Re: Trying to understand the Windows build

2001-12-03 Thread Bodo Moeller
On Tue, Nov 27, 2001 at 01:06:49PM +0100, Richard Levitte - VMS Whacker wrote: I've looked at util/mk1mf.pl and wondered for a long time why it does it's own configuration stuff (from all the util/pl/*.pl files) instead of relying on data created by Configure. When one looks in Configure,

Re: CertificateExtensions (id-ce) definition problem

2001-12-03 Thread Bodo Moeller
On Fri, Nov 30, 2001 at 10:36:23PM -0500, Matt Cooper wrote: The 0.9.6b distribution contains the following in Objects.h: (~line 455) #define SN_ld_ce ld-ce #define NID_ld_ce 81 #define OBJ_ld_ce 2L,5L,29L If you recreate the

Re: openssl-0.9.6b build failure 64bit gcc3.0.1 Solaris 8

2001-10-17 Thread Bodo Moeller
Doug Moore [EMAIL PROTECTED]: Failure during big number tests. Make report output is attached... [...] test BN_sqr Square test failed! Please repeat the test using the current 0.9.6 snapshot available at URL: ftp://ftp.openssl.org/snapshot;type=d. A bug in BN_sqr() was recently fixed.

OpenSSL version 0.9.6c released

2001-12-22 Thread Bodo Moeller
OpenSSL version 0.9.6c released === OpenSSL - The Open Source toolkit for SSL/TLS http://www.openssl.org/ The OpenSSL project team is pleased to announce the release of version 0.9.6c of our open source toolkit for SSL/TLS. This new OpenSSL version is mostly a

Re: [PATCH] tls connetion

2001-12-28 Thread Bodo Moeller
On Fri, Dec 21, 2001 at 01:15:46PM -0800, d p chang wrote: There appears to be a bug in s3_read_bytes when trying to make a connection to a port open for a non-tls service. As the comment indicates, tls client just ignores records that it doesn't know about, but the current code does not try

Re: netscape 6.2 crash

2002-01-17 Thread Bodo Moeller
On Mon, Dec 10, 2001 at 11:23:53AM +0100, Daniel Pettersson wrote: I have seen the same problem, the server just hangs forever when connecting with Netscape 6.[1|2]. On Sat, 1 Dec 2001, Tim Regovich wrote: New subscriber. I checked the archives,m didnt find anything appropriate., run

Re: netscape 6.2 crash

2002-01-19 Thread Bodo Moeller
Tim Regovich [EMAIL PROTECTED]: Interesting. I see what you mean wrt Netscape. So I tried two things : 1) wrapped the SSL_accept call with a sigaction/alarm scheme. it ends up timing out, and continuing, and everything is fine (provied of course that I assume the timeout means that

Re: An openssl shared library versioning problem

2002-01-25 Thread Bodo Moeller
On Thu, Jan 10, 2002 at 08:18:34PM +, Joe Orton wrote: Have we changed CRYPTO_NUM_LOCKS between patch levels? I can't recall that we have. If we have, that's unfortunate. Yes, afraid so, these changed between b and c... the only other Hmm. Thinking of it, I'm not sure if that should

Re: idea_mul buggy ?

2002-01-31 Thread Bodo Moeller
[EMAIL PROTECTED]: I've attached a test program that spits them out to you. a=0; b=0; do { do { idea_mul1(r1,a,b,ul); r2=idea_mul3(a,b); if(r1!=r2) fprintf(stderr, ?? r1!=r2 (a=0x%04x,b=0x%04x) (r1=0x%04x,r2=0x%04x)} \n,a,b,r1,r2); } while(++a !=

Re: idea_mul buggy ?

2002-02-01 Thread Bodo Moeller
Anyway. That has not been the initial question. Is there anything wrong with the three different implementations of the mul procedure ? I think that's more important. Since (as you might have seen) mul1 and mul2 do generate different results due to the fact that the idae_mul1 macro

Re: Error Stack Question

2002-02-01 Thread Bodo Moeller
Verdon Walker [EMAIL PROTECTED] in epsilon.openssl.bugs: We ran into a small piece of code in ssl_rsa.c that is confusing us. In SSL_CTX_use_certificate_chain_file(), the following code fragment exists: ret=SSL_CTX_use_certificate(ctx,x); if (ERR_peek_error() != 0) ret = 0; /*

Re: idea_mul buggy ?

