Re: [openssl-users] Bleichenbacher Vulnerability

2017-12-20 Thread Bodo Moeller
Hanno Böck : > I was wondering when exactly (the version) was the OpenSSL library > > patched for the Bleichenbacher Vulnerability? > > It was probably fixed some time in the late 90s. However according to > https://www.openssl.org/news/changelog.html > > the countermeasures were accidentally re

Re: SSL_MODE_SEND_FALLBACK_SCSV option

2014-10-21 Thread Bodo Moeller
Florian Weimer : The purpose of the option is to make totally broken applications a bit less > secure (when they happen to certain servers). I'd claim it's meant to make totally broken applications a bit *more* secure :-) > From my point of view, there is only one really good reason to have th

Re: Patch to mitigate CVE-2014-3566 ("POODLE")

2014-10-18 Thread Bodo Moeller
Jeffrey Walton : > Is there a way to compile without the patch? I think I would rather > 'config no=ssl3' and omit the additional complexity. Its additional > protocol complexity and heartbleed is still fresh in my mind. > There's no way to compile without the patch, other than reverting it. It'

Re: Patch to mitigate CVE-2014-3566 ("POODLE")

2014-10-18 Thread Bodo Moeller
mancha : > Bodo Moeller wrote: > > I certainly think that the claim that "new SCSV does not help with > > [the SSL 3.0 protocol issue related to CBC padding] at all" is wrong, > > and that my statement that TLS_FALLBACK_SCSV can be used to counter > > CVE-2

Re: Use of TLS_FALLBACK_SCSV

2014-10-17 Thread Bodo Moeller
Salz, Rich : Disabling ssl3 is a good thing. But set the fallback because silently > dropping from tls 1.2 to tls 1.1 is bad. > All this assumes that your client application *does* explicitly fall back from TLS 1.2 to TLS 1.1, instead of just relying on automatic protocol version negotiation. If

Re: Patch to mitigate CVE-2014-3566 ("POODLE")

2014-10-16 Thread Bodo Moeller
This is not quite the same discussion as in the TLS Working Group, but I certainly think that the claim that "new SCSV does not help with [the SSL 3.0 protocol issue related to CBC padding] at all" is wrong, and that my statement that TLS_FALLBACK_SCSV can be used to counter CVE-2014-3566 is right.

Re: Patch to mitigate CVE-2014-3566 ("POODLE")

2014-10-15 Thread Bodo Moeller
mancha : > Any reason for the s_client -fallback_scsv option check to be within an > #ifndef OPENSSL_NO_DTLS1 block? Thanks for catching this. No, there's no good reason for that; I should move it elsewhere. Bodo

Patch to mitigate CVE-2014-3566 ("POODLE")

2014-10-14 Thread Bodo Moeller
Here's a patch for the OpenSSL 1.0.1 branch that adds support for TLS_FALLBACK_SCSV, which can be used to counter the POODLE attack (CVE-2014-3566; https://www.openssl.org/~bodo/ssl-poodle.pdf). Note well that this is not about a bug in OpenSSL -- it's a protocol issue. If SSL 3.0 is disabled in e

Re: Why fprintf(stder) within a *library*?

2014-07-23 Thread Bodo Moeller
Good point, this doesn't look right; this is not how OpenSSL normally reports details. The DTLS code hasn't received the same attention as the SSL/TLS code yet, because it's used a lot less. Filing a report to r...@openssl.org makes sense -- it doesn't look as if this has been reported before. Bod

Re: Is it possible that calling ssl_accept in multi-threading circumstance will result in app to crash?

2014-03-26 Thread Bodo Moeller
jeff : I keep getting some application crash in openssl module, I checked the > dumps and stacks and found that although the stacks vary, the ssl_accept > function is found on all of them, below are some of exmaples. I google the > related information about this, looks like there is some problem w

Re: not fork-safe if pids wrap

2013-08-22 Thread Bodo Moeller
> > (So we probably should use the current time in addition to the PID to > get a > > general solution to the PID wrap-around problem even on systems where > > actual independent reseeding isn't possible.) > > The FIPS PRNG uses a combination of PID, a counter and a form of system > timer > for the

Re: not fork-safe if pids wrap

2013-08-22 Thread Bodo Moeller
On Thu, Aug 22, 2013 at 4:50 AM, Bodo Moeller wrote: > > Most other libraries I've seen handle this by saving the pid in a static >> variable, and then comparing the current pid to it. This has the advantage >> of not needing pthreads, and also of only adding the entrop

Re: not fork-safe if pids wrap

2013-08-22 Thread Bodo Moeller
> Most other libraries I've seen handle this by saving the pid in a static > variable, and then comparing the current pid to it. This has the advantage > of not needing pthreads, and also of only adding the entropy to the child > if it is actually needed (i. e. it doesn't exec after fork). > We m

