Hi Peter,
Are you facing any issues similar to
http://rt.openssl.org/Ticket/Display.html?user=guestpass=guestid=3272 ?
or are just commenting on the previous GCM fix?
A quick look at the EVP_AES_XTS_CTX suggests that the only pointer in there
is (*stream) which points to the function which is
- Original Message -
From: Kurt Roeckx k...@roeckx.be
To: openssl-dev@openssl.org
Sent: Saturday, 28 June, 2014 8:05:21 PM
Subject: Re: SSLv2 SSLv3
The most recent stats about servers I know about is:
https://lists.fedoraproject.org/pipermail/security/2014-April/001810.html
Test code suggests it segv's.
XTS128_CONTEXT contains a couple of pointers to expanded AES keys, the expanded keys and the pointers inside the XTS128_CONTEXT are copied, but if the original context has gone away by the time the copy is used the pointers are to disposed of data. Game over.
Seems this patch was 'taken' recently. I have few bugs fixed in the
Padlock patch series. And versions against multiple major versions.
The latest version of this specific patch is at:
please let me out
On Sun, Jun 29, 2014 at 5:55 PM, Rich Salz via RT r...@openssl.org wrote:
old release, old platform, closing ticket.
__
OpenSSL Project http://www.openssl.org
Development
On Mon, Jun 30, 2014, Huzaifa Sidhpurwala wrote:
Hi Peter,
Are you facing any issues similar to
http://rt.openssl.org/Ticket/Display.html?user=guestpass=guestid=3272 ?
or are just commenting on the previous GCM fix?
A quick look at the EVP_AES_XTS_CTX suggests that the only pointer in
On Mon, Jun 30, 2014, Dr. Stephen Henson wrote:
On Mon, Jun 30, 2014, Huzaifa Sidhpurwala wrote:
Hi Peter,
Are you facing any issues similar to
http://rt.openssl.org/Ticket/Display.html?user=guestpass=guestid=3272 ?
or are just commenting on the previous GCM fix?
A quick look
Thanks, for your reply Dr. Henson. I'll stick with the hourly snapshots from
now on.
J. Jeff Clemmer
IT Specialist
Phone: 434-980-7525
Email: john.j.clemmer4@mail.mil
-Original Message-
From: Stephen Henson via RT [mailto:r...@openssl.org]
Sent: Saturday, June 28, 2014 1:58 PM
On Mon, Jun 30, 2014, Hubert Kario wrote:
As far as misconfigured servers go, single DES and export grade ciphers
are much, much more common problem at 20% and 15% respectively.
The security levels code also addresses that. By default any ciphersuite
offering below 80 bits of equivalent
Thank you, Mr. Roeckx.
J.J. Clemmer
-Original Message-
From: Kurt Roeckx via RT [mailto:r...@openssl.org]
Sent: Saturday, June 28, 2014 2:43 PM
To: Clemmer, John J CIV (US)
Cc: openssl-dev@openssl.org
Subject: Re: [openssl.org #3413] OpenSSL Bug Report Submission - related to
#3376
On
On Mon, Jun 30, 2014 at 03:06:35PM +0200, Dr. Stephen Henson wrote:
On Sun, Jun 29, 2014, The Doctor wrote:
This was not an issue in 20140629
[snip]
Please fix.
Should be fixed now thanks for the report.
In future it would help if you indicated which version of OpenSSL
old version, can't reproduce. please open a new ticket if this is still an
issue.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Old issue, cannot reproduce, please open a new ticket if this is still a
problem.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Old platform, old release, old problematic compiler. Closing this ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated
Old issue, can't reproduce, closing ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
When the original submitter writes On my old Linux box... back in 2007, you
know it's old. :)
Old release, old platform, closing ticket.
__
OpenSSL Project http://www.openssl.org
Development
Old release, old platform, closing ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Sorry for the delay in getting back to you. No, we don't support EPF files.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Very old release.
Seems to be a user misunderstanding; DES output isn't text, it's binary.
And DES shouldn't be used these days anyway, :)
__
OpenSSL Project http://www.openssl.org
Development
Very old release, no longer suppported, closing the ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Hey Peter, is that Perl or line noise? :)
Really old release, assume we fixed the problem, please open a new ticket if
still broken.