2002-02-01 Thread Bodo Moeller
Sebastian Kloska [EMAIL PROTECTED]: Please provide example inputs where the results differ. A single a, b pair is enough. The program iterates through all a's and and b's from 0-0x That should be sufficient Given that you already ran the program and don't have to fight with the

Re: cvs commit: openssl/crypto/des str2key.c

2002-02-06 Thread Bodo Moeller
On Wed, Feb 06, 2002 at 04:40:10PM +0100, Richard Levitte - VMS Whacker wrote: This looks like an incompatible change (not just a bugfix), so it definitely should be documented in CHANGES. (Or, if compatibility is important here, the change should not be done at all.) I'm a little unsure

Re: an attack against SSH2 protocol

2002-02-08 Thread Bodo Moeller
Wei Dai [EMAIL PROTECTED]: [Posted to sci.crypt and the IETF SSH working group mailing list.] Phil Rogaway observed that CBC mode is not secure against chosen- plaintext attack if the IV is known or can be predicted by the attacker before he choses his plaintext [1]. Similarly, CBC mode

Re: race condition in openssl 0.9.6b/c

2002-02-08 Thread Bodo Moeller
Dax Kelson [EMAIL PROTECTED]: I'm having a problem where two RHL7.2 LDAP clients out of many don't authenticate against an OpenLDAP server. They are using starttls to connect to the server. The chain is sshd - pam_ldap - openldap - OpenSSL. In openldap-2.0.21/libraries/libldap/tls.c

Re: [ietf-tls] Re: an attack against SSH2 protocol

2002-02-13 Thread Bodo Moeller
On Wed, Feb 13, 2002 at 03:57:59PM +0200, Hugo Krawczyk wrote: [...] Thus, future revisions of TLS should also take this into account. That is, either transmit a fresh (unpredictable) IV with each msg, or implcitly compute this IV in an *unpredictable* way, for example by applying a prf to

Re: OpenSSL Security Advisory

2010-03-25 Thread Bodo Moeller
On Mar 25, 2010, at 6:33 PM, Jean-Marc Desperrier wrote: OpenSSL wrote: Record of death vulnerability in OpenSSL 0.9.8f through 0.9.8m How comes the vulnerability doesn't touch 0.9.8e though the patched file wasn't modified between 0.9.8e and 0.9.8f ? But that code was modified between

Re: openssl 0.9.8n issue with no-tlsext

2010-03-30 Thread Bodo Moeller
On Mar 30, 2010, at 3:04 PM, Adam Langley wrote: On Tue, Mar 30, 2010 at 7:35 AM, Thomas Jarosch thomas.jaro...@intra2net.com wrote: 28141:error:14092073:SSL routines:SSL3_GET_SERVER_HELLO:bad packet length:s3_clnt.c:878: openssl is compiled with the no-tlsext option. no-tlsext was added

Re: [openssl.org #1833] [PATCH] Abbreviated Renegotiations

2010-09-06 Thread Bodo Moeller
On Sep 6, 2010, at 10:39 AM, Darryl Miles wrote: The only user of these field(s) is libssl.so itself. The exact meaning, usage and interpretation of the field(s) is a matter of implementation detail which is encapsulated and presented to the application via the document OpenSSL APIs.

OpenSSL 1.0.0d released

2011-02-08 Thread Bodo Moeller
p4qKI7363uBnLgLGQIgS8BBar0n8QARYv4t6c7O+HR3Kn7VCix8cErUm5MkoL79n C2YJVRKPmpuwoPkLGwC6beB1fBiwvUaJd/n+BSU5LO534QcSzF+u4UKczsGnPX72 HSA/Mzf8C6w= =Rpu4 -END PGP SIGNATURE- -- Bodo Moellerb...@openssl.org OpenSSL Project http://www.openssl.org

OpenSSL Security Advisory: OCSP stapling vulnerability

2011-02-08 Thread Bodo Moeller
. Neel Mehta (Google) identified the vulnerability. Adam Langley and Bodo Moeller (Google) prepared the fix. Which applications are affected - --- Applications are only affected if they act as a server and call SSL_CTX_set_tlsext_status_cb on the server's SSL_CTX

OpenSSL Security Advisory: OCSP stapling vulnerability

2011-02-08 Thread Bodo Moeller
. Neel Mehta (Google) identified the vulnerability. Adam Langley and Bodo Moeller (Google) prepared the fix. Which applications are affected - --- Applications are only affected if they act as a server and call SSL_CTX_set_tlsext_status_cb on the server's SSL_CTX

OpenSSL 1.0.0d released

2011-02-08 Thread Bodo Moeller
p4qKI7363uBnLgLGQIgS8BBar0n8QARYv4t6c7O+HR3Kn7VCix8cErUm5MkoL79n C2YJVRKPmpuwoPkLGwC6beB1fBiwvUaJd/n+BSU5LO534QcSzF+u4UKczsGnPX72 HSA/Mzf8C6w= =Rpu4 -END PGP SIGNATURE- -- Bodo Moellerb...@openssl.org OpenSSL Project http://www.openssl.org