Re: Effect of EC_GROUP_precompute_mult when doing signature verification (ECDSA_verify)

2012-10-09 Thread Bodo Moeller
On Tue, Oct 9, 2012 at 12:29 PM, Rune K. Svendsen wrote: > I've been researching if EC_GROUP_precompute_mult has any effect when > verifying ECDSA signatures using ECDSA_verify, and my results are somewhat > inconclusive. I see a small speedup, around 2-5%, but I'm not sure what the > reason is f

Re: header file for EC_KEY

2012-05-08 Thread Bodo Moeller
On Tue, May 8, 2012 at 9:00 PM, Bin Lu wrote: > If that is the case, why EC_KEY is exposed in ec.h, and how do I make > use of the functions that requires this object, e.g. > EVP_PKEY_get1_EC_KEY()? > To use functions like these, you don't need the struct details (you'd only need those to peek

Re: header file for EC_KEY

2012-05-08 Thread Bodo Moeller
> > My application requires me to constantly do things like: > > - return n, e, p from an openssl RSA key token > - construct an openssl RSA public key token from n, e > - construct an openssl RSA private key token from n, e, p > > I do this using the bignum-bin converters and knowledge of the RSA

Re: header file for EC_KEY

2012-05-08 Thread Bodo Moeller
> I noticed that EC_KEY (ec_key_st) is not defined in ec.h but in ec_lcl.h > which is not a public header file, not like RSA(rsa_st) in rsa.h and DSA in > dsa.h. Is that correct? > > Yes, this is intentional - this intentionally prevents applications from accessing ec_key_st fields directly, forc

Re: Disabling kEDH on webservers for scaling?

2012-04-27 Thread Bodo Moeller
On Fri, Apr 27, 2012 at 2:29 PM, Jack Bauer wrote: > Currently I don't know, if the type of DH parameters can be configured > in nginx. But I will investigate .. > > The only solution (for us, at the moment) seems to be to keep kEDH > enabled and hope, that most browsers will use ECDHE_RSA in th

Re: clarification about CVE-2011-3210 (TLS ephemeral ECDH) and OpenSSL 0.9.8 branch

2011-11-21 Thread Bodo Moeller
On Mon, Nov 21, 2011 at 10:51 AM, Marco Molteni wrote: > The OpenSSL security advisory of 2011-09-06 ( > http://www.mail-archive.com/openssl-announce@openssl.org/msg00108.html), > regarding "TLS ephemeral ECDH crashes in OpenSSL" states that the issue, > for branch 0.9.8, applies to "OpenSSL 0.9

Re: Support for ECDH-RSA cipher suites in 0.9.8

2011-11-07 Thread Bodo Moeller
On Fri, Nov 4, 2011 at 5:23 PM, John Foley wrote: > None of the ECDH-RSA cipher suites appear to work in 0.9.8r. Yet they > work in 1.0.0. Is this expected? > Yes -- the OpenSSL 0.9.8 branch includes basic support for elliptic-curve cryptography, but TLS integration wasn't finished. This is b

OpenSSL Security Advisory: OCSP stapling vulnerability

2011-02-08 Thread Bodo Moeller
. Neel Mehta (Google) identified the vulnerability. Adam Langley and Bodo Moeller (Google) prepared the fix. Which applications are affected - --- Applications are only affected if they act as a server and call SSL_CTX_set_tlsext_status_cb on the server's SSL_CTX.

OpenSSL 1.0.0d released

2011-02-08 Thread Bodo Moeller
p4qKI7363uBnLgLGQIgS8BBar0n8QARYv4t6c7O+HR3Kn7VCix8cErUm5MkoL79n C2YJVRKPmpuwoPkLGwC6beB1fBiwvUaJd/n+BSU5LO534QcSzF+u4UKczsGnPX72 HSA/Mzf8C6w= =Rpu4 -END PGP SIGNATURE- -- Bodo Moellerb...@openssl.org OpenSSL Project http://www.openssl.org

OpenSSL Security Advisory: OCSP stapling vulnerability

2011-02-08 Thread Bodo Moeller
. Neel Mehta (Google) identified the vulnerability. Adam Langley and Bodo Moeller (Google) prepared the fix. Which applications are affected - --- Applications are only affected if they act as a server and call SSL_CTX_set_tlsext_status_cb on the server's SSL_CTX.

OpenSSL 1.0.0d released

2011-02-08 Thread Bodo Moeller
p4qKI7363uBnLgLGQIgS8BBar0n8QARYv4t6c7O+HR3Kn7VCix8cErUm5MkoL79n C2YJVRKPmpuwoPkLGwC6beB1fBiwvUaJd/n+BSU5LO534QcSzF+u4UKczsGnPX72 HSA/Mzf8C6w= =Rpu4 -END PGP SIGNATURE- -- Bodo Moellerb...@openssl.org OpenSSL Project http://www.openssl.org

Re: ECDSA PKV Validