cyphers and keys

2007-10-30 Thread egoitz
Hi I have one worrying question... I have generated my keys and ca and all with easy-rsa package and he has generated 1024 bit rsa keys... but as far as I have seen openvpn is using blowfish... blowfish in a symetric encription cypher and rsa is an asymetrical one... shouldn't match keys and

Re: huge memory allocation on simultaneous ssl handshakes.

2007-10-30 Thread Lutz Jaenicke
Ramashish Baranwal wrote: Hi, I have a server which accepts ssl connections. I have a client which does parallel ssl connections to this. After closing all connections the server has unfreed memory. This gets reused for subsequent ssl connections, so no issue there. My problem is with the

RE: OpenSSL How to redistribute as part of our application

2007-10-30 Thread Dave Bound
Is there a way to use Win32 OpenSSL in silent mode? -Original Message- From: Thomas J. Hruska [mailto:[EMAIL PROTECTED] Sent: Monday 29 October 2007 14:22 To: openssl-users@openssl.org Subject: Re: OpenSSL How to redistribute as part of our application Bernhard Froehlich wrote: Dave

Re: huge memory allocation on simultaneous ssl handshakes.

2007-10-30 Thread Ramashish Baranwal
On 10/30/07, Lutz Jaenicke [EMAIL PROTECTED] wrote: Ramashish Baranwal wrote: Hi, I have a server which accepts ssl connections. I have a client which does parallel ssl connections to this. After closing all connections the server has unfreed memory. This gets reused for subsequent

Re: huge memory allocation on simultaneous ssl handshakes.

2007-10-30 Thread Steffen DETTMER
* Ramashish Baranwal wrote on Tue, Oct 30, 2007 at 15:06 +0530: The heap size will never be reduced again regardless of the amount of free() calls, the memory can however be reused. Therefore, if your application at one point in time needs a lot of heap space the memory consumption shown

RE: cyphers and keys

2007-10-30 Thread David Schwartz
I have one worrying question... I have generated my keys and ca and all with easy-rsa package and he has generated 1024 bit rsa keys... but as far as I have seen openvpn is using blowfish... blowfish in a symetric encription cypher and rsa is an asymetrical one... shouldn't match keys and

RE: huge memory allocation on simultaneous ssl handshakes.

2007-10-30 Thread Kukosa, Tomas
Is openssl using some kind of memory caching for its ssl handshake which is not getting released when the handshake is over? Each established SSL/TLS connection allocates at least 58983 bytes. All those 3 buffers (18437 B, 18698 B, 21848 B) are allocated when the new connection is accepted

Re: huge memory allocation on simultaneous ssl handshakes.

2007-10-30 Thread Lutz Jaenicke
Steffen DETTMER wrote: * Ramashish Baranwal wrote on Tue, Oct 30, 2007 at 15:06 +0530: The heap size will never be reduced again regardless of the amount of free() calls, the memory can however be reused. Therefore, if your application at one point in time needs a lot of heap space the

Re: OpenSSL How to redistribute as part of our application

2007-10-30 Thread Thomas J. Hruska
Dave Bound wrote: Is there a way to use Win32 OpenSSL in silent mode? The installer is Innosetup-based. Read the docs for Innosetup on several command-line switches that Innosetup has for silent installs. You should make sure you display a compatible license agreement to your users when

RE: cyphers and keys

2007-10-30 Thread Marek Marcola
On Tue, 2007-10-30 at 02:59 -0700, David Schwartz wrote: I have one worrying question... I have generated my keys and ca and all with easy-rsa package and he has generated 1024 bit rsa keys... but as far as I have seen openvpn is using blowfish... blowfish in a symetric encription cypher

RE: cyphers and keys

2007-10-30 Thread David Schwartz
Asymmetric ciphers like RSA are used on very small pieces of information, not on bulk data. In the case of encryption, the asymmetric algorithm is used to securely exchange a random small number that is then used as the key in a symmetric algorithm like blowfish or AES. This number

RE: OpenSSL How to redistribute as part of our application

2007-10-30 Thread Dave Bound
Not everyone can use the default build of OpenSSL. Can you point me at some docs which will allow me to ascertain whether I fall into the 'not everyone' category? -Original Message- From: Thomas J. Hruska [mailto:[EMAIL PROTECTED] Sent: Tuesday 30 October 2007 10:56 To:

bad decrypt in EVP_CipherFinal_ex

2007-10-30 Thread Alex Queiroz
Hallo, I am using the symmetric cypher functions to encrypt and then decrypt a string. The cipher is aes-256-cbc. When I try to decrypt the string, I get this error: error 06065064: digital envelope routines: EVP_DecryptFinal_ex: bad decrypt I am using the same key and same iv. The

Re: OpenSSL How to redistribute as part of our application

2007-10-30 Thread Thomas J. Hruska
Dave Bound wrote: Not everyone can use the default build of OpenSSL. Can you point me at some docs which will allow me to ascertain whether I fall into the 'not everyone' category? -Original Message- From: Thomas J. Hruska [mailto:[EMAIL PROTECTED] Sent: Tuesday 30 October 2007 10:56

Re: OpenSSL How to redistribute as part of our application

2007-10-30 Thread Chris Clark
On 10/30/07, Dave Bound wrote: Not everyone can use the default build of OpenSSL. Can you point me at some docs which will allow me to ascertain whether I fall into the 'not everyone' category? One thing to consider is if you want to include the patented ciphers in your build, such as RC5,

ca server - unable to load CA private key

2007-10-30 Thread Frank Garber
Hey all, I'm very new to security and generating key files. I'm following the instructions I've found here: http://www.securityfocus.com/infocus/1677 and I'm having trouble generating the private / public key pair and certificate. In step 2 it asks: Enter pass phrase for

Re: cyphers and keys

2007-10-30 Thread Gayathri S
On Tue, 30 Oct 2007, [EMAIL PROTECTED] wrote: Hi I have one worrying question... I have generated my keys and ca and all with easy-rsa package and he has generated 1024 bit rsa keys... but as far as I have seen openvpn is using blowfish... blowfish in a symetric encription cypher and rsa is an

Re: huge memory allocation on simultaneous ssl handshakes.

2007-10-30 Thread Scott Gifford
Lutz Jaenicke [EMAIL PROTECTED] writes: [...] Yes, only 100MB might be actually used but the 2GB would still be reserved in memory. To get an idea about this behavior you can write a simple program like And just to elaborate a little, if other processes need this memory, the OS will swap out

Re: huge memory allocation on simultaneous ssl handshakes.

2007-10-30 Thread Kyle Hamilton
[...] On 10/30/07, Scott Gifford [EMAIL PROTECTED] wrote: If this presents a real problem, the general solution is to use a specialized malloc, which uses a memory allocation method that allows returning memory to the OS, such as mmap. I'm not sure how to use a custom malloc with OpenSSL, but

Examples of blowfish.h code for C?

2007-10-30 Thread Joel Christner
Hello, Please pardon the newbie question. I was curious if anyone had any links or references that they could point me to for more details on how to use blowfish.h with C? I've gone through the man pages but was hoping for something more intuitive, step-by-step, or outlining when to use