Re: OpenSSL 1.0.0d released

2011-02-08 Thread Bodo Moeller
On Tue, Feb 8, 2011 at 7:48 PM, Corinna Vinschen vinsc...@redhat.comwrote: OpenSSL version 1.0.0d released I'm missing an official release mail for 0.9.8r. Will you create one? I wasn't planning to -- http://www.openssl.org/news/secadv_20110208.txt also announces 0.9.8r for those using the

Re: OpenSSL Security Advisory: OCSP stapling vulnerability

2011-02-09 Thread Bodo Moeller
Thanks, Rob; I have updated the Security Advisory at http://www.openssl.org/news/secadv_20110208.txt. Bodo

Re: openssl-1.0.1-stable-SNAP-20111019 failure

2011-10-19 Thread Bodo Moeller
On Wed, Oct 19, 2011 at 4:48 PM, Kenneth Robinette supp...@securenetterm.com wrote: The openssl-1.0.1-stable-20111019 build fails as follows: fips_premain.c link /nologo /subsystem:console /opt:ref /debug /dll /map /base:0xFB0 /out:o ut32dll\libeay32.dll /def:ms/LIBEAY32.def

Re: Limiting EC curves in ClientHello

2012-02-29 Thread Bodo Moeller
It appears there is no way to specify that only a subset should be used? Yes, this is a know deficiency in the current code. I'm more familiar with the server side, but I think it's similar: if you set up *one* curve, then negotiation should happen accordingly; if you use a callback to provide

Re: Limiting EC curves in ClientHello

2012-03-01 Thread Bodo Moeller
On Thu, Mar 1, 2012 at 11:16 AM, Erik Tkal et...@juniper.net wrote: I looked around and found RFC 5430 - Suite B Profile for Transport Layer Security (TLS), which states: RFC 4492 defines a variety of elliptic curves. For cipher suites defined in this specification, only secp256r1(23)

Re: Limiting EC curves in ClientHello

2012-03-01 Thread Bodo Moeller
On Thu, Mar 1, 2012 at 4:06 PM, Erik Tkal et...@juniper.net wrote: You mentioned previously that you can get it to specify none or one curve? I don’t see how you would specify this, as it appears the client hello preparation adds all of them is any EC cipher suite is specified? Oh, sorry, you

Re: Limiting EC curves in ClientHello

2012-03-05 Thread Bodo Moeller
On Thu, Mar 1, 2012 at 11:28 PM, Erik Tkal et...@me.com wrote: So then the question is will this be addressed in 1.0.1 or later? Probably a bit later. Bodo

Re: [openssl.org #2765] openssl negotiates ECC ciphersuites in SSL 3.0

2012-03-17 Thread Bodo Moeller
On Sat, Mar 17, 2012 at 3:53 PM, Stephen Henson via RT r...@openssl.orgwrote: My reading of RFC4492 is that the ECC ciphersuites apply only to TLS 1.0 or later. According to it: This document describes additions to TLS to support ECC, applicable both to TLS Version 1.0 [2] and to TLS

Re: OpenSSL 1.0.1c deadlock

2012-09-05 Thread Bodo Moeller
We've managed on a few occasions now to reproduce an issue where OpenSSL deadlocks while trying to acquire a mutex it already has. I filed http://rt.openssl.org/Ticket/**Display.html?id=2866http://rt.openssl.org/Ticket/Display.html?id=2866 about this issue. I currently have a server where

Re: OpenSSL 1.0.1c deadlock

2012-09-05 Thread Bodo Moeller
On Wed, Sep 5, 2012 at 3:06 PM, Bodo Moeller bmoel...@acm.org wrote: We've managed on a few occasions now to reproduce an issue where OpenSSL deadlocks while trying to acquire a mutex it already has. I filed http://rt.openssl.org/Ticket/**Display.html?id=2866http://rt.openssl.org/Ticket

Re: [CVS] OpenSSL: OpenSSL_1_0_1-stable: openssl/crypto/ cryptlib.c

2012-09-18 Thread Bodo Moeller
Doh. I see it doesn't write to it. Nevertheless, seems like a bad piece of code - its assuming errno is thread local, right? This code uses the address of errno as a default thread ID for OpenSSL purposes. This works precisely because you typically have something like #define errno

Re: OCB Authenticated Encryption

2013-02-05 Thread Bodo Moeller
On Tue, Feb 5, 2013 at 9:20 AM, Ted Krovetz t...@krovetz.net wrote: At last month's Workshop on Real-World Cryptography at Stanford University, Phil Rogaway released a new license for OCB, granting free use for all open-source implementations.

