OpenSSL not accepting a certificate, whilst curl does.

2020-09-28 Thread John Robson via openssl-users
update-ca-trust extract`). After this curl no longer complains about the certificate from the web server (expected). However OpenSSL still does (unexpected), and I presume that for the same reason(s) urllib in Python also doesn't accept the certificate. If I manually feed `openssl verify`

Re: OpenSSL not accepting a certificate, whilst curl does.

2020-09-30 Thread John Robson via openssl-users
tl;dr: Found an issue with update-ca-trust extract OpenSSL doing what it should, but update-ca-trust is only pushing the cert into some of the trust stores. Thanks Tomas On Tue, 29 Sep 2020 at 07:06, Tomas Mraz wrote: > > On Mon, 2020-09-28 at 22:35 +0100, John Robson via openssl-users

stunnel 5.57 released

2020-10-11 Thread Michał Trojnara via openssl-users
yChain = yes" (thx to Rob Hoes).   - OpenSSL DLLs updated to version 1.1.1h. * New features   - New securityLevel configuration file option.   - FIPS support for RHEL-based distributions.   - Support for modern PostgreSQL clients (thx to Bram Geron).   - Windows tooltip texts updated to

OpenSSL support for MacOS Big Sur(Cross compilation for ARM architecture/Apple silicon)?

2020-10-18 Thread Vinay Kumar via openssl-users
Hi All, As Apple is moving from Intel to ARM architecture, does OpenSSL support cross-compiling(using Xcode 12.2) on MacOS Big Sur for Apple silicon(ARM architecture)?If not, any expected date? Thanks,Vinay

Re: CAPI engine seems to break server validation

2020-10-23 Thread Jakob Bohm via openssl-users
er one. This is probably the following issue: https://github.com/openssl/openssl/issues/8872 Matt Looking at the brutal wontfixing of that bug, maybe reconsider if the existing engine interface can do PSS by simply having the CAPI/CAPIng engine export the generic PKEY type for PSS-capable RSA keys

Re: CAPI engine seems to break server validation

2020-10-26 Thread Jakob Bohm via openssl-users
the capi engine handle only the client authentication. As you understand it, would the problem breaking server verification also preclude client authentication with the capi engine? From the content of your mails, I inferred that whatever you tried to do caused OpenSSL to attempt to generate

Fencepost errors in certificate and OCSP validity

2020-10-28 Thread Jakob Bohm via openssl-users
warning, I checked what the OpenSSL code does, and it seems to be a bit more buggy: x509_vfy.c seems to be a bit ambivalent if certificate validity should be inclusive or exclusive of the time values in the certificate. apps.c seems to convert the validity duration in days as if the notAfter field is

How is the TLS Record Layer Version Selected?

2020-10-28 Thread Thomas Antonio via openssl-users
Hello, how does openSSL determine the Record Layer Version used to initiate a ClientHello message to the server? I believe the determination is made at this level. When testing using multiple implementations (Python Requests on a Debian machine and `cURL --tlsv1.2 --tls-max 1.2` from macOS) I

Re: How to make ocsp responder busy

2020-11-09 Thread Jakob Bohm via openssl-users
On 2020-11-09 09:58, Venkata Mallikarjunarao Kosuri via openssl-users wrote: Hi We are trying to work scenario to openssl OCSP responder busy, but we are not sure how to make OCSP responder busy could please throw some pointer to work on. Ref https://www.openssl.org/docs/man1.0.2/man1

RSA_METHOD.rsa_sign not called in FIPS mode

2020-11-09 Thread Paul O'Keefe via openssl-users
I'm using an OpenSSL engine that uses the RSA_FLAG_SIGN_VER flag and implements RSA_METHOD.rsa_sign() instead rsa_priv_enc(). This is mainly because of the requirement that it work with Windows CryptoAPI which does not support low-level RSA signing (see CAPI engine). Everything works

Re: Server application hangs on SS_read, even when client disconnects

2020-11-16 Thread Jakob Bohm via openssl-users
3 nov. 2020 à 15:43, Michael Wojcik mailto:michael.woj...@microfocus.com>> a écrit : > From: openssl-users mailto:openssl-users-boun...@openssl.org>> On Behalf Of Brice André > Sent: Friday, 13 November, 2020 05:06 > ... it seems that in some rare execution cases, the server performs a

TLS with Client Authentication using private key from Windows store

2020-11-23 Thread Ferenc Gerlits via openssl-users
Hi, I am trying to use openssl to implement a client-side TLS connection with Client Authentication on Windows, using a non-exportable private key stored in the Windows Certificate Store. Currently, our code can use a private key stored in a local file, and if the key in the Windows store was

Re: Regarding #def for 'SSL_R_PEER_ERROR_NO_CIPHER' and 'SSL_R_NO_CERTIFICATE_RETURNED' in openssl3.0

2020-12-07 Thread Jakob Bohm via openssl-users
On 07/12/2020 12:39, Matt Caswell wrote: On 04/12/2020 13:28, Narayana, Sunil Kumar wrote: Hi,     We are trying to upgrade our application from openssl usage of 1.0.2 to openssl 3.0, during which we observe following errors. Looks like the below #def been removed from 1.1

RE: DH_generate_key

2020-12-08 Thread Sands, Daniel via openssl-users
Dear openssl team, While migrating from 1.0.2 to 3.0, we found that DH_generate_key() has be deprecated. And as per the man page, it is advised to use EVP_PKEY_derive_init<https://www.openssl.org/docs/manmaster/man3/EVP_PKEY_derive_init.html> & EVP_PKEY_de

Re: Help with SSL 8152 SEC_ERROR_INVALID_KEY Intermittent Error (first post please be kind!)

