Re: SSL Library Error: error:2D06D075:FIPS routines:fips_pkey_signature_test:test failure (Type=RSA SHA1 X931)

2014-08-12 Thread Thulasi Goriparthi
$ openssl genrsa 2048 key.pem $ openssl req -new -x509 -key key.pem -out cert.pem -sha256 On Tue, Aug 12, 2014 at 11:08 AM, Abdul Anshad ab...@visolve.com wrote: Could you please provide me the steps for creating a self signed certificate meeting the current FIPS standard ? Thank you for

Re: Handshake finish msg

2014-08-12 Thread Thulasi Goriparthi
Assuming that finish you meant is Handshake Finished messages of SSL/TLS protocol, I assure you, you can see them with openssl too. Implementations can't (won't deliberately) change the protocol. Run s_server and s_client of openssl with -msg -debug -state options to see the handshake messages

Re: SSL Library Error: error:2D06D075:FIPS routines:fips_pkey_signature_test:test failure (Type=RSA SHA1 X931)

2014-08-12 Thread Viktor Dukhovni
On Tue, Aug 12, 2014 at 11:24:40AM +0530, Thulasi Goriparthi wrote: $ openssl genrsa 2048 key.pem Don't forget umask 077 before that. Otherwise, the key file is often world-readable. With AFS, fs setacl . ... to restrict access to the containing directory. -- Viktor.

multilevel CA wont load private key -help

2014-08-12 Thread lux-integ
Greetings I am trying to learn how to set up a small multilevel CA. Im using the openssl-1.0.1h. And the computer runs linux. I did the following: --A- generate rootCA openssl req \ -new \ -config openssl.cnf_ \ -outROOTCAReq.pem \ -keyout ROOTCAKey.pem \ -B- generated a crl )r

Re: client side session cache with SNI, and tlsext_ticket_key_cb

2014-08-12 Thread DEXTER
On Mon, Aug 11, 2014 at 6:00 PM, Viktor Dukhovni openssl-us...@dukhovni.org wrote: No, generally you re-use previously generated keys, otherwise you lose much of the advantage of stateless resumption. However, along with each keyset you associated some suitable TTL, and you stop signing new

Re: multilevel CA wont load private key -help

2014-08-12 Thread Jayadev Kumar
./CA.sh -newca (Script on a fresh directory creates demoCA directory with RootCA and Privatekey) ./CA.sh -newreq (creates a new cert request, with newcert.pem and newkey.pem) ./CA.sh -signCA (Sign the new req as CA, with RootCA). You can find the CA.sh in 'openssl-1.0.1h/apps' directory.

Re: multilevel CA wont load private key -help

2014-08-12 Thread Jayadev Kumar
Looks like CA.sh doesn't create crlnumber file in demoCA and openssl ca crl complains about it. With CA.pl This steps worked. mkdir RootCA cp ../openssl-1.0.1h/apps/CA.pl . chmod +x CA.pl ./CA.pl -newca (Just Enter, will create RootCA) ./CA.pl -newreq ./CA.pl -signCA

Re: SSL Library Error: error:2D06D075:FIPS routines:fips_pkey_signature_test:test failure (Type=RSA SHA1 X931)

2014-08-12 Thread Abdul Anshad
Thank you for the response. I already have a SHA-256 self signed certificate with a bit size 2048 but still ended up with the same error. I used the following command to create the self signed certificate. $ openssl req -x509 -sha256 -days 365 -newkey rsa:2048 -keyout

Re: multilevel CA wont load private key -help

2014-08-12 Thread Viktor Dukhovni
On Tue, Aug 12, 2014 at 10:25:36AM +0100, lux-integ wrote: openssl req \ -new \ -config openssl.cnf \ -out level1/LEVELCAReq.pem \ -keyout level1/private/LEVEL1CAKey.pem \ Where is the key stored? openssl ca \ -gencrl \ -crldays 60 \ -config openssl.cnf \ -keyfile

Re: SSL Library Error: error:2D06D075:FIPS routines:fips_pkey_signature_test:test failure (Type=RSA SHA1 X931)

2014-08-12 Thread Jayadev Kumar
check 'ldd mod_ssl.so' for proper linkage. -Jayadev. On Tue, Aug 12, 2014 at 7:01 PM, Abdul Anshad ab...@visolve.com wrote: Thank you for the response. I already have a SHA-256 self signed certificate with a bit size 2048 but still ended up with the same error. I used the following

How to Cross Compile OpenSSL for arm-none-eabi arch?

