Re: Openssl tarball SHA1 checksum

2010-04-12 Thread Michael S. Zick
On Sun April 11 2010, Kenneth Goldman wrote:
> owner-openssl-us...@openssl.org wrote on 04/11/2010 01:38:14 PM:
> 
> > * Kenneth Goldman wrote on Fri, Apr 09, 2010 at 08:12 -0400:
> > >I notice that the tarballs also include a SHA1 digest. What's the
> > >point?
> >
> > To have a check whether the FTP download was successful to avoid
> > accidentally using corrupt files, a file integrity check with a
> > checksum is quite common.
> 
> Aha.  So it's just a double check on ftp?  It's not trying to
> protect against an attacker targeting the openssl site or
> the download process?

The e-mail release notices that I receive (and I suppose everyone else)
is cryptographically signed (pgp).

That message contains the tarball's size, md5 sum and sha1 sum along
with the download name and links.

I.E: Those are part of the signed message.

That should be enough to give at least a "warm and fuzzy" feeling about
the tarball's authenticity.
A level of assurance that is probably higher than any assurance that
can be made about the results of the build process the sources are
then subjected to by the users.

Of course, the way to be _certain_ is to _buy_ a copy of the sources
from a known and trusted security provider following whatever security
protocols that provider has established.

Spend enough money and you can probably even get your copy hand
delievered by a certified, armed courier on secured media.

Mike


__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Re: locate key for p12 certificate

2010-04-12 Thread Rogan Dawes



Hi Peter, Patrick,

On 2010/04/08 2:10 PM, Patrick Patterson wrote:
> Hello Peter:
> 
> 
> On 08/04/10 3:45 AM, peter23452345 wrote:
>>
>> hi, i have been trying to create a certificate for use on my webscarab proxy.
>> essentially what i want to do is this: run a php curl script which redirects
>> certain https traffic though the webscarab proxy so that i can see the
>> output from the curl script (php curl doesnt provide visibility into the
>> http post string and i need to see this). i have already got this working
>> with regular http - but i need https.

[snip]

> No, you don't need the server's private key to see that web page - you
> simply need the public key (the key that is contained in the
> certificate) - all the RSA keys are being used for is to authenticate
> the server to you. The encryption isn't done using the key, it is done
> at the TLS/SSL layer, using a symmetric key negotiated between the
> client and the server. If you are curious as to how this works, the RFC
> describing the TLS protocol is quite clear.
> 
> In order for you to become an SSL Proxy and impersonate the server, you
> need to get the private key from that server. Since you say that the
> server is not under your control, this means that you are quite likely
> not authorised to impersonate this server by transparently proxying for
> it. It is for exactly this reason that people use TLS/SSL :)
> 
> So, the short answer is - until you can convince the administrators of
> the server that you are proxying for to hand over their private keys,
> what you want to do is not possible.
> 
> Have fun.
> 
> Patrick.

In fact, what WebScarab is doing is presenting an invalid certificate to
the client, which normally stops and gives the user the option to accept
that invalid certificate or abort the request.

However, curl as a scripted client doesn't really get the opportunity to
query the user.

That said, you can instruct curl in advance to ignore certificate errors
and warnings using the "-k" flag.

$ curl -k 

Hope this helps.

Rogan Dawes
WebScarab author

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


ReadTimeout Does not work in OpenSSL C# library

2010-04-12 Thread swapnil kamble
Hi All,
  I want to managed OpenSSL .net library. But ReadTimeout does seem
to work. Connection is getting successful but no exception is coming even
after ReadTimeout(ex below has 1sec) expires.

sslStream.ReadTimeout = 1000;
sslStream.Read(clientReadBuffer, 0, clientReadBuffer.Length);

Does anyone has any idea about this issue ? Is it a bug in OpenSSL.net
Library ?


Is this readtimeout working for anyone ?

Swapnil

|| Hare Krishna Hare Krishna Krishna Krishna Hare Hare ||
|| Hare RamaHare Rama   Rama   RamaHare Hare ||


Re: Openssl tarball SHA1 checksum

2010-04-12 Thread Steffen DETTMER
* Kenneth Goldman wrote on Sun, Apr 11, 2010 at 15:36 -0400:
> owner-openssl-us...@openssl.org wrote on 04/11/2010 01:38:14 PM:
> > * Kenneth Goldman wrote on Fri, Apr 09, 2010 at 08:12 -0400:
> > > I notice that the tarballs also include a SHA1 digest.
> > > What's the point?
> >
> > To have a check whether the FTP download was successful to
> > avoid accidentally using corrupt files, a file integrity
> > check with a checksum is quite common.
>
> Aha.  So it's just a double check on ftp?  It's not trying to
> protect against an attacker targeting the openssl site or the
> download process?

(I cannot tell the intention of the checksum, because I don't know
the involved processes, but I think it is wrong to take it as
authenticity check).

I think, to protect against malicious OpenSSL source code you
have to retrieve the analyzed and approved version from the
security lab you trust and appointed (ensuring authenticity by
e.g. cryptographic means) and/or to verify the diff to the last
checked version.

