Wrong again :(

1999-01-20 Thread David Taylor
David Taylor wrote: > If you give a client hello with an existing session id, the client and > server random values will change, but the master secret won't because > the short version of the handshake doesn't do the key exchange. Changing the client and server random values does change the mast

Re: Negotiating new session params when there are multiple connections on the session?

1999-01-20 Thread David Taylor
> I'm trying to avoid doing the whole handshake again - I just want to > change the bulk cipher keys/IVs in use by the connection every now and > again and the SSL and TLS specs say this is done by using the client > hello message with the same session ID as the connection is already > using (see

Re: Negotiating new session params when there are multiple connections on the session?

1999-01-20 Thread David Taylor
> OTOH, wouldn't renegotiation change the session ID and thus avoid the > problem? (I'm saying this without checking, but it seems the obvious > thing to do). Not always! This is the point I'm trying to figure out. I had a cursory look at the OpenSSL code last night and all I could see was that

Re: Dependencies

1999-01-20 Thread Ben Laurie
Ben Laurie wrote: > > It's unfortunate that makedepend insists on tracking down every > > dependency. A flag to say "don't go there" as in -X/usr/include, > > would be a big win. > > Yeah. Before someone points it out, of course, there is one (-Y) but what I, and, I presume, Rich, meant was "go

Re: Dependencies

1999-01-20 Thread Ben Laurie
[EMAIL PROTECTED] wrote: > > (Garg, why does the mailing list set reply-to?) > > >what I actually did was to use makedepend to generate dependencies, and > >then hack it with perl to remove the OS headers. The "depend" target > >does this. If anyone wants OS headers too, they can damn well inven

RE: Dependencies

1999-01-20 Thread salzr
(Garg, why does the mailing list set reply-to?) >what I actually did was to use makedepend to generate dependencies, and >then hack it with perl to remove the OS headers. The "depend" target >does this. If anyone wants OS headers too, they can damn well invent >their own target. Actually, if som

Re: Dependencies

1999-01-20 Thread Ben Laurie
Rich Salz wrote: > > On Sun, 17 Jan 1999, Ben Laurie wrote: > > I'm being driven slowly mad by the number of files that have to be in > > the CVS tree but also get modified by code. Most of them I can deal > > with > > I assume/hope that you'll do the "foo.in --> foo" kind of transform. > > > I

Re: Problem reports.

1999-01-20 Thread Eric Norman
> I am responsible for the server that currently distributes the SSLeay mailing > lists. I believe that these lists should and will die, and interested parties > should move across to openssl lists. Before suggesting this to ssl-users, > I'd like to poll the feeling over here for automatically r

Re: Documentation

1999-01-20 Thread Ben Laurie
[EMAIL PROTECTED] wrote: > > I don't understand why US people can't be given access to the source > tree. I didn't understand that, either, but it didn't seem worth quibbling, because there are other reasons, anyway... > Is it because of a desire to "prove" that nobody from the US exported > so

Re: Legal CYA

1999-01-20 Thread Ben Laurie
sameer wrote: > > So the other thing which I was reminded to make sure was > happening was the required legal CYA that's needed, imo, for an open > source project. Namely the bits saying that if you submit something > you're granting a license (including right to sublicense), warranting >

Re: Documentation

1999-01-20 Thread Ben Laurie
sameer wrote: > > So, I'm lame, and I haven't been paying too much attention to > this list. I realized today, however, that it would be legit for me to > work on documentation for OpenSSL. So what's the status on > documentation? I'm thinking it would be appropriate to setup another > CV

RE: Documentation

1999-01-20 Thread salzr
I don't understand why US people can't be given access to the source tree. Is it because of a desire to "prove" that nobody from the US exported source code? Surely that's (a) too big a hammer (we can, e.g., con- tribute to the ASN1 engine); (b) probably not sufficient proof; and (c) starting do

Re: Problem reports.

1999-01-20 Thread Ben Laurie
Clifford Heath wrote: > > Folk, > > I am responsible for the server that currently distributes the SSLeay mailing > lists. I believe that these lists should and will die, and interested parties > should move across to openssl lists. Before suggesting this to ssl-users, > I'd like to poll the f

Re: Problem reports.

1999-01-20 Thread Clifford Heath
Folk, I am responsible for the server that currently distributes the SSLeay mailing lists. I believe that these lists should and will die, and interested parties should move across to openssl lists. Before suggesting this to ssl-users, I'd like to poll the feeling over here for automatically re

Re: Problem reports.

1999-01-20 Thread Ben Laurie
[EMAIL PROTECTED] wrote: > > Gentlefolk, > > Here's a few problems I've encountered so far with openssl. > > (1) > > In bn_lcl.h, definitions of BN_MULL_SIZE_NORMAL, etc. > My AIX C compiler is not happy with the double slashes. > Are these supposed to be C++ comments? That's what I > told my

Interesting verify problem

1999-01-20 Thread Mark J Cox
I've found some fun bug in OpenSSL that I'll work through later. This only seems to be happening in SSLeay 0.9.1b and anything onwards although I've not yet tried earlier versions yet apart from 0.8.0d (which works). ./openssl s_client -connect www.ukweb.com:443 -CAfile cacert.pem 15929:error:

Re: Negotiating new session params when there are multiple connections on the session?

1999-01-20 Thread Ben Laurie
David Taylor wrote: > > I have a question about session param negotiation when there are a > number of connections attached to the session. > > If the cipher suite stays the same, I imagine everything works fine as > the new session params really only generate connection state (bulk > cipher key

Re: A follow up to my message about session renegotiation

1999-01-20 Thread David Taylor
> > In my last question I mentioned existing connections on a session that > > has had it's master secret changed must continue to use the values > > generated from the old master secret. Is this true or does OpenSSL get > > all the connections to change their bulk cipher keys and IVs? > > The w

Re: Problem reports.

1999-01-20 Thread Eric Norman
> (2) > In s_server.c, the call to SSL_load_client_CA_file uses > the wrong file. It works a lot better if CAfile is used > instead of the client's certificate (s_cert_file). Oops, meant server's certificate. Eric Norman University of Wisconsin

Re: A follow up to my message about session renegotiation

1999-01-20 Thread Eric Norman
> In my last question I mentioned existing connections on a session that > has had it's master secret changed must continue to use the values > generated from the old master secret. Is this true or does OpenSSL get > all the connections to change their bulk cipher keys and IVs? The way I read the

Problem reports.

1999-01-20 Thread ejnorman
Gentlefolk, Here's a few problems I've encountered so far with openssl. (1) In bn_lcl.h, definitions of BN_MULL_SIZE_NORMAL, etc. My AIX C compiler is not happy with the double slashes. Are these supposed to be C++ comments? That's what I told my C compiler they were (AIX option), but maybe I