2020-12-09 Thread Benjamin Kaduk via openssl-users
rd party and same connection type > but not reported this issue. > > Has anyone got any clue as to what might be causing this type of > intermittent connection issue ? As was already noted, this is not an error generated by OpenSSL. More concretely, RFC 8152 is for CBOR Object Signing

RE: DH_compute_key () - replacement in 3.0

2020-12-14 Thread Sands, Daniel via openssl-users
to exactly replace this we are generating “pubparam_key/priparam_key” using bn_publicKey/dh->priv_key as below OSSL_PARAM_BLD *pubparamsbld = NULL, priparamsbld = NULL; OSSL_PARAM *pubparams = NULL, priparams = NULL; EVP_PKEY *pubparam_key = NULL, *priparam_key = NULL; EVP_PKEY_CTX *pubctx =

RE: [EXTERNAL] RE: DH_compute_key () - replacement in 3.0

2020-12-15 Thread Sands, Daniel via openssl-users
We do have generated the key using EVP_PKEY_gen as suggested in earlier emails, but since this was a non-ephemeral and we wanted to store the key in "raw" octet bytes, so we did extracted the whole DH priv/pub key pair out from the key generated via EVP_PKEY_gen ( using as suggested… EVP_PKEY

p12 bundle for Android (WiFi EAP-TLS)

2020-12-16 Thread Kostya Berger via openssl-users
Hello, everyone! I'm creating a p12 bundled certificate (I used it for Android phone). Used both easyrsa command and, alternatively, openssl command as shown in many manuals, like this: openssl pkcs12 -export -in client.crt -inkey client.key -certfile ca.crt -name "name" -out cli

RE: [EXTERNAL] RE: DH_compute_key () - replacement in 3.0

2020-12-16 Thread Sands, Daniel via openssl-users
version. Note that the inputs are same in both scenario. The generated key should be random. So unless you seed your PRNG with a constant value, you should always generate a different public/private keypair. Between OpenSSL versions, the PRNG may have changed, so I would not depend on them to

RE: [EXTERNAL] RE: DH_compute_key () - replacement in 3.0

2020-12-17 Thread Sands, Daniel via openssl-users
From: Narayana, Sunil Kumar Sent: Thursday, December 17, 2020 8:17 AM To: Sands, Daniel ; openssl-users@openssl.org Subject: [EXTERNAL] RE: DH_compute_key () - replacement in 3.0 Hi, For the equivalent replacement of DH_compute_key in 3.0, we tried to perform the steps

BIO_s_file() and files that are larger than int - how is overflow handled?

2020-12-24 Thread Graham Leggett via openssl-users
Hi all, According to the manpage at https://www.openssl.org/docs/man1.1.0/man3/BIO_s_file.html the macro BIO_tell() casts to int: /opt/local/include//openssl/bio.h:# define BIO_tell(b) (int)BIO_ctrl(b,BIO_C_FILE_TELL,0,NULL) What happens if the file being parsed is larger than can fit in

Failing unit tests after adding public key check to pkey_ec_derive()

2020-12-29 Thread Patrick Jakubowski via openssl-users
Hi all, I've been tasked with making some modifications to OpenSSL 1.1.1 in order to bring it into compliance with FIPS 140-2. One of the items on the to-do list was to implement the required key agreement scheme assurances specified in NIST SP.800-56Ar3 Section 9. This involves performing

Re: Failing unit tests after adding public key check to pkey_ec_derive()

2020-12-31 Thread Patrick Jakubowski via openssl-users
KEY public/private keypair and then overrides it with the server public key, so the generation was a waste anyway. Instead, it should create a parameters-only EVP_PKEY. (This is a consequence of OpenSSL using the same type for empty key, empty key with key type, empty key with key type + parameters,

Re: Random and rare Seg faults at openssl library level

2021-01-08 Thread Jakob Bohm via openssl-users
On 2021-01-07 18:05, Ken Goldman wrote: On 1/7/2021 10:11 AM, Michael Wojcik wrote: $ cat /etc/redhat-release && openssl version CentOS Linux release 7.9.2009 (Core) OpenSSL 1.0.2k-fips  26 Jan 2017 Ugh. Well, OP should have made that clear in the original message. And this is on

Re: Fwd: channel binding

2021-01-11 Thread Benjamin Kaduk via openssl-users
On Sun, Jan 10, 2021 at 02:44:38PM +, Jeremy Harris wrote: > Hi, > > What is the status of SSL_get_finidhed() / SSL_get_peer_finished() ? > > I do not find them documented at > > https://urldefense.com/v3/__https://www.openssl.org/docs/manmaster/man3/__;!!GjvTz_vk!FUYwEktTkE4ZmFeJKSFeBQe32

Re: Fwd: channel binding

2021-01-11 Thread Benjamin Kaduk via openssl-users
On Mon, Jan 11, 2021 at 09:26:30PM +, Jeremy Harris wrote: > On 11/01/2021 08:20, Benjamin Kaduk wrote: > > Current recommendations are not to use the finished message as the channel > > binding but instead to define key exporter label for the given usage > > (see > > https://urldefense.com/v3

Re: Fwd: channel binding

2021-01-11 Thread Benjamin Kaduk via openssl-users
ck with the Finished-based channel bindings; the exporter > > interface is a new protocol mechanism and the whole protocol/ecosystem has > > to be expecting to use it. > > Right. So we have implementations out there using it; will the OpenSSL > project consider promoting it to suppor

Re: Parsing and generating CBOR certificates?

