RE: [LibReSSL] Allow key generation to use arbitrary public exponents

2014-08-13 Thread Dave Thompson
From: owner-openssl-...@openssl.org On Behalf Of Benny Baumann Sent: Sunday, August 10, 2014 08:44 Am 09.08.2014 19:24, schrieb Annie Yousar: Hi Ben, you can generate keys with arbitrary exponents using the genpkey command: openssl genpkey -algorithm rsa \ -pkeyopt

Re: [openssl.org #3490] bug report: SRP still broken in 1.0.1 snapshot

2014-08-13 Thread John Foley
The first chunk in the s3_lib.c patch doesn't apply. But the second chunk does (shown below). When applying this to 1.0.1 stable, it appears to resolve the problem. @@ -4357,8 +4359,13 @@ SSL_CIPHER *ssl3_choose_cipher(SSL *s, STACK_OF(SSL_CIPHER) *clnt, emask_k =

Re: Openssl 1.0.1h | RHEL-6 | x86_64 | Crash in lh_retrieve

2014-08-13 Thread Arun Muralidharan
Thanks Stephen. Removing it seems to have solved the issue. It appears that a patch which ignored multiple call to add digests have been reverted back in some 0.9.8x version. -Arun On Thu, Aug 7, 2014 at 5:00 PM, Arun Muralidharan arun11...@gmail.com wrote: hmm...Will update you on this once I

nameConstraints : leading . in permission list items

2014-08-13 Thread John Denker
Hi Folks -- 0) Beware that I am not an expert in this area. What follows is probably mostly true, but I'm still feeling my way to some extent. 1) There are actually some people who are using v3 nameConstraints. Not a lot, but some. An example can be found in one of the fully-trusted root

Re: nameConstraints : leading . in permission list items

2014-08-13 Thread Vyronas Tsingaras
Hey John et al, If you could also take a look at https://github.com/openssl/openssl/pull/111 we have listed a number of reasons. What are your thoughts on this? Regards, Vyronas Tsingaras On 13/08/2014 11:57 πμ, John Denker wrote: Hi Folks -- 0) Beware that I am not an expert in this area.

[openssl.org #3481] Add space to help compiler/analyzer parse token

2014-08-13 Thread Rich Salz via RT
We plan on adopting a coding style and it will address this. The style is most likely to say put spaces around operators. I'm marking this as reject (not resolve) because we're not gonna do this one-of fix. But a more comprehensive, better, answer is coming. -- Rich Salz, OpenSSL dev team;

[openssl.org #2342] CHM version of openssl doc

2014-08-13 Thread Rich Salz via RT
No current plans to generate CHM file from the openssl manpages. If someone can point to a good perl script we could use, we can re-open this. -- Rich Salz, OpenSSL dev team; rs...@openssl.org __ OpenSSL Project

[openssl.org #2931] Bad output of -purpose with the x509 command

2014-08-13 Thread Rich Salz via RT
Yes, the fact that the any purpose OID is present means that applications may use the cert/keypair for anything. Not that you are asking to show the purpose field, which doesn't actually contradict the RFC. It says, at the bottom of page 44, Certificate using applications MAY require that the

[openssl.org #1734] Enhancement Request: for dsaparam to have 2 number inputs for p and q. Tested version of openssl 0.9.8g

2014-08-13 Thread Rich Salz via RT
Perhaps I misunderstand, but... dsaparam lets you specify the number of bits. From that it calculates the q value compatible with the table you posted. -- Rich Salz, OpenSSL dev team; rs...@openssl.org __ OpenSSL Project

Question in regards to early warning about new openssl versions

2014-08-13 Thread Henning Horst
Dear OpenSSL-Team, First of all, thank you for your great work! I hope openssl-dev is the right list for the following request: Many projects rely on OpenSSL of course and whenever a new version is published fixing security issues, it is more or less a surprise to many. After the disclosure

