this was fixed some while ago. Closing this ticket. Matt ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

[openssl-dev] [openssl.org #2535] [PATCH] Add SCTP support for DTLS (RFC 6083)

2015-05-07 Thread Matt Caswell via RT
SCTP support was added, but this ticket doesn't seem to have been closed. Closing it now. Matt ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

[openssl-dev] [openssl.org #1711] DTLS: Handshake does not detect missing/incomplete records in flight.

2015-05-07 Thread Matt Caswell via RT
I don't believe this is an issue any more. Therefore I am closing this ticket. Matt ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

[openssl-dev] [openssl.org #1714] DTLS: Memory leak when server receives close alert from unknown peer

2015-05-07 Thread Matt Caswell via RT
This was fixed some while ago. Closing ticket. Matt ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

[openssl-dev] [openssl.org #2869] [PATCH] DTLS Mobility support

2015-05-07 Thread Matt Caswell via RT
Thanks for your submission. In the absence of an RFC for this, we will not be applying this patch. Matt ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

[openssl-dev] [openssl.org #2808] [PATCH] DTLS/SCTP Finished Auth Bug

2015-05-07 Thread Matt Caswell via RT
This patch already seems to have been applied. Closing this ticket. Matt ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

[openssl-dev] [openssl.org #2246] dtls1.h includes winsock.h, overriding the #undefs from ossl_typ.h on Windows

2015-05-07 Thread Matt Caswell via RT
I don't believe the specific compilation problems described are a current issue. dtls1.h does still include winsock.h as previously discussed on openssl-dev (re ticket 2187). This has been removed from the forthcoming OpenSSL 1.1.0. Closing this ticket. Matt

[openssl-dev] [openssl.org #2809] [PATCH] DTLS/SCTP struct authchunks Bug

2015-05-07 Thread Matt Caswell via RT
This patch seems to have already been applied. Closing this ticket. Matt ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

[openssl-dev] [openssl.org #3662] [bug report]DTLS memory leak in dtls1_accept when use PSK in opensll 1.0.1j

2015-05-07 Thread Matt Caswell via RT
Please see: https://www.openssl.org/support/faq.html#PROG13 Also see RT ticket 3824. Closing this ticket as 3824 seems the better place to track this issue. Matt ___ openssl-dev mailing list To unsubscribe:

[openssl-dev] [openssl.org #2829] OpenSSL port in FreeBSD: DTLS networking problem

2015-05-07 Thread Matt Caswell via RT
I would be interested in seeing patches against master to provide this capability on platforms other than Linux. In particular Windows would be very useful. However, given the length of time this issue has been open, and the absence of a patch, I am closing this ticket for now. Matt

[openssl-dev] [openssl.org #3529] [PATCHv2] ASN1 generation: allow bit strings ending with zero regardless of length

2015-05-07 Thread Kaarle Ritvanen via RT
New version of the patch, rebased against the master branch. --- crypto/asn1/a_bitstr.c | 12 +--- crypto/asn1/asn1_gen.c | 15 ++- include/openssl/asn1.h | 1 + 3 files changed, 20 insertions(+), 8 deletions(-) diff --git a/crypto/asn1/a_bitstr.c b/crypto/asn1/a_bitstr.c

[openssl-dev] [openssl.org #3839] [BUG][PATCH] Compilation error when building with EVP_CHECK_DES_KEY

2015-05-07 Thread Michele Cicciotti via RT
A simple typo in des_ede_init_key. See the attached patch diff -r -u crypto/evp/e_des3.c crypto/evp/e_des3.c --- crypto/evp/e_des3.c 2015-03-19 14:30:36.0 +0100 +++ crypto/evp/e_des3.c 2015-05-07 16:05:04.0 +0200 @@ -289,7 +289,7 @@ # endif # ifdef EVP_CHECK_DES_KEY if

[openssl-dev] [openssl.org #3711] [RFC PATCH] 1.0.2 regresssion: Wrong SSL version in DTLS_BAD_VER ClientHello

2015-05-07 Thread Matt Caswell via RT
Closing this ticket now. I've given some consideration to the proposal for a DTLSv0_9_client_method(). I think however that the audience for this is *very* limited...certainly no new applications should be using this. I am sincerely hoping that sooner or later the whole DTLS1_BAD_VER thing will

[openssl-dev] [openssl.org #3838] [PATCH] Fix the comment for POINT_CONVERSION_UNCOMPRESSED, the z should be 0x04 but not 0x02.

2015-05-07 Thread Tim Zhang via RT
Fix the comment for POINT_CONVERSION_UNCOMPRESSED, the z should be 0x04 but not 0x02. $ more mydiffs.patch diff -ur openssl-orig/include/openssl/ec.h openssl-work/include/openssl/ec.h --- openssl-orig/include/openssl/ec.h 2015-05-07 11:37:05.594525940 +0800 +++

[openssl-dev] [openssl.org #2484] [PATCH] DTLS: wrong fragment reassembly

2015-05-07 Thread Matt Caswell via RT
I don't believe this is a current issue. Please reopen if it is. Closing this ticket. Matt ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

[openssl-dev] [openssl.org #2662] NPN patch breaks DTLS Finished exchange

2015-05-07 Thread Matt Caswell via RT
Don't know when this was fixed but this is no longer the case. Closing ticket. Matt ___ openssl-dev mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-dev

[openssl-dev] [openssl.org #2539] bug: OpenSSL 1.0.0d - unexpected DTLS handshake retransmits

2015-05-07 Thread Matt Caswell via RT
I am unable to read the attached pcap for some reason. However the suggested patch does not look correct to me. The timer should be started at this point in order to retransmit the Client's Finished message if required. Without access to the pcap there isn't enough information in this report for