2021-01-20 Thread Kaduk, Ben via openssl-users
No. OpenSSL does not include any CBOR protocol support. I'm also not sure what you mean by "CBOR-encoded certificate"; I don't know of any such thing other than https://datatracker.ietf.org/doc/draft-mattsson-cose-cbor-cert-compress/ which is very much still a wor

Re: Parsing and generating CBOR certificates?

2021-01-20 Thread Benjamin Kaduk via openssl-users
X.509-conformant certificates). > > Thanks > > Regards, > Uri > > > On Jan 20, 2021, at 19:26, Kaduk, Ben wrote: > > > > No. OpenSSL does not include any CBOR protocol support. > > I'm also not sure what you mean by "CBOR-encoded certificate"

Re: PKCS12 APIs with fips 3.0

2021-01-26 Thread Jakob Bohm via openssl-users
On 2021-01-25 17:53, Zeke Evans wrote: Hi, Many of the PKCS12 APIs (ie: PKCS12_create, PKCS12_parse, PKCS12_verify_mac) do not work in OpenSSL 3.0 when using the fips provider.  It looks like that is because they try to load PKCS12KDF which is not implemented in the fips provider.  These

Re: PKCS12 APIs with fips 3.0

2021-01-28 Thread Jakob Bohm via openssl-users
Does that mean that OpenSSL 3.0 will not have a true "FIPS mode" where all the non-FIPS algorithms are disabled, but the FIPS-independent schemes/protocols in the "default" provider remains available? Remember that in other software systems, such as OpenSSL 1.0.x and MS

Re: PKCS12 APIs with fips 3.0

2021-01-28 Thread Jakob Bohm via openssl-users
ode can be easily achieved with OpenSSL 3.0 - either by loading just the fips and base provider, or by loading both default and fips providers but using the "fips=yes" default property (without the "?"). The PKCS12KDF does not work because it is not an FIPS approved KDF algorithm s

Re: PKCS12 APIs with fips 3.0

2021-01-28 Thread Jakob Bohm via openssl-users
If the context does not limit the use of higher level compositions, then OpenSSL 3.0 provides no way to satisfy the usual requirement that a product can be set into "FIPS mode" and not invoke the non-validated lower level algorithms in the "default" provider. The usual contex

Re: PKCS12 APIs with fips 3.0

2021-01-28 Thread Jakob Bohm via openssl-users
If that is a hypothetical context, what context is the official design goal of the OpenSSL Foundation for their validation effort? On 2021-01-28 11:26, Tomas Mraz wrote: This is a purely hypothetical context. Besides, as I said below - the PKCS12KDF should not be used with modern PKCS12 files

Re: Encoding of AlgorithmIdentifier with NULL parameters

2021-01-28 Thread Jakob Bohm via openssl-users
wrote: I am trying to provide a test certificate generated by openssl-3.0.0-alpha10 to a third party certificate parser/manager. This software expects AlgorithmIdentifier to either have parameters or to have null encoded (05 00) parameters which seems to be missing in the certificate. Cer

Re: Encoding of AlgorithmIdentifier with NULL parameters

2021-01-28 Thread Jakob Bohm via openssl-users
: *openssl-users-bounce on behalf of openssl-users *Organization: *WiseMo A/S *Reply-To: *Jakob Bohm *Date: *Thursday, January 28, 2021 at 21:10 *To: *openssl-users *Subject: *Re: Encoding of AlgorithmIdentifier with NULL parameters Also note that the official ASN.1 declaration for

stunnel 5.58 released

2021-02-20 Thread Michał Trojnara via openssl-users
(thx to Martin Stein).   - Fixed a double free with OpenSSL older than 1.1.0 (thx to     Petr Strukov).   - OpenSSL DLLs updated to version 1.1.1j. * New features   - New 'protocolHeader' service-level option to insert custom     'connect' protocol negotiation headers.  This feat

ASN.1 encoding error

2021-02-25 Thread John Robson via openssl-users
27;, 'illegal padding'), ('asn1 encoding routines', > 'asn1_template_noexp_d2i', 'nested asn1 error'), ('asn1 encoding routines', > 'asn1_template_noexp_d2i', 'nested asn1 error'), ('SSL routines', > 'tls_proce

Re: ASN.1 encoding error

2021-02-25 Thread Benjamin Kaduk via openssl-users
That sounds like the certificate is encoded using ASN.1 BER rules, that openssl accepts, but the python library is insisting on DER encoding (per the spec). -Ben On Thu, Feb 25, 2021 at 05:19:32PM +, John Robson via openssl-users wrote: > Hi all, > > I'm encountering an error