2014-08-12 Thread Tapas Behera
How to Cross Compile OpenSSL for arm-none-eabi arch?

RE: How to Cross Compile OpenSSL for arm-none-eabi arch?

2014-08-12 Thread Porter, Andrew
In general for cross-compiling you run ./Configure with various options, perhaps after setting up some environment variables like CC to point to your development tools. For example, to build Linux 32-bit on my 64-bit build machine I start with: ./Configure linux-elf -m32 plus --openssldir= and

Re: SSL Library Error: error:2D06D075:FIPS routines:fips_pkey_signature_test:test failure (Type=RSA SHA1 X931)

2014-08-12 Thread Dr. Stephen Henson
On Tue, Aug 12, 2014, Thulasi Goriparthi wrote: $ openssl genrsa 2048 key.pem $ openssl req -new -x509 -key key.pem -out cert.pem -sha256 You also need to set the environment variable OPENSSL_FIPS=1 so the operations are performed in FIPS mode. Steve. -- Dr Stephen N. Henson. OpenSSL

Re: SSL Library Error: error:2D06D075:FIPS routines:fips_pkey_signature_test:test failure (Type=RSA SHA1 X931)

2014-08-12 Thread Dr. Stephen Henson
On Mon, Aug 11, 2014, Abdul Anshad wrote: Hello All, I have a set up which runs Apache http-2.4.10 and Openssl-1.0.1i, when I try to start the http server with FIPS mode i get the following error. [Mon Aug 11 14:39:24.407781 2014] [suexec:notice] [pid 380] AH01232: suEXEC mechanism

Re: How to Cross Compile OpenSSL for arm-none-eabi arch?

2014-08-12 Thread jtanis
In message CA+oaCG5ew-wdHhN0WowEEKEqAK=izudfe72ftrjep1hhkjg...@mail.gmail.com, Tapas Behera avows: %--- Begin Cite ---% How to Cross Compile OpenSSL for arm-none-eabi arch? %--- End Cite ---% Add the following to your config command:

Re: Forcing client to send Certificate record

2014-08-12 Thread Viktor Dukhovni
[ Redirecting to openssl-users ] On Wed, Aug 13, 2014 at 01:05:24AM +0400, Fedor Indutny wrote: I just discovered that there is no way to force OpenSSL SSL client to send Certificate record if server hasn't sent CertificateRequest. That would be a TLS protocol violation. Would a patch that

pkcs12 password for openssl

2014-08-12 Thread Yichun Ding
Hi, I would like to know if I can always pass the export password of the .p12 client certificate to openssl without worrying about the pass phrase that needs to be set on generating the .p12 file. I looked function int PKCS12_parse(PKCS12 *p12, const char *pass, EVP_PKEY **pkey, X509 **cert,

RE: Forcing client to send Certificate record

2014-08-12 Thread Salz, Rich
There is no need for an API for a non-interoperable feature that would violate the TLS protocol: https://tools.ietf.org/html/rfc5246#section-7.4.6 Perhaps more usefully, see http://datatracker.ietf.org/doc/draft-thomson-tls-care/ This will almost definitely be part of TLS 1.3. Note

SSL_ERROR_WANT_READ on SSL_connect()

2014-08-12 Thread Shreyas Heranjal
Hi All, I have a DTLS implementation where I am trying to connect to a server using SSL_connect(). I am checking for the error codes using the SSL_get_error. My underlying BIO is non-blocking. Is there a way to figure out if the remote peer exists or not? As of now, I get SSL_ERROR_WANT_READ for