Re: OCB Authenticated Encryption

2013-02-05 Thread Bodo Moeller
On Tue, Feb 5, 2013 at 1:41 PM, Ted Krovetz t...@krovetz.net wrote: There are actually two licenses. The second allows all software (even closed), but only for non-military use. http://www.cs.ucdavis.edu/~rogaway/ocb/license.htm Thanks. Is some explanation of the non-military use

Re: Apple are, apparently, dicks...

2013-06-14 Thread Bodo Moeller
On Thu, Jun 13, 2013 at 6:39 PM, Ben Laurie b...@links.org wrote: It is therefore suggested that I pull this patch: https://github.com/agl/openssl/commit/0d26cc5b32c23682244685975c1e9392244c0a4d The behavior change applies only if new option SSL_OP_SAFARI_ECDHE_ECDSA_BUG is used (part of

Re: Apple are, apparently, dicks...

2013-06-14 Thread Bodo Moeller
Note that the patch changes the value of SSL_OP_ALL so if OpenSSL shared libraries are updated to include the patch existing applications wont set it: they'd all need to be recompiled. That's a valid point. This is true, unfortunately. Possibly alternative is to reuse one of the

Re: not fork-safe if pids wrap

2013-08-22 Thread Bodo Moeller
Most other libraries I've seen handle this by saving the pid in a static variable, and then comparing the current pid to it. This has the advantage of not needing pthreads, and also of only adding the entropy to the child if it is actually needed (i. e. it doesn't exec after fork). We may

Re: not fork-safe if pids wrap

2013-08-22 Thread Bodo Moeller
On Thu, Aug 22, 2013 at 4:50 AM, Bodo Moeller bmoel...@acm.org wrote: Most other libraries I've seen handle this by saving the pid in a static variable, and then comparing the current pid to it. This has the advantage of not needing pthreads, and also of only adding the entropy to the child

Re: not fork-safe if pids wrap

2013-08-22 Thread Bodo Moeller
(So we probably should use the current time in addition to the PID to get a general solution to the PID wrap-around problem even on systems where actual independent reseeding isn't possible.) The FIPS PRNG uses a combination of PID, a counter and a form of system timer for the DT vector

Re: Locking inefficiency

2014-06-09 Thread Bodo Moeller
Geoffrey Thorpe ge...@geoffthorpe.com: First, you're right, pthreads_locking_callback() is collapsing everything to a mutex. I was well aware of this and thought we did this for compatibility reasons (because I couldn't think of any other reasonable explanation, I guess). If actual read-write

Re: Locking inefficiency

2014-06-10 Thread Bodo Moeller
Geoffrey Thorpe ge...@geoffthorpe.com: So I'm going to propose that we initially put this patch into the development head only, and defer a decision on whether to cherry-pick it into stable branches until that testing is in place. Sure, sounds right. (Will you go ahead and handle the patch?)

Re: Locking inefficiency

2014-06-10 Thread Bodo Moeller
Thor, can you quantify what you mean by much more expensive? (And qualify it - what platform, what operations?) The way we use the locks, in heavily multi-threaded applications, you can have a lot of contention with mutexes that wouldn't exist with read/write locks, because often all threads

Re: splitting clientHello into fragments?

2014-06-17 Thread Bodo Moeller
Does openssl handle a clientHello (or any handshake message) that splits across records? Mostly yes (I know because I made the changes to allow this a long time ago). A notable exception is that the cross-version code in s23_srvr.c requires that the first fragment contain at least 6 bytes of

Re: EC_METHOD struct

2014-07-16 Thread Bodo Moeller
balaji marisetti balajimarise...@gmail.com: In the EC_METHOD structure, the pointers to methods for converting between affine and projective coordinates are named: `point_set_Jprojective_coordinates_GFp` and `point_get_Jprojective_coordinates_GFp` Does that mean any implementation of

Re: EC_METHOD struct

2014-07-16 Thread Bodo Moeller
Thulasi Goriparthi thulasi.goripar...@gmail.com: Wouldn't it have been simpler to name these function pointers just projective instead of Jprojective? This way, EC methods that use different projective system than jacobian could have their own implementation to set/get projective co-ordinates

Patch to mitigate CVE-2014-3566 (POODLE)

2014-10-14 Thread Bodo Moeller
Here's a patch for the OpenSSL 1.0.1 branch that adds support for TLS_FALLBACK_SCSV, which can be used to counter the POODLE attack (CVE-2014-3566; https://www.openssl.org/~bodo/ssl-poodle.pdf). Note well that this is not about a bug in OpenSSL -- it's a protocol issue. If SSL 3.0 is disabled in

Re: Patch to mitigate CVE-2014-3566 (POODLE)

2014-10-15 Thread Bodo Moeller
mancha manc...@zoho.com: Any reason for the s_client -fallback_scsv option check to be within an #ifndef OPENSSL_NO_DTLS1 block? Thanks for catching this. No, there's no good reason for that; I should move it elsewhere. Bodo

Re: Patch to mitigate CVE-2014-3566 (POODLE)

2014-10-16 Thread Bodo Moeller
This is not quite the same discussion as in the TLS Working Group, but I certainly think that the claim that new SCSV does not help with [the SSL 3.0 protocol issue related to CBC padding] at all is wrong, and that my statement that TLS_FALLBACK_SCSV can be used to counter CVE-2014-3566 is right.