Re: ASN.1 encoding error

2021-02-25 Thread John Robson via openssl-users
hat I am seeing. Thanks, John On Thu, 25 Feb 2021 at 17:29, Benjamin Kaduk wrote: > That sounds like the certificate is encoded using ASN.1 BER rules, that > openssl > accepts, but the python library is insisting on DER encoding (per the > spec). > > -Ben > > On Thu, Feb 25

Re: PEM file line size

2021-02-25 Thread Benjamin Kaduk via openssl-users
On Thu, Feb 25, 2021 at 03:30:43PM -0800, Frank Liu wrote: > Looking at test cases > https://urldefense.com/v3/__https://github.com/openssl/openssl/blob/OpenSSL_1_1_1-stable/test/recipes/04-test_pem.t__;!!GjvTz_vk!A42D2c2brOwptas6T1iBt9i7pMWhwehkKAmeCuILgR-6iv5n0TQPQ6tkkVgG9A$ > &g

Re: Query on SSL Mutual Authentication on Server

2021-03-02 Thread Jakob Bohm via openssl-users
if (calist == NULL) { /* log error loading client CA names */ } SSL_CTX_set_client_CA_list(server_ctx, calist); If yes, Is it expected to do the IP or hostname validation? Neither, authorization of the client is up to you. OpenSSL will check the dates, validity of the signa

Re: OpenSSL 3.0.0 APIs for creating an EVP_PKEY from a p256 private key octet string

2021-03-07 Thread Benjamin Kaduk via openssl-users
Hi Stephen :) The API you'll want to use is EVP_PKEY_fromdata(); there's a stubbed out example of using it to make an EVP_PKEY with EC group parameters at https://github.com/openssl/openssl/issues/14258#issuecomment-783351031 but the translation to also specify OSSL_PKEY_PARAM_PRI

Re: OpenSSL 3.0.0 APIs for creating an EVP_PKEY from a p256 private key octet string

2021-03-08 Thread Benjamin Kaduk via openssl-users
make an EVP_PKEY with > > EC group parameters at > > https://github.com/openssl/openssl/issues/14258#issuecomment-783351031 > > but the translation to also specify OSSL_PKEY_PARAM_PRIV_KEY > > (and possibly OSSL_PKEY_PARAM_PUB_KEY; I forget if you need > > to pass bot

OpenSSL 3.0 - providing entropy to EVP_RAND ?

2021-03-23 Thread Bala Duvvuri via openssl-users
Hi All, In OpenSSL 1.1.1 version, we were using RAND_DRBG for random number generation. Using "RAND_DRBG_set_callbacks", we were able to call into our custom API for entropy and nonce generation. How can this be achieved with EVP_RAND implementation i.e. does it allow entropy to b

libcrypto.a and FIPs module in OpenSSL 3.0

2021-03-26 Thread Bala Duvvuri via openssl-users
Hi All, We build the "crypto" code in OpenSSL to generate "libcrypto.a" for MIPs platform. Our application links statically with "libcrypto.a" and uses the OpenSSL crypto API's accordingly. With this compilation model, will it be feasible to integrate with

FIPs algorithm code vs default implementation

2021-03-28 Thread Bala Duvvuri via openssl-users
Hi All, This is a basic question regarding FIPs algorithm code in OpenSSL 3.0, can you kindly let me know: 1> Can you please help to understand the differences in the FIPs algorithm implementation code vs default? Are there additional validations performed in FIPs code? Can

Unable to load the FIPs config file OpenSSL 3.0

2021-03-30 Thread Bala Duvvuri via openssl-users
ail:crypto/provider_core.c:557:name=fips 00FFF2406000:error:076D:configuration file routines:(unknown function):module initialization error:crypto/conf/conf_mod.c:242:module=providers, value=provider_sect retcode=-1 Version: OpenSSL 3.0.0-alpha13 11 Mar 2021 ~ # ls -lrt providers/ -rwxrwxrwx

Porting to version 1.1.1 with old Linux kernel 3.0.8

2021-04-05 Thread Boris Shpoungin via openssl-users
Hello, Is there minimal requirements for Linux kernel for usage of openssl library version 1.1.1? I have old application based on Linux kernel 3.0.8 which uses openssl version 1.0.2. My question is whether it is possible to port this application to use openssl version 1.1.1 in Linux 3.0.8

Re: Porting to version 1.1.1 with old Linux kernel 3.0.8

2021-04-05 Thread Boris Shpoungin via openssl-users
er it describes ALL required modification? On Monday, April 5, 2021, 03:57:36 PM EDT, Viktor Dukhovni wrote: > On Apr 5, 2021, at 11:16 AM, Boris Shpoungin via openssl-users > wrote: > > Is there minimal requirements for Linux kernel for usage of openssl library > versio

stunnel 5.59 released

2021-04-05 Thread Michał Trojnara via openssl-users
Dear Users, I have released version 5.59 of stunnel. ### Version 5.59, 2021.04.05, urgency: HIGH * Security bugfixes   - OpenSSL DLLs updated to version 1.1.1k. * New features   - Client-side "protocol = ldap" support (thx to Bart     Dopheide and Seth Grover). * Bugfixes   - The