RE: Question in regards to early warning about new openssl versions

2014-08-13 Thread Salz, Rich
Thanks for your kind words. We do post a notice that we're putting out a security update. Not sure how you missed it... -- Principal Security Engineer Akamai Technologies, Cambridge MA IM: rs...@jabber.me Twitter: RichSalz

Re: Question in regards to early warning about new openssl versions

2014-08-13 Thread Kurt Roeckx
On Wed, Aug 13, 2014 at 01:12:12PM -0400, Henning Horst wrote: Dear OpenSSL-Team, First of all, thank you for your great work! I hope openssl-dev is the right list for the following request: Many projects rely on OpenSSL of course and whenever a new version is published fixing security

Re: [openssl.org #3490] bug report: SRP still broken in 1.0.1 snapshot

2014-08-13 Thread Kurt Roeckx via RT
On Tue, Aug 12, 2014 at 08:36:06PM +0200, Kurt Roeckx wrote: On Tue, Aug 12, 2014 at 08:22:38PM +0200, John Foley via RT wrote: The first chunk in the s3_lib.c patch doesn't apply. But the second chunk does (shown below). When applying this to 1.0.1 stable, it appears to resolve the

Re: [openssl.org #3490] bug report: SRP still broken in 1.0.1 snapshot

2014-08-13 Thread John Foley via RT
Thank you. On 08/13/2014 01:39 PM, Kurt Roeckx via RT wrote: On Tue, Aug 12, 2014 at 08:36:06PM +0200, Kurt Roeckx wrote: On Tue, Aug 12, 2014 at 08:22:38PM +0200, John Foley via RT wrote: The first chunk in the s3_lib.c patch doesn't apply. But the second chunk does (shown below). When

Re: Question in regards to early warning about new openssl versions

2014-08-13 Thread Steef
Hi Henning, So my question is - would it be reasonable to send an early warning (without any details) to one of the OpenSSL lists a few days before publishing a version containing fixes for security vulnerabilities? Just saying something along the lines of we plan to release a new openssl

Re: Question in regards to early warning about new openssl versions

2014-08-13 Thread Steef389
Hi Henning, So my question is - would it be reasonable to send an early warning (without any details) to one of the OpenSSL lists a few days before publishing a version containing fixes for security vulnerabilities? Just saying something along the lines of we plan to release a new openssl

Re: [openssl.org #3490] bug report: SRP still broken in 1.0.1 snapshot

2014-08-13 Thread John Foley
Thank you. On 08/13/2014 01:39 PM, Kurt Roeckx via RT wrote: On Tue, Aug 12, 2014 at 08:36:06PM +0200, Kurt Roeckx wrote: On Tue, Aug 12, 2014 at 08:22:38PM +0200, John Foley via RT wrote: The first chunk in the s3_lib.c patch doesn't apply. But the second chunk does (shown below). When

[openssl.org #1872] [PATCH] Change 'Q' and 'R' behavior in s_client

2014-08-13 Thread Rich Salz via RT
In the release after 1.0.2, s_client has a new '-nocommands' flag that disables the command letters. We don't want to break existing behavior. -- Rich Salz, OpenSSL dev team; rs...@openssl.org __ OpenSSL Project

RE: nameConstraints : leading . in permission list items

2014-08-13 Thread Vyronas Tsingaras
Your proposed transition strategy sounds good. Maybe as a first step OpenSSL could tolerate a leading dot and in a future version implement item 6 ? mozilla:pkix and SChannel tolerate this. -Original Message- From: owner-openssl-...@openssl.org [mailto:owner-openssl-...@openssl.org] On