Re: Patch to mitigate CVE-2014-3566 (POODLE)

2014-10-18 Thread Bodo Moeller
mancha manc...@zoho.com: Bodo Moeller wrote: I certainly think that the claim that new SCSV does not help with [the SSL 3.0 protocol issue related to CBC padding] at all is wrong, and that my statement that TLS_FALLBACK_SCSV can be used to counter CVE-2014-3566 is right. The point

Re: Patch to mitigate CVE-2014-3566 (POODLE)

2014-10-18 Thread Bodo Moeller
Jeffrey Walton noloa...@gmail.com: Is there a way to compile without the patch? I think I would rather 'config no=ssl3' and omit the additional complexity. Its additional protocol complexity and heartbleed is still fresh in my mind. There's no way to compile without the patch, other than

Re: [openssl.org #3575] [BUG] FALLBACK_SCSV early in the cipher list breaks handshake

2014-10-20 Thread Bodo Moeller
The fix will be in the next version. Note that OpenSSL servers aren't expected to see TLS_FALLBACK_SCSV in normal operation (the code is sufficiently version tolerant, etc.), and if you've enabled TLS 1.2, there isn't even a higher protocol version that the client could be falling back from, so

Re: [openssl.org #3607] nistz256 is broken.

2014-12-03 Thread Bodo Moeller
2. When will RT2574 be integrated to protect our ECC keys in the inevitable presence of software defects like this? http://rt.openssl.org/Ticket/Display.html?id=2574user=guestpass=guest Reportedly, Cryptography Research (i.e., Rambus) alleges to have broad patents on techniques like this

[openssl.org #87] openssl 0.9.6b to 0.9.6d with IE5.5 and IE6 and 3DES-CBC-SHA hangs

2002-06-13 Thread Bodo Moeller via RT
[[EMAIL PROTECTED] - Fri Jun 7 14:22:15 2002]: even though Netscape still works, this should be considered a bug since IE is now broken when in the past it worked fine It is a bug in IE, not in OpenSSL. Note that the problem is avoided when using RC4 ciphersuites, and these are typically

[openssl.org #85] 0.9.7 prototype constification problems

2002-06-13 Thread Bodo Moeller via RT
[[EMAIL PROTECTED] - Thu Jun 6 18:39:34 2002]: [...] It appears the openssl guys goofed in 0.97beta. The prototype for the d2i_RSAPrivateKey function in 0.9.6c, which I use, is like this: d2i_RSAPrivateKey(RSA **a, unsigned char **pp, long length); ie., without a const on

[openssl.org #65] 0.9.6d: SSL3_GET_RECORD:wrong version number

2002-06-13 Thread Bodo Moeller via RT
If you run 's_client' with the '-debug' option, you will see that this server (ebmx.extra.daimlerchrysler.com:443) sends a cleartext string starting with 'HTTP/' when it is supposed to send SSL 3.0 encrypted data. This is where the 'wrong version number' error message comes from -- 0x54 0x54

[openssl.org #87] Ticket #87, #90 resolved (empty fragments for CBC)

2002-06-14 Thread Bodo Moeller via RT
The CBC vulnerability countermeasure that cannot be handled by some broken SSL/TLS implementations can now be disabled with the new SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS option, which is also part of SSL_OP_ALL and thus will be automatically enabled in many OpenSSL applications designed to be

[openssl.org #65] 0.9.6d: SSL3_GET_RECORD:wrong version number

2002-06-14 Thread Bodo Moeller via RT
Status was (automatically?) changed from resolved to open by additional correspondance. The actual status is resolved. __ OpenSSL Project http://www.openssl.org Development Mailing List

[openssl.org #34] SSL through Netscape Proxy server

2002-06-14 Thread Bodo Moeller via RT
Not a bug in OpenSSL, should have been sent to openssl-users __ OpenSSL Project http://www.openssl.org Development Mailing List [EMAIL PROTECTED] Automated List Manager