Using SSL_CTX_set_min_proto_version

2021-04-06 Thread Tamara Kogan via openssl-users
Hello, In our client application we are trying to set TLS 1.2 in ClientHello message. The OpenSSL version is 1.1.1h We use the function SSL_CTX_set_min_proto_version(ssl->ctx, TLS1_2_VERSION); If I test the version right after setting it does return 1.2 SSL_CTX_get_proto_version(ssl-&

Re: Using SSL_CTX_set_min_proto_version

2021-04-07 Thread Tamara Kogan via openssl-users
> From: Matt Caswell > Subject: Re: Using SSL_CTX_set_min_proto_version > Date: April 6, 2021 at 2:13:02 PM EDT > To: openssl-users@openssl.org > > > On 06/04/2021 18:45, Tamara Kogan via openssl-users wrote: >> Hello, >> In our client application we are try

Compilation issue with 1.1.1k version

2021-04-07 Thread Boris Shpoungin via openssl-users
Hello, I am using cross compiler toolchain (arm-hisiv200-linux-gnueabi) to compile openssl library for arm based custom board. I had no problems to compile version 1.1.1a, however I am having troubles to compile versions 1.1.1i and 1.1.1k: ${LDCMD:-arm-hisiv200-linux-gnueabi-gcc} -pthread -Wa

Symbols X509_set_notAfter and X509_set_notBefore are missing

2021-04-09 Thread Robert Smith via openssl-users
Hello, I am porting application from openSSL version 1.0.2u to 1.1.1k and linker complaints that symbols X509_set_notAfter and X509_set_notBefore are missing. I've checked both versions 1.0.2u and 1.1.1k and I see that these symbols really are not present in 1.1.1k.  user@ubuntu_dev_vm:~/

Re: Symbols X509_set_notAfter and X509_set_notBefore are missing

2021-04-09 Thread Benjamin Kaduk via openssl-users
They are macros now. You should still be able to build code that uses them. -Ben On Fri, Apr 09, 2021 at 08:03:28PM +, Robert Smith via openssl-users wrote: > Hello, > I am porting application from openSSL version 1.0.2u to 1.1.1k and linker > complaints that symbols X509_set_not

Re: Symbols X509_set_notAfter and X509_set_notBefore are missing

2021-04-09 Thread Robert Smith via openssl-users
te.cpp:202: undefined reference to `X509_set_notAfter' Any idea? On Friday, April 9, 2021, 04:13:32 PM EDT, Benjamin Kaduk wrote: They are macros now.  You should still be able to build code that uses them. -Ben On Fri, Apr 09, 2021 at 08:03:28PM +, Robert Smith via openssl-users wrot

Strange warnings while linking to openssl version 1.1.1k

2021-04-12 Thread Robert Smith via openssl-users
Hi, I am getting the following warning while linking my app to openssl version 1.1.1k. Could you advise what can cause these warnings and how to resolve them? Thanks ../../../artifacts/openssl/arm3531/lib/libcrypto.a(async_posix.o): In function `ASYNC_is_capable': async_posix.c:(.text

Re: OpenSSL 3.0 - providing entropy to EVP_RAND ?

2021-04-14 Thread Bala Duvvuri via openssl-users
s invoked for the entropy/nonce consumption (any specific callbacks set)? Can you please explain the steps or example of the usage? 2> Also, we need set DRBG for CAVS test (Input: EntropyInput, Nonce, PersonalizationString, AdditionalInput, EntropyInputPR, AdditionalInput, EntropyInputPR),

Re: PKCS7_decrypt vs RSA OAEP padding

2021-04-15 Thread Jakob Bohm via openssl-users
On 2021-04-15 12:57, Michal Moravec wrote: Follow-up on my previous email: I modified my proof-of-problem program to load PKCS7 file into PKCS7 and convert it to CMS_ContentInfo using the BIO (See convert.c in the attachment). It is similar to this: handle_encrypted_content(SCEP *handle, SC

Re: OpenSSL 3.0 - providing entropy to EVP_RAND ?

2021-04-16 Thread Bala Duvvuri via openssl-users
/implementations/rands/test_rng.c and the code to run NIST test. Still finding it a bit difficult to wrap around these new APIs In the old implementation using OpenSSL 1.1.1, to generate random numbers: a> we have set the callback for custom entropy (using RAND_DRBG_set_callbacks) for

req command with -multivalue-rdn set

2021-04-19 Thread Alberto Martin via openssl-users
I'm trying to create a certificate request with a multivalue RDN which involves CN+UID. I achieved the encoded multi-value RDN, but I want the UID being encoded first and then the CN. I always get the CN first, no matter what I put in the -subj "/CN=value+UID=value" or "/UID=value+CN=value". Changi

Linker failure after compilation with "enable-crypto-mdebug"

2021-04-26 Thread Robert Smith via openssl-users
Hello everyone. I'm trying to recompile OpenSSL version 1.1.1k under Windows 10 with the following configuration flag enable-crypto-mdebug and getting the following linker error:    Creating library apps\openssl.lib and object apps\openssl.expopenssl.obj : error LNK2019: unresolved ext

Re: Linker failure after compilation with "enable-crypto-mdebug"

2021-04-28 Thread Robert Smith via openssl-users
M EDT, Jan Just Keijser wrote: Hi, On 26/04/21 20:29, Robert Smith via openssl-users wrote: Hello everyone. I'm trying to recompile OpenSSL version 1.1.1k under Windows 10 with the following configuration flag enable-crypto-mdebug and getting the following linker error:

Switch hangs for significant amount of time when using RAND_write_file API with openssl version 1.1.1h and above.