Re: Question in regards to early warning about new openssl versions

2014-08-13 Thread Henning Horst
Duh - thank you Steef, Kurt and Rich - not sure how I could miss that either... So please only take the key message - your team does a great job with OpenSSL, thank you all! Regards, Henning On 08/13/2014 01:35 PM, Steef wrote: Hi Henning, So my question is - would it be reasonable to send

session cache and multiple threads

2014-08-13 Thread Salz, Rich
What's the programming model for using session cache with a multi-threaded server? When a client connections, a refcount on the object is incremented. But then fields can be changed (such as ecpointformat). Does it make more sense for session to deep-copy the session from the cache? --

Re: session cache and multiple threads

2014-08-13 Thread Viktor Dukhovni
On Wed, Aug 13, 2014 at 03:32:00PM -0400, Salz, Rich wrote: What's the programming model for using session cache with a multi-threaded server? When a client connects, a refcount on the object is incremented. A lot depends on whether the cache is internal, or external via callbacks, and

RE: session cache and multiple threads

2014-08-13 Thread Salz, Rich
We're using the standard internal session (maintained per SSL_CTX object); not tickets. We're seeing that the sessions are shared, a refcount is maintained, but that SSL does modified fields within a session while it's being used. Most notably an address sanitizer build found the EC point

[openssl.org #1704] bug report, Windows VC-32 debug build

2014-08-13 Thread Rich Salz via RT
Andy pointed out that this has been fixed since 1.0.0 where /Zi is added unconditionally. -- Rich Salz, OpenSSL dev team; rs...@openssl.org __ OpenSSL Project http://www.openssl.org Development

[openssl.org #781] [PATCH] NetWare Support for OpenSSL 0.9.7

2014-08-13 Thread Rich Salz via RT
Very old release. Netware is no longer supported. After trying to carefully read the text of the RT, I don't *think* there's an OpenSSL bug; please file a new RT if I'm wrong about that. -- Rich Salz, OpenSSL dev team; rs...@openssl.org

[openssl.org #2226] OSSL 1.0.0 and NetWare + nasm

2014-08-13 Thread Rich Salz via RT
Netware is no longer a supported platform. very old release. -- Rich Salz, OpenSSL dev team; rs...@openssl.org __ OpenSSL Project http://www.openssl.org Development Mailing List

[openssl.org #1948] [PROPOSAL] change ecdsatest,enginetest to fit into 8.3 naming scheme

2014-08-13 Thread Rich Salz via RT
Netware is not a supported platform any more. -- Rich Salz, OpenSSL dev team; rs...@openssl.org __ OpenSSL Project http://www.openssl.org Development Mailing List

[openssl.org #1697] openssl 2.2.8g: failure to check the return value of sk_new_null() in /apps/pkcs12.c, ocsp.c, engine.c and cr12p7.c

2014-08-13 Thread Rich Salz via RT
There are now type-safe, so its sk_X_new_null calls. And all of them in apps/*.c are now checked. This will be part of a post-1.0.2 release. -- Rich Salz, OpenSSL dev team; rs...@openssl.org __ OpenSSL Project

[openssl.org #1973] [PATCH 11/14] Ensure 'make links' gets all headers correctly.

2014-08-13 Thread Rich Salz via RT
The comments refer to Jivin Stephen Henson Hilarious :) But issue was resolved. -- Rich Salz, OpenSSL dev team; rs...@openssl.org __ OpenSSL Project http://www.openssl.org Development Mailing List

[openssl.org #3486] Bug Report: Openssl 1.0.1h | RHEL-6 | x86_64 | Crash in lh_retrieve

2014-08-13 Thread Stephen Henson via RT
As indicated in message thread in openssl-dev this is now resolved. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org __ OpenSSL Project

[openssl.org #573] Possible bug in conf parser

2014-08-13 Thread Rich Salz via RT
I believe this commit fixed it, years ago: commit 23acb0eeb2ec89cb3d673dd0fb04838d83b13a1a Author: Richard Levitte levi...@openssl.org Date: Wed Sep 28 18:02:41 2005 + Change a comment so it corresponds to reality. Put back a character that was previously replaced with a NUL for parsing