Re: Signature Verification

2009-11-09 Thread Jim Welch
Hi, Based on information and suggestions you have given me, I came at the problem from a different direction. Instead of trying to verify the signature, I tried using out private key to sign the original data. After a couple of hours, I suceeded in getting the same signature as was supplied

Stunnel 4.28 released

2009-11-09 Thread Michal Trojnara
The ChangeLog entry: Version 4.28, 2009.11.08, urgency: MEDIUM: * New features - Win32 DLLs for OpenSSL 0.9.8l. - Transparent proxy support on Linux kernels =2.6.28. See the manual for details. - New socket options to control TCP keepalive on Linux: TCP_KEEPCNT, TCP_KEEPIDLE,

about the security of a tipical client/server application.

2009-11-09 Thread Kirk81
Hello people, since all of you seem quite familiary with criptography and its tools I would like to ask u something. I'm implementing a server/client application: the client has to collect data and send them to the server in a frame format (unidirectional connection). In any frame, I added a

RE: Certificate - if Extended Key Usage is defined, openssl ignore Key Usage

2009-11-09 Thread Beneš Vladimír
Hello, we use PKCS#7 signature format; please see attachement of my initial mail (there are signing certificate, signature, signed data and issuer certificate) - http://marc.info/?l=openssl-usersm=125751029707705w=1 (attachment.zip). There are calling openssl for signature ano

Re: Certificate - if Extended Key Usage is defined, openssl ignore Key Usage

2009-11-09 Thread Dr. Stephen Henson
On Mon, Nov 09, 2009, Bene? Vladimr wrote: I'am afraid we cann't call no modified openssl by command line for verification signature with purpose verification certificate if certificate includes both X509v3 Key Usage and X509v3 Extended Key Usage.

Re: [Q] Tutorial or Explanation how to use OpenSSL library functions?

2009-11-09 Thread Richard Koenning
JongAm Park wrote: Hello, I am just a beginner at using OpenSSL library. I write in C/C++ and Objective-C. After looking up the OpenSSL web site, I found out that there was no document for studying how to use it. Is there any good source like sample codes, tutorial and so on?

Re: about the security of a tipical client/server application.

2009-11-09 Thread Jeffrey Walton
Hi Kirk, I'm pretty sure that the weakness of all the mechanism is the key-length and I'd like to avoid the brute force attack or the worst birthday attack...so here's my questions. There's no need to find collisions on the hash. The key is the weak point. Your attacker will factor N, change

Re: about the security of a tipical client/server application.

2009-11-09 Thread Kirk81
Jeffrey Walton-3 wrote: 1. For how many days can I use a 512-bit key? 0 Does a individual hackers have the NASA's PC? lol, I mean I'm looking about the integer factorization problem and, from a SW point of view, I think only a comunity of PCs can solve the problem in few time (less than

Re: Linking and execution problems with a FIPS-capable OpenSSL distribution

2009-11-09 Thread Daugherty
It was a mistake. Any help on the actual issue? - Original Message - From: Michael S. Zick open...@morethan.org To: openssl-users@openssl.org Sent: Sunday, November 8, 2009 5:51:45 AM GMT -07:00 US/Canada Mountain Subject: Re: Linking and execution problems with a FIPS-capable OpenSSL

Re: about the security of a tipical client/server application.

2009-11-09 Thread John R Pierce
Kirk81 wrote: Does a individual hackers have the NASA's PC? assume they can have clusters of 100s/1000s of computers at their bidding (aka 'botnets' of trojan-infected PC's scattered around the world.) __ OpenSSL Project

Re: Linking and execution problems with a FIPS-capable OpenSSL distribution

2009-11-09 Thread Daugherty
Another mistake I made was specifying FIPSLD_CC=gcc instead of FIPSLD_CC=g++. Now, when I link, I get the following error: /usr/local/src/openssl-fips-1.2/fips/fipsld -Wl,-O3 -D_REENTRANT -DACE_HAS_AIO_CALLS -D_GNU_SOURCE -I/home/linuxbuild/ntsdev/3rdParty/ACE_wrappers$

Re: about the security of a tipical client/server application.

2009-11-09 Thread Jeffrey Walton
Hi Kirk, I've already implemented the ECDSA scheme in my application: using SHA-1 and secp160k1. In that case, consider using ECDSA. I'm pretty faster on the signer's side, but i'm actually much slower on the verification side. Compare apples to apples: use an appropriate RSA moduli. Since

RE: ASN1_get_object:too long

2009-11-09 Thread Dave Thompson
From: owner-openssl-us...@openssl.org On Behalf Of dutchman1 Sent: Friday, 06 November, 2009 09:11 thanks for your reply. The cert was located on a hardware device and I'm trying to write it to file through C code so something might be lost in translation. I've attached the cert to the

Re: Linking and execution problems with a FIPS-capable OpenSSL distribution

2009-11-09 Thread Dr. Stephen Henson
On Mon, Nov 09, 2009, Daugherty wrote: Another mistake I made was specifying FIPSLD_CC=gcc instead of FIPSLD_CC=g++. Now, when I link, I get the following error: /usr/local/src/openssl-fips-1.2/fips/fipsld -Wl,-O3 -D_REENTRANT -DACE_HAS_AIO_CALLS -D_GNU_SOURCE

Re: Padding mode for RSA_private_decrypt()...

2009-11-09 Thread barcaroller
Mounir IDRASSI wrote in message To my knowledge, SSLV2, SSLV3 and TLS1.0 all use PKCS#1 Block Type 2 padding. Are you sure about this? I'm writing a server and I occasionally get the error I reported; however, if what you are saying is true, the error may be indicative of another problem.

Re: Padding mode for RSA_private_decrypt()...

2009-11-09 Thread barcaroller
Michael S. Zick wrote in message The padding is added to the **plain text** After decryption, the server can determine the padding present. I'm writing a server and I usually just call RSA_private_decrypt(..., RSA_PKCS1_PADDING). Everything works fine most of the time but sometimes I get

Re: Padding mode for RSA_private_decrypt()...

2009-11-09 Thread Dr. Stephen Henson
On Mon, Nov 09, 2009, barcaroller wrote: Mounir IDRASSI wrote in message To my knowledge, SSLV2, SSLV3 and TLS1.0 all use PKCS#1 Block Type 2 padding. Are you sure about this? I'm writing a server and I occasionally get the error I reported; however, if what you are saying is

Re: Padding mode for RSA_private_decrypt()...

2009-11-09 Thread Mounir IDRASSI
Hi, Take a look at function get_client_master_key in the file s2_srv.c, and specifically at the line where a call to ssl_rsa_private_decrypt is made : in it, the decision to use RSA_PKCS1_PADDING or RSA_SSLV23_PADDING is made depending on the value of the member ssl2_rollback of the

using non-blocking IO

2009-11-09 Thread Sabyasachi Ruj
I am using an IMAP library, which supports only blocking SSL IO. I am planning to convert my that to do non-blocking SSL IO. Which is the best place to set the flag to non-blocking? These are my concerns: 1. What areas of the program will have to be converted because of this? re SSL_read and