2021-05-06 Thread Sravani Maddukuri via openssl-users
Hi, I have updated the openssl version running on the switch from 1.1.1g to 1.1.1h and eventually to 1.1.1k. Starting 1.1.1h, I am observing that the switch hangs for a significant amount of time (> 3 minutes) when the call RAND_write_file is invoked from the switch software. The same c

Re: I installed Openssl 1.1.1k and Ubuntu 20.04 did an upgrade and reverted it back to 1.1.1f. Usually Ubuntu upgrades don’t break it.

2021-05-21 Thread Jakob Bohm via openssl-users
On 2021-05-19 19:56, Michael McKenney wrote: I installed Openssl 1.1.1k and Ubuntu 20.04 did an upgrade and reverted it back to 1.1.1f.   Usually Ubuntu upgrades don’t break it. OpenSSL 1.1.1f  31 Mar 2020 (Library: OpenSSL 1.1.1k  25 Mar 2021) built on: Thu Apr 29 14:11:04 2021 UTC

Re: I installed Openssl 1.1.1k and Ubuntu 20.04 did an upgrade and reverted it back to 1.1.1f. Usually Ubuntu upgrades don’t break it.

2021-05-21 Thread Jakob Bohm via openssl-users
of the following diagnostic commands (after Ubuntu apparently undid your upgrade). $ dpkg --status libssl1.1 $ dpkg --status libssl-dev $ dpkg --status openssl $ type openssl $ openssl version -a $ ls -alF /usr/lib/x86_64-linux-gnu/libssl* $ ls -alF /usr/locallib/libssl* Oops, my bad, should have

Support for ECDH One-pass in "openssl cms enc"

2021-05-23 Thread Henning Krause via openssl-users
Hi, I'm trying to encrypt an email using the ECDH One-Pass algorithm. I've first created an X509 certificate with an EDSA key based on the curve prime256v1. Then, I ran this command: openssl cms -encrypt -in Unencrypted.eml -binary -recip ecc.cer -aes256 -keyopt ecdh_kdf_md:sha2

Re: Support for ECDH One-pass in "openssl cms enc"

2021-05-24 Thread Henning Krause via openssl-users
Hi, after studying the different key generator functions more closely I came to the conclusion that, since the Prime256 curve has a cofactor of 1, both KDF should produce the same value and so everything has cleared up. Kind regards, Henning From: openssl-users

X509_verify_cert() rejects all trusted certs with "default" X509_VERIFY_PARAM

2021-05-28 Thread Graham Leggett via openssl-users
b.com/openssl/openssl/blob/master/crypto/x509/x509_trs.c#L72 int X509_check_trust(X509 *x, int id, int flags) { X509_TRUST *pt; int idx; /* We get this as a default value */ if (id == X509_TRUST_DEFAULT) return obj_trust(NID_anyExtendedKeyUsage, x,

RE: Why can't we get a proper installation method to keep OpenSSL at the latest revision for Linux?

2021-05-31 Thread Michael McKenney via openssl-users
My wordpress servers are under constant attack. My Fortinet 60E firewall logs are filled. Openssl is constantly reported on The Hacker News and other sites. So I don't need to worry about upgrading OpenSSL in the future to 1.1.1k or above? I can just use what the distro has to off

RE: Why can't we get a proper installation method to keep OpenSSL at the latest revision for Linux?

2021-05-31 Thread Michael McKenney via openssl-users
Keijser ; openssl-users@openssl.org Subject: Re: Why can't we get a proper installation method to keep OpenSSL at the latest revision for Linux? If you use a supported distro (i.e., one that is not out of life) then the distro is expected to supply CVE issue fixes in form of updates. They us

RE: Why can't we get a proper installation method to keep OpenSSL at the latest revision for Linux?

2021-05-31 Thread Michael McKenney via openssl-users
cryptology.The OpenSSL bugs state to upgrade beyond 1.1.1f. -Original Message- From: openssl-users On Behalf Of Mauricio Tavares Sent: Monday, May 31, 2021 7:45 AM To: openssl-users@openssl.org Subject: Re: Why can't we get a proper installation method to keep OpenSSL at the l

RE: Why can't we get a proper installation method to keep OpenSSL at the latest revision for Linux?