Otherwise an attack to let's say the CVS server could succeed
(if done well, checksum of announcement could even `proof' this
malicious modification `authentic', if the attack had been done
in a way remaining unnoticed by OpenSSL release process).

oki,

Steffen


 
About Ingenico: Ingenico is a leading provider of payment solutions, with over 
15 million terminals deployed in more than 125 countries. Its 2,850 employees 
worldwide support retailers, banks and service providers to optimize and secure 
their electronic payments solutions, develop their offer of services and 
increase their point of sales revenue. More information on 
http://www.ingenico.com/.
 This message may contain confidential and/or privileged information. If you 
are not the addressee or authorized to receive this for the addressee, you must 
not use, copy, disclose or take any action based on this message or any 
information herein. If you have received this message in error, please advise 
the sender immediately by reply e-mail and delete this message. Thank you for 
your cooperation.
 P Please consider the environment before printing this e-mail
 
 
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


SSL / Certificates / ... Some confusion

2010-04-12 Thread Götz Reinicke - IT-Koordinator
Hi,

since a couple of days I try to setup a provider and a consumer over ssl
following the documentation in a book [1] an dusing two servers. (Red
Hat 5.x, openssl-0.9.8e-12, openldap-2.3.43-3 )

Doing so I was confronted with a lot off different warnings/messages but
finaly I got the replication crypted.

The final step in the tutorial is to use the saslmech=external but the
messages I do get are different from the messages I should get.

I noticed and googeled some provider debug info and wanted to ask for
some prove or clarification or work around:

>From the provider log:

TLS certificate verification: Error, unsupported certificate purpose
...
TLS trace: SSL3 alert write:warning:bad certificate
connection_read(13): unable to get TLS client DN, error=49 id=1

>From a posting from 2006 and the answere from Howard Chu [2] I think I
do have the same problem: My consumer server certificate "should be"
from the providers view a client certificate.

>From the certificate:

X509v3 extensions:
X509v3 Basic Constraints:
CA:FALSE
Netscape Cert Type:
SSL Server

Am I wrong, right, lost, ... Is there a workaround or any step while
creating the certificates?

Thanks once more and best regards,

Götz


[1] http://www.galileocomputing.de/katalog/buecher/titel/gp/titelID-1801
[2] http://www.openldap.org/lists/openldap-software/200604/msg00202.html

-- 
Götz Reinicke
IT-Koordinator

Tel. +49 7141 969 420
Fax  +49 7141 969 55 420
E-Mail goetz.reini...@filmakademie.de

Filmakademie Baden-Württemberg GmbH
Akademiehof 10
71638 Ludwigsburg
www.filmakademie.de

Eintragung Amtsgericht Stuttgart HRB 205016
Vorsitzende des Aufsichtsrats:
Prof. Dr. Claudia Hübner

Geschäftsführer:
Prof. Thomas Schadt
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Re: Problems with DSA 2048-bit keys

2010-04-12 Thread Sad Clouds
On Sun, 11 Apr 2010 23:29:27 -0400
"Dave Thompson"  wrote:

> Aside: do you really need this? FIPS 186-3 extended DSA to 2k and 3k, 
> but SP 800-57 no longer approves classic DSA for USgovt use at all, 
> even in the new sizes, it switches to ECDSA instead.

I probably don't need DSA, I was testing different algorithms and key
sizes for client/server interoperability reasons.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org


Re: Openssl tarball SHA1 checksum

2010-04-12 Thread Kenneth Goldman
owner-openssl-us...@openssl.org wrote on 04/11/2010 01:38:14 PM:

> * Kenneth Goldman wrote on Fri, Apr 09, 2010 at 08:12 -0400:
> >I notice that the tarballs also include a SHA1 digest. What's the
> >point?
>
> To have a check whether the FTP download was successful to avoid
> accidentally using corrupt files, a file integrity check with a
> checksum is quite common.

Aha.  So it's just a double check on ftp?  It's not trying to
protect against an attacker targeting the openssl site or
the download process?

Re: How to passively obtain the server certificate from a TLS connection

2010-04-12 Thread Ciprian Dorin, Craciun
Hello again!

I've sent the email below one week ago to this mailing list
(OpenSSL), and so far nobody replied... So my guess is that either
I've asked a very stupid question, or? (The email was delivered as
I've looked over the archives.)

Thanks again,
Ciprian.


On Sun, Apr 4, 2010 at 10:56 PM, Ciprian Dorin, Craciun
 wrote:
>    Hello all!
>
>    (I'm a new member of this mailing list, so if the answer to my
> question is already somewhere in the archives please point me there.)
>    (I've done some searching and couldn't find anything useful.)
>
>    In the context of the Perspectives project (
> http://www.cs.cmu.edu/~perspectives ) (the Perspectives developers
> mailing list is also put in CC, so please keep them there) I want to
> implement an HTTPS proxy server that does the following:
>    * when it receives the CONNECT request it connects to the
> designated target, but,
>    * it monitors the connection (thus "sniffing" the connection) in
> order to obtain the SSL certificate that the server uses;
>    * it compares the SSL certificate fingerprint to those reported by
> the notary servers (part of the Perspectives project infrastructure),
> and
>    * if the fingerprints match I stop "sniffing" the connection and
> just continue proxying;
>    * if the fingerprints don't match I just drop the connection;
>
>    So my problem is the following: how can I extract the SSL
> certificate from the connection without reimplementing the TLS
> protocol?
>
>    For example I assume that there is a method (which I'm not aware
> of and want to find it), in which I just feed the data that comes from
> the server to the client (ignoring the other channel of the
> connection), into a parser, which at the end will spit out the
> certificate (or at least decode the TLS packets as they fly by).
>    (I bet that there are functions in the openssl library, but it's
> hard to spot them in the reference documentation.)
>
>    And a second question (related to security): I guess that there is
> no way to trick my proxy by switching to another certificate once the
> first one was already sent? For example I guess there is no way in
> which the server can re-initiate the TLS handshake (reusing the same
> connection) by using another certificate than the one previously sent.
>
>    Thanks for your support,
>    Ciprian.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   majord...@openssl.org