__
OpenSSL Project http://www.openssl.org
Development Mailing
Old release, can't reproduce, assume we've fixed this. Please open a ticket if
still a problem.
__
OpenSSL Project http://www.openssl.org
Development Mailing List
Old ticket, can't reproduce, closing.
Please open a new ticket if this is still an issue.
__
OpenSSL Project http://www.openssl.org
Development Mailing List
On Po, 2014-06-30 at 15:19 +0200, Dr. Stephen Henson wrote:
On Mon, Jun 30, 2014, Hubert Kario wrote:
As far as misconfigured servers go, single DES and export grade ciphers
are much, much more common problem at 20% and 15% respectively.
The security levels code also addresses that. By
Hello Everyone,
I am running into a problem, where each connection seems to leak hundreds
of file descriptors under the server process. I am a freshy to this group.
Have anyone run into this, or I am the lucky.
Thanks
--GG
server:
openssl s_server -engine cryptodev -key
On Mon, Jun 30, 2014 at 5:01 PM, Dr. Stephen Henson st...@openssl.org
wrote:
On Mon, Jun 30, 2014, Huzaifa Sidhpurwala wrote:
Hi Peter,
Are you facing any issues similar to
http://rt.openssl.org/Ticket/Display.html?user=guestpass=guestid=3272
?
or are just commenting on the previous
On Mon, Jun 30, 2014, Huzaifa Sidhpurwala wrote:
On Mon, Jun 30, 2014 at 5:01 PM, Dr. Stephen Henson st...@openssl.org
wrote:
On Mon, Jun 30, 2014, Huzaifa Sidhpurwala wrote:
Hi Peter,
Are you facing any issues similar to
If the subject line says older AIX and that was 11 years ago... closing
ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
OS/2 is not a supported platform, closing the ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Not a requirement; HMAC needed.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Very old release; old unsupported platform, closing the ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List
It's not immediately obvious, but enforcement of the keyUsage and other
attributes is something the relying party has to do. Anything else means just
trusting the signer, and that is not secure; how do you konw the signer is not
cheating?
Very old release, unsupported platform, ticket is seven years old. Closing it.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Were these done manually or were there scripts?
If scripts, we'd like to see them as we're thinking about the POD format.
__
OpenSSL Project http://www.openssl.org
Development Mailing List
This seems like something for a custom app.
But if I'm wrong, please re-open the ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List
Very old release, old platform, old ticket; closing it.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
I believe all of these things already exist in the current source.
If not, please file a new ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List
Very old releases, unsupported platforms, closing ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Old crypto policy. Closing ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Six years old, can't reproduce, no info given... closing ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List
Can't reproduce. Very old versions. No additional info provided. Closing
ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
That's the copyright we got, and we're not allowed to change it.
Perhaps a rouine is a strange Australian fruit or vegetable?
Closing ticket.
__
OpenSSL Project http://www.openssl.org
Development
Very old release, unsupported platform.
Closing ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Very old release. Unsupported platform. But a cool chip. Nonetheless, closing
the ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List
Very old release, unsupported platform. Closing ticket. G'day, mate.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List
I think the above patch is good, but incomplete.
(As a niggle, it uses jl, which I think is correct because the
argument is signed, but the rest of the file is using jb. The best
answer would be to fix the file to use jl before applying it, but I've
used jb for consistency below.)
Once the crash
Old release, unsupported platform. Closing ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Very old release, unsupported platform, closing ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Very old release, unsupported platform, closing ticket. Long live big iron!
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Very old release, unsupported platform, closing ticket. Long live big iron!
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Very old release, unsupported platform, closing ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Very old release, unsupported platform, closing ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Old unsupported release, closing ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Old release, old platform, cannot reproduce without more information; closing
ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List
No plans at this time. Thanks.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Old release, latest versions believed to work, closing ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List
After upgrading to OpenSSL 1.0.1h, I've found now that when initiating
startTLS connections to a system linked to OpenSSL 1.0.1h, it always tries
to do certificate auth with the client. This causes a lot of failures, for
example with postfix.