2021-05-31 Thread Michael McKenney via openssl-users
I have never had a break in. The Fortinet 60E firewall does an amazing job. I will just leave it up to Ubuntu to provide the best OpenSSL solutions. Many people complain Ubuntu LTS is never on the latest kernel and lacks other things the 9 month distros like 21.04 and 21.10 give you.I

Re: FW: X509_verify_cert() rejects all trusted certs with "default" X509_VERIFY_PARAM

2021-06-01 Thread Jakob Bohm via openssl-users
h "default" X509_VERIFY_PARAM From: openssl-users On Behalf Of Graham Leggett via openssl-users Sent: Friday, 28 May, 2021 06:30 I am lost - I can fully understand what the code is doing, but I can’t see why openssl only trusts certs with “anyExtendedKeyUsage”. Interesting. I wondered if thi

Checking a single signature from several in S/MIME

2021-06-08 Thread Laurent Blume via openssl-users
er, not all of them? // Signing openssl smime -binary -sign -nodetach -in file -out file.signed -inkey key1.pem -signer cert1.pem -inkey key2.pem -signer cert2.pem // this command fails with signer certificate not found" openssl smime -binary -verify -nointern -noverify -certfile cert

Best practice for distributions that freeze OpenSSL versions and backports

2021-06-08 Thread Jakob Bohm via openssl-users
Dear team, It would be nice if there was a user- and security-friendly best practice document for distributions (such as Linux distributions) that freeze on an OpenSSL release version (such as 1.1.1z) and then backport any important fixes. Perhaps something like the following: 1. The

enforce ALPN overlap?

2021-06-09 Thread Jan Schaumann via openssl-users
Hello, Based on https://alpaca-attack.com/, I was looking at how a TLS connection with ALPN set to e.g., "banana" by the client to a server that has ALPN set to "h2" would behave. For example: $ openssl s_server -www -accept 443 -alpn h2 \ -key /tmp/key.pem -cer

Re: enforce ALPN overlap?

2021-06-09 Thread Jan Schaumann via openssl-users
Jan Schaumann via openssl-users wrote: > New, TLSv1.3, Cipher is TLS_AES_256_GCM_SHA384 Same for TLS 1.2, btw. (I accidentally copied the default output when writing the email.) -Jan

using the DSA signature algorithm of OpenSSL

2021-06-14 Thread Elmar Stellnberger via openssl-users
I wanna use the DSA signature algorithms of OpenSSL to verify RRSIG and DNSKEY DNSSEC resource records. This is described in RFC2536 (a very short RFC). As far as I could try it out (see my attachement) there are two ways to sign and verify with OpenSSL/DSA: via the EVP interface and via

Re: using the DSA signature algorithm of OpenSSL

2021-06-14 Thread Elmar Stellnberger via openssl-users
Oops, forgot to sha1; now it works. Am 14.06.21 um 11:20 schrieb Elmar Stellnberger via openssl-users:   I wanna use the DSA signature algorithms of OpenSSL to verify RRSIG and DNSKEY DNSSEC resource records. This is described in RFC2536 (a very short RFC).   As far as I could try it out

Re: openssl verify question

2021-06-17 Thread Jakob Bohm via openssl-users
On 2021-06-17 15:49, Viktor Dukhovni wrote: On Sat, Jun 12, 2021 at 10:20:22PM +0200, Gaardiolor wrote: When I compare those, they are exactly the same. But that's the thing, I think server.sig.decrypted should be prepended with a sha256 designator 30 31 30 0d 06 09 60 86 48 01 65 03 04 02 01 0

Re: reg: question about SSL server cert verification

2021-06-18 Thread Jakob Bohm via openssl-users
On 2021-06-18 06:38, sami0l via openssl-users wrote: I'm curious how exactly an SSL client verifies an SSL server's certificate which is signed by a CA. So, during the SSL handshake, when the server sends its certificate, will the SSL client first checks the `Issuer`'s `CN` fiel

Re: reg: question about SSL server cert verification

2021-06-18 Thread Jakob Bohm via openssl-users
On 2021-06-18 16:23, Michael Wojcik wrote: From: openssl-users On Behalf Of Jakob Bohm via openssl-users Sent: Friday, 18 June, 2021 07:10 To: openssl-users@openssl.org Subject: Re: reg: question about SSL server cert verification On 2021-06-18 06:38, sami0l via openssl-users wrote: I&#

Re: reg: question about SSL server cert verification

2021-06-19 Thread Jakob Bohm via openssl-users
On 2021-06-18 17:07, Viktor Dukhovni wrote: On Fri, Jun 18, 2021 at 03:09:47PM +0200, Jakob Bohm via openssl-users wrote: Now the client simply works backwards through that list, checking if each certificate signed the next one or claims to be signed by a certificate in /etc/certs.  This

Re: 3.0 beta1 feedback about (shared) library names

2021-06-21 Thread Benjamin Kaduk via openssl-users
dpkg -S /usr/lib/x86_64-linux-gnu/libssl3.so > libnss3:amd64: /usr/lib/x86_64-linux-gnu/libssl3.so > something up there that should be concerning, because maybe it will cause > confusion. NSS is the mozilla TLS stack, used by firefox/etc. > My newly installed openssl 3 has: > > %ls

Re: Can OpenSSL handle multiple authentication mechanisms on the same SSL context?

