The reason that we go to all this trouble to examine alternative sources
of randomness other than CryptGetRandom() is that Microsoft has refused
to publish the sources of randomness which are used. Therefore, we have
no ability to know whether or not the randomness reported by Windows is
in
Ingo:
In other words, this test cannot work in all cases based upon the
knowledge of the OpenSSL developers because the account under which the
program executes is determined by the local system administrator OR the
application developer.
All three of these tests would fail for my use of
In message [EMAIL PROTECTED] on Thu, 07 Aug 2003 11:12:59 +0100, Martin Kochanski
[EMAIL PROTECTED] said:
cardbox Beautiful. Thank you for the quick response.
cardbox
cardbox That'll work until MS put a dummy CloseToolhelp32Snapshot
cardbox call into the main Windows DLLs and then tell you you
At 11:28 11/08/03 +0200, you wrote:
Hi,
to make things clear, how to check if a Win32 exe is currently running
as a NT service:
1.) Check if the SID (security ID) of the current process is S-1-5-18,
i.e. the so called LOCALSYSTEM account. This changes if you configure
your service (in the
]
Betreff: Re: BUG: CreateToolhelp32Snapshot
The reason that we go to all this trouble to examine alternative sources
of randomness other than CryptGetRandom() is that Microsoft has refused
to publish the sources of randomness which are used. Therefore, we have
no ability to know whether
There is more reliable way. For example.
h = GetProcessWindowStation();
if (h==NULL) fatal error; /* or return runs as service */
if (GetUserObjectInformationW (h,UOI_NAME,NULL,0,NULL,len) ||
GetLastError() != ERROR_INSUFFICIENT_BUFFER)
fatal error; /* or return runs as service
On Thu, Aug 07, 2003, Richard Levitte - VMS Whacker wrote:
In message [EMAIL PROTECTED] on Thu, 07 Aug 2003 11:12:59 +0100, Martin Kochanski
[EMAIL PROTECTED] said:
[Toolhelp stuff]
Haven't been following this thread too closely but I've a vague recollection
that ages ago when I did an
-
Von: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Im Auftrag von Jeffrey Altman
Gesendet: Samstag, 9. August 2003 17:48
An: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Betreff: Re: AW: BUG: CreateToolhelp32Snapshot, check if running as NT
service
Ingo:
Thanks for the function. Can you provide
PROTECTED] Im Auftrag von Richard Levitte -
VMS Whacker
Gesendet: Sonntag, 10. August 2003 11:39
An: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Betreff: Re: AW: AW: BUG: CreateToolhelp32Snapshot, check if running as
NT service
In message [EMAIL PROTECTED] on Sun, 10 Aug
2003 02:25:38 +0200, Ingo A. Kubbilun
to make things clear, how to check if a Win32 exe is currently running
as a NT service:
1.) Check if the SID (security ID) of the current process is S-1-5-18,
i.e. the so called LOCALSYSTEM account. This changes if you configure
your service (in the services control panel) to run on a
In message [EMAIL PROTECTED] on Sun, 10 Aug 2003 02:25:38 +0200, Ingo A. Kubbilun
[EMAIL PROTECTED] said:
ingo Jeff:
ingo
ingo In fact, it is sufficient to call the supplied function as described in
ingo my last mail: IsService(EXENAME_SERVICES,EXENAME_WINLOGON,SYSTEM_SID)
ingo The three
In message [EMAIL PROTECTED] on Thu, 07 Aug 2003 08:54:19 +0100, Martin Kochanski
[EMAIL PROTECTED] said:
openssl 1. Minor bug:
openssl
openssl Line 443 of rand_win.c reads (reformatted)
openssl
openssl (handle = snap(TH32CS_SNAPALL,0))!= NULL
openssl
openssl [snap is a variable that
Hi,
sorry, forgot two 'strupr' calls. Please use attached versions.
Rgs, Ingo.
svccheck.zip
Description: Zip compressed data
Ingo:
Thanks for the function. Can you provide a complete blackbox solution
that is simply
BOOL IsService(void)
Please keep in mind that within the RAND_poll() function we have no
input from the application as to the service name, logon session or
account. All of that information would
In message [EMAIL PROTECTED] on Thu, 07 Aug 2003 08:54:19 +0100, Martin Kochanski
[EMAIL PROTECTED] said:
openssl There are three related issues here, all to do with the use of
CreateToolhelp32Snapshot in RAND_poll() in rand_win.c. I'm using OpenSSL 0.9.6g, and
the relevant call is at line
I don't understand what to do to handle this: can you help. I really would like to have this protection.
Randy Shaw
Director of Admin. Operations
City Mission Ministries
[EMAIL PROTECTED]
(909) 757-9748
inline: Piano .jpg
There are three related issues here, all to do with the use of
CreateToolhelp32Snapshot in RAND_poll() in rand_win.c. I'm using OpenSSL 0.9.6g, and
the relevant call is at line 443.
1. Minor bug:
Line 443 of rand_win.c reads (reformatted)
(handle = snap(TH32CS_SNAPALL,0))!= NULL
[snap is
Hello Noel,
You may as well try to find a way to workaround this problem for your
platform, instead of just removing the offending code (which may break
other things) ...
This is taken from the MSDN library description of
CreateToolhelp32Snapshot():
Windows NT/2000/XP: Included in Windows
We've made a Windows app with OpenSSL-0.9.6c but it fails to run on NT4.
The problem:
The procedure entry point CreateToolhelp32Snapshot could not be located
in the dynamic link library KERNEL32.dll
Grepping through the source reveals that the only calls to
CreateToolhelp32Snapshot are in
19 matches
Mail list logo