[openssl.org #27] Legalizing OpenSSL in France

2002-06-14 Thread Bodo Moeller via RT
Not an OpenSSL bug, this should be discussed elsewhere (openssl-users). __ OpenSSL Project http://www.openssl.org Development Mailing List [EMAIL PROTECTED] Automated List

Re: [openssl.org #85] 0.9.7 prototype constification problems

2002-06-15 Thread Bodo Moeller via RT
Avery Pennarun [EMAIL PROTECTED]: On Thu, Jun 13, 2002 at 01:26:42PM +0200, Bodo Moeller via RT wrote: [[EMAIL PROTECTED] - Thu Jun 6 18:39:34 2002]: It appears the openssl guys goofed in 0.97beta. The prototype for the d2i_RSAPrivateKey function in 0.9.6c, which I use, is like

[openssl.org #102] Problem: aes_locl.h on Windows

2002-06-18 Thread Bodo Moeller via RT
I have totally removed that '#ifdef' condition, now we include string.h on all systems (which is what we do in most other header files anyway, so this cannot break anything unless it is broken elsewhere too). __ OpenSSL Project

[openssl.org #127] AES draft cipher suites

2002-06-28 Thread Bodo Moeller via RT
While the AES cipher suites from draft-ietf-tls-ciphersuite-06.txt are disabled by default and not part of ALL (the AESdraft group alias can be used to enable them), they might be accidentily enabled by using cipher suite strings such as RSA. The reason for disabling them unless explicitly

[openssl.org #127] AES draft cipher suites

2002-07-04 Thread Bodo Moeller via RT
RFC3268 makes the AES cipher suites official, so the AESdraft problem no longer exists. However, it would still be a good idea to create a NONE cipher suite group alias because it is useful in the other scenarios given in the problem description.

Re: [openssl.org #141] Error while writing zero-length string

2002-07-12 Thread Bodo Moeller via RT
Martin Sjögren: When you write a zero-length string with SSL_write, OpenSSL signals a protocol-violating EOF even though no such thing has happened. My guess is that a zero returned is misinterpreted somewhere though I have not had time to dig through the source. SSL_write() with length 0

Re: [openssl.org #127] AES draft cipher suites

2002-07-12 Thread Bodo Moeller via RT
Lutz Jaenicke: I have already worked in the cipher selection routines yesterday with respect to PR#130. I will add an appropriate NOTDEFAULT selection keyword that will cover cipher suites not selected by default. As this is a new feature I intend to only add it to 0.9.7 (and later).

[openssl.org #125] [Enhancement] --certdir option for cert/key directory

2002-07-18 Thread Bodo Moeller via RT
Often, the cert/key directory is not used at all; otherwise it should be easy to use symbolic links to get the desired effect. Thus it should be possible to do without the '--certdir' patch. A reason for *not* introducing '--certdir' is that the '--prefix'/'--openssldir' situation is already a

[openssl.org #50] openssl-0.9.6d 'make test' fails (gcc, Solaris)

2002-07-18 Thread Bodo Moeller via RT
In similar configurations with gcc version 2.95.2, I observe none of these problems. This suggests that the problems may be due to compiler bugs in your gcc version; please try gcc 2.95.2 or a different newer release and report if the problems persist.

[openssl.org #118] How to implement OPENssl on AS 400

2002-07-18 Thread Bodo Moeller via RT
This is not a report on an actual problem in OpenSSL, and there has been no updated to the original request since June 25th; so nothing to do for us about this at the moment. __ OpenSSL Project

[openssl.org #149] [PATCH] apps/ca.c crl issuer patch

2002-07-18 Thread Bodo Moeller via RT
apps/ca.c has now been changed as suggested; thanks for the patch. __ OpenSSL Project http://www.openssl.org Development Mailing List [EMAIL PROTECTED] Automated List Manager

Re: [openssl.org #141] Error while writing zero-length string

2002-07-19 Thread Bodo Moeller via RT
On Fri, Jul 19, 2002 at 10:39:21AM +0200, Martin Sjögren via RT wrote: Note that it's perfectly valid to call write(2) with an empty string [...] This is true only for regular files. According to the The Single UNIX Specification, Version 2, and related write() manual pages on systems such

Re: [openssl.org #170] OpenSSLDie not exported in Win32

2002-08-01 Thread Bodo Moeller via RT
On Tue, Jul 30, 2002 at 06:08:46PM +0300, Arne Ansper wrote: attached is a patch for openssl-0.9.6e that removes the usage of die. please review it carefully. all changes are localized but the action i take in some places where error reporting is not possible might be little bit wrong (i.e.