2021-06-21 Thread Benjamin Kaduk via openssl-users
On Tue, Jun 22, 2021 at 04:18:25AM +, Revestual, Raffy [AUTOSOL/PSS/MNL] wrote: > Also asked this question in stackoverflow.com > > https://urldefense.com/v3/__https://stackoverflow.com/questions/68077419/can-openssl-handle-multiple-authentication-mechanisms-on-the-same-ssl-

Hi

2021-06-29 Thread Jean Sweeny via openssl-users

openssl 1.1.1k: missing d2i_X509 function prototype

2021-06-30 Thread Konstantin Boyandin via openssl-users
Hello, OpenSSL version: 1.1.1k. I noticed that X509 *d2i_X509(X509 **px, const unsigned char **in, long len); function is no longer defined in openssl/x509.h available in 1.0.x versions, the only one available is now X509 *d2i_X509_AUX(X509 **a, const unsigned char **pp, long length); Do I

Re: openssl 1.1.1k: missing d2i_X509 function prototype

2021-06-30 Thread Konstantin Boyandin via openssl-users
On 01.07.2021 08:04, Viktor Dukhovni wrote: > On Thu, Jul 01, 2021 at 12:36:10AM +, Konstantin Boyandin via openssl-users wrote: > >> OpenSSL version: 1.1.1k. >> >> I noticed that >> >> X509 *d2i_X509(X509 **px, const unsigned char **in, long len); &g

Re: email notice [was: Not getting some macros for FIPS]

2021-07-01 Thread Jakob Bohm via openssl-users
orporate filter that automagically adds those. And oh boy! openssl-users having almost 3000 subscribers, that's quite a lot of people to chase down and ensure they have destroyed all copies, I tell ya! "Good luck" is probably an appropriate response ;-) Which is why I have set

Time for OpenSSL 1.1.1l?

2021-07-07 Thread Short, Todd via openssl-users
The cadence of 1.1.1 release is supposed to be quarterly (I seem to recall reading that somewhere, but I can't find it)? It has been almost 4 months since 1.1.1k (25-March-2021) was released. Are there any plans for 1.1.1l (ell)? -- -Todd Short // tsh...@akamai.com // “One if by land, two if by

Re: query on key usage OIDs

2021-07-16 Thread Jakob Bohm via openssl-users
Question was how to retrieve those lists for any given certificate, using currently supported OpenSSL APIs. The lists of usage bits and extusage OIDs in any given certificate are finite, even if the list of values that could be in other certificates is infinite. On 2021-07-16 06:44, Kyle

OpenSSL 3.0.0 beta1 link issues on Solaris 10

2021-07-25 Thread Dennis Clarke via openssl-users
and the library search path however that resulted in a pile of undefined symbols. So then I went and deleted my previous 1.1.1k libs and the openssl binary and tried the manual link once again with success. Not sure if anyone else runs into this but I would hope that the previous libs would not be

OpenSSL 3.0.0 beta1 with a vast number of failures

2021-07-25 Thread Dennis Clarke via openssl-users
After some work to clean out previous versions of OpenSSL 1.1.1x for some x I was able to get 3.0.0 beta1 to build. However it looks like some horrific perl problem in the test harness : # -- # Failed test '

Re: OpenSSL 3.0.0 beta1 link issues on Solaris 10

2021-07-25 Thread Dennis Clarke via openssl-users
oblem but > we still require help testing. Not a problem. I do understand. This is not exactly a common platform anymore but the things just keep on running. And running. > This would best be raised as an issue on GitHub > [https://github.com/openssl/openssl/issues/new?assignees=&

OpenSSL 3.0.0 beta1 test results on Sun/Oracle Solaris SPARC64 ( Fujitsu )

2021-07-26 Thread Dennis Clarke via openssl-users
ing modes_internal_test # -- # Failed test 'running modes_internal_test' # at /opt/bw/build/openssl-3.0.0-beta1_sunos5.10_sparcv9.002/util/perl/OpenSSL/Test/Simple.pm line 77. # Looks like you failed 1 test of 1.03-test_internal_modes.t ... Dubious, test returned 1 (wstat 2

Re: Wrong signature type error trying to connect to gibs.earthdata.nasa.gov on Ubuntu 20.04

2021-07-28 Thread Andrea Giudiceandrea via openssl-users
Hi ⁣Tomáš​ and openssl users, finally the server at gibs.earthdata.nasa.gov was upgraded in order to support SHA256 (instead of SHA1) as peer signing digest algorithm. So, it is now possible to properly connect to it on Ubuntu 20.04 without the need of lower the default SECURITY LEVEL from 2

Accessing bignums of a RSA key with OpenSSL 3.0?

2021-07-30 Thread Olivier Mascia via openssl-users
Dear all, Testing migration to OpenSSL 3.0. Got to update some code building a JWK (in relation to ACME LetsEncrypt protocols). Having an EVP_PKEY which happens to be a RSA key, I proceeded this way (1.1.1) to extract the bignums needed for inclusion into the JWK: // Access the

Re: Accessing bignums of a RSA key with OpenSSL 3.0?

2021-07-30 Thread Olivier Mascia via openssl-users
AM_RSA_N, n2); EVP_PKEY_set_bn_param(mKey, OSSL_PKEY_PARAM_RSA_E, e2); EVP_PKEY_set_bn_param(mKey, OSSL_PKEY_PARAM_RSA_D, d2); But how to get the proper int type to pass to EVP_PKEY_set_type()? Thanks all for support switching to OpenSSL 3.0. __ Best Regards, Meilleures salu

<    2   3   4   5   6   7   8   9   10   11   >