I.e., I initiate a connection to port 587 on the
Some unknown hero did this awhile ago. Perhaps it was ... the Batman? :)
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated
very old release, old platform, closing ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Very old release, can't reproduce this.
If it is still happening, PLEASE open a new ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List
Very old release, can't reproduct, closing ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
We are not going to do the ideas in this ticket, but we will be improving the
build system.
Or at least changing it a bit :)
__
OpenSSL Project http://www.openssl.org
Development Mailing List
Very old release, can't reproduce, closing ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
We're pretty sure things compile now .:)
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Very old release, unsuported platform. Closing ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Very old release, unsupported platform, closing ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Very old release, since fixed, no doubt.
Closing ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Very old release, unsupported platform.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Very old release, old platform and toolchain, closing ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Very old release, No doubt fixed by now. Closing ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Very old release, unsupported platform, closing ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Very old release, closing ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Very old release, not supported.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Old release, closing ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Very old release.
If this is still an issue with the 1.0.x releases, please open a new ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List
Old unsupported release.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Unsupported platform.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Fixed some time ago.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Old release, not supported. Closing ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Old unsupported release, unsupported toolchain.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Old unsupported release
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Unsupported platform, can't reproduce, closing ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Old release, unsupported platform.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Old release, unsupported platform, closing ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
-20140630
make ko
in apps/speed.c:318:4
warning: format '%d' expects argument of type 'init', but
argument 3 has type 'DWORD' : BIO_printf(bio_err, unable do
CreateThread (%d),ret);
in apps/s_socket.c in function 'init_client_unix', storage size of
'them' isn't known
I’m confused: uClibc isn’t a platform, it’s a run-time environment (i.e. the C
library).
On Jun 30, 2014, at 4:25 PM, Rich Salz via RT r...@openssl.org wrote:
Unsupported platform.
__
OpenSSL Project
On Tue, Jul 01, 2014 at 12:25:00AM +0200, Rich Salz via RT wrote:
Unsupported platform.
Not having read the ticket, uClibc and newlib might be useful to
support if possible since they're popular for embedded devices.
Kurt
__
--On Monday, June 30, 2014 3:58 PM -0700 Quanah Gibson-Mount
qua...@zimbra.com wrote:
After upgrading to OpenSSL 1.0.1h, I've found now that when initiating
startTLS connections to a system linked to OpenSSL 1.0.1h, it always
tries to do certificate auth with the client. This causes a lot of
Platform in the h/w and s/w sense, not just hardware.
--
Principal Security Engineer
Akamai Technologies, Cambridge, MA
IM: rs...@jabber.me; Twitter: RichSalz
-Original Message-
From: owner-openssl-...@openssl.org [mailto:owner-openssl-
d...@openssl.org] On Behalf Of Philip A.
Feel free to re-open :)
--
Principal Security Engineer
Akamai Technologies, Cambridge, MA
IM: rs...@jabber.me; Twitter: RichSalz
-Original Message-
From: owner-openssl-...@openssl.org [mailto:owner-openssl-
d...@openssl.org] On Behalf Of Kurt Roeckx via RT
Sent: Monday, June 30,
Very old version, and this is a mod_ssl message.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Very old release, unsupported old platform. Closing ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
I'm going to assume that somehow, over the ten year since this was reported,
things got better.
__
OpenSSL Project http://www.openssl.org
Development Mailing List
Very old release, unsupported platform, closing ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
Assume things are better now :) Ten years later, closing the ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List
Believe the poster was compiling with incompatible threads flags on Windows.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Not a bug, closing the ticket.
Hope the original question got an answer :)
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated
There are several tickets about mingw and djgpp builds breaking, or building
software that crashes, and so on.
If you can help me understand the current state of things with those
toolchains, please drop me a line.
Thanks.
--
Principal Security Engineer
Akamai Technologies, Cambridge, MA
IM:
Probably more than one :)
But it's a very old release, closing the ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated
Very old release, not supported platform, closing ticket.
__
OpenSSL Project http://www.openssl.org
Development Mailing List openssl-dev@openssl.org
Automated List Manager
1 - 100 of 104 matches
Mail list logo