[openssl.org #205] Patch to crypto/engine/vendor_defns/cswift.h, openssl-e-0.9.6-sta ble-SNAP-20020807, fix crash on Windows

2002-08-09 Thread Bodo Moeller via RT
Patch applied. Please send unified or context diffs in the future. __ OpenSSL Project http://www.openssl.org Development Mailing List [EMAIL PROTECTED] Automated List

[openssl.org #206] error compiling dll with msvc6

2002-08-09 Thread Bodo Moeller via RT
This problem is fixed in 0.9.6f. (You might prefer to wait for 0.9.6g, which will be out very soon.) __ OpenSSL Project http://www.openssl.org Development Mailing List

Re: [openssl.org #217] bug in util/pod2mantest (openssl-0.9.6g)

2002-08-14 Thread Bodo Moeller via RT
On Tue, Aug 13, 2002 at 12:28:06PM +0200, via RT wrote: Line 14 in util/pod2mantest should read: try_without_dir=true otherwise 'first iteration' in the for-loop is never executed. The code as it currently is doesn't make too much sense (try_without_dir could be totally abolished), but

[openssl.org #217] bug in util/pod2mantest (openssl-0.9.6g)

2002-08-14 Thread Bodo Moeller via RT
We now call pod2man directly if this works (without explicit invocation of perl). __ OpenSSL Project http://www.openssl.org Development Mailing List [EMAIL PROTECTED]

[openssl.org #217] bug in util/pod2mantest (openssl-0.9.6g)

2002-08-15 Thread Bodo Moeller via RT
Ticket 207 is resolved, too (if pod2mantest finds a working pod2man, this is now called directly without explicitly invoking perl). __ OpenSSL Project http://www.openssl.org Development Mailing

[openssl.org #199] Bugs

2002-08-15 Thread Bodo Moeller via RT
[EMAIL PROTECTED]: Failure! [...] Failed! bc: stack empty Can you condense the bc test file into a single-line test so that we can automatically test if bc has this bug? __ OpenSSL Project

[openssl.org #220] bug in config (openssl-0.9.6g, Solaris2.6)

2002-08-15 Thread Bodo Moeller via RT
[levitte - Thu Aug 15 16:04:15 2002]: [guest - Thu Aug 15 14:21:45 2002]: Since isalist displays the available native instruction sets ordered in the sense of best performance, I guess the best choice for target would be the leftmost in the list displayed. Under no circumstances should the

[openssl.org #259] SHA-256, SHA-384, SHA-512

2002-08-29 Thread Bodo Moeller via RT
FIPS PUB 180-2, which defines SHA-256, SHA-384 and SHA-512 in addition to SHA-1, has been published on August 1: http://csrc.nist.gov/publications/fips/fips180-2/fips180-2.pdf These new hash algorithms should be added to the 0.9.8-dev branch.

[openssl.org #258] ssl3_output_cert_chain

2002-08-29 Thread Bodo Moeller via RT
Can you elaborate what you think is buggy? 'make test' still succeeds if you substitute 10 for SSL3_RT_MAX_PLAIN_LENGTH in ssl3_write_bytes (ssl/s3_pkt.c), which sort of simulates very long certificate chains. There is a limit to certificate chains (SSL_MAX_CERT_LIST_DEFAULT by

[openssl.org #247] Openssl fix

2002-08-29 Thread Bodo Moeller via RT
Please obtain OpenSSL 0.9.6g. OpenSSL 0.9.6d was the last version __ OpenSSL Project http://www.openssl.org Development Mailing List [EMAIL PROTECTED] Automated List Manager

[openssl.org #254] pem_lib.c

2002-08-29 Thread Bodo Moeller via RT
Thanks, the bug has been fixed now in 0.9.6-stable, 0.9.7-stable and __ OpenSSL Project http://www.openssl.org Development Mailing List [EMAIL PROTECTED] Automated List

[openssl.org #274] session ID length bug (in 0.9.6g and 0.9.7beta3)

2002-09-19 Thread Bodo Moeller via RT
This SSLeay/OpenSSL behaviour appears to be correct; from RFC 2246: session_id_length This field must have a value of either zero or 16. If zero, the client is creating a new session. If 16, the session_id field

[openssl.org #262] bug: init race in SSLv3_client_method

2002-09-19 Thread Bodo Moeller via RT
All (most?) similar cases clear the 'init' flag *after* having set up the data structures appropriately, e.g. see ssl/s3_meth.c. No locking should be needed because the assignments are idempotent. __ OpenSSL Project

[openssl.org #274] session ID length bug (in 0.9.6g and 0.9.7beta3)

2002-09-19 Thread Bodo Moeller via RT
Sorry, the RFC 2246 quote was incorrect -- the value 16 is for SSL 2.0 session IDs only, and the SSLeay/OpenSSL interpretation indeed is buggy. __ OpenSSL Project http://www.openssl.org

[openssl.org #274] session ID length bug (in 0.9.6g and 0.9.7beta3)

2002-09-19 Thread Bodo Moeller via RT
__ OpenSSL Project http://www.openssl.org Development Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]

Re: [openssl.org #262] bug: init race in SSLv3_client_method

2002-09-20 Thread Bodo Moeller via RT
On Thu, Sep 19, 2002 at 06:28:16PM -0700, Patrick McCormick wrote: No locking should be needed because the assignments are idempotent. However, the assignments are not atomic. The following unprotected operation: if (init) { memcpy((char *)SSLv3_server_data,(char

Re: [openssl.org #262] bug: init race in SSLv3_client_method

2002-09-23 Thread Bodo Moeller via RT
On Fri, Sep 20, 2002 at 06:19:48PM -0700, Patrick McCormick wrote: Here's one step by step scenario. You are absolutely right about the bug. I somehow had not realized that the memcpy accesses the same struct as the following assignments. We need a lock to fix this. -- Bodo Möller [EMAIL

[openssl.org #262] bug: init race in SSLv3_client_method

2002-09-23 Thread Bodo Moeller via RT
__ OpenSSL Project http://www.openssl.org Development Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]

Re: [openssl.org #262] bug: init race in SSLv3_client_method

2002-09-25 Thread Bodo Moeller via RT
On Tue, Sep 24, 2002 at 03:47:14PM -0700, Patrick McCormick wrote: Many thanks for putting in a lock. However, the race condition has not been eliminated. [...]init must be checked after the lock is entered in order to prevent the client_data setup from happening twice. So,

[openssl.org #291] race condition in *get_cipher_by_char

2002-09-25 Thread Bodo Moeller via RT
__ OpenSSL Project http://www.openssl.org Development Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]

Re: [openssl.org #262] bug: init race in SSLv3_client_method

2002-09-26 Thread Bodo Moeller via RT
On Wed, Sep 25, 2002 at 09:22:20PM +0200, Patrick McCormick via RT wrote: I was looking at some other code in the ssl directory, and the *_method functions in the *_meth.c files appear to use the same initialization idiom I believe they need to be thread-protected also. Fixed. -- Bodo

[openssl.org #330] Abuse of assert() in crypto/aes/

2002-11-04 Thread Bodo Moeller via RT
The AES library (0.9.7-dev, 0.9.8-dev) abuses assert() to check for invalid function parameters. For aes_cbc.c, this includes the case where 'length' is not a multiple of AES_BLOCK_SIZE. For consistency with other ciphers, the library should not require 'length' to be a multiple of the block

[openssl.org #482] man page bug for BN_prime_check(s)

2003-01-29 Thread Bodo Moeller via RT
Thanks for the report. Actually by coincidence I noticed this typo (which has been in OpenSSL for quite a while) a couple of days ago and corrected it. __ OpenSSL Project http://www.openssl.org

Re: [openssl.org #487] bug in BN_generate_prime for small n.

2003-01-31 Thread Bodo Moeller via RT
On Fri, Jan 31, 2003 at 08:12:41AM +0100, Cameron Gregory via RT wrote: for num 15 .. always get the same result.. and it's larger than expected... Reason: The internal OpenSSL function 'probable_prime' (in crypto/bn/bn_prime.c) uses a built-in list of small primes for sieving out candidate

Re: [openssl.org #328] DH_compute_key incompatable with PKCS #3

2003-01-31 Thread Bodo Moeller via RT
On Wed, Dec 04, 2002 at 10:16:37AM -0500, Jack Lloyd wrote: I asked Eric Rescorla, and he agreed the section of the TLS RFC was definitely unclear, but he wasn't totally sure which way it should go as far as stripping any leading 0s before using the shared secret to generate keys. It

[openssl.org #491] [Fwd: Bug#180067: openssl: 0.9.7 causes gcc in sid to output warnings]

2003-02-10 Thread Bodo Moeller via RT
In OpenSSL, the 'info_callback' gets a 'const SSL *' argument; the application in question used 'SSL *', which caused the compiler warning for 0.9.7 (earlier OpenSSL versions did not declare the 'info_callback' argument list at all). The problem has been solved by changing the application

[openssl.org #162] SSL_shutdown return 0 in case of SSLv3_client_method

2003-02-14 Thread Bodo Moeller via RT
Note that SSL_get_error() is not meant to be used on SSL_shutdown() return values (although it would be good to have some API that behaves similarly to SSL_read, SSL_write, SSL_do_handshake etc. in this respect). If SSL_shutdown() always returns 0 when called multiple times, this is probably

<    1   2   3   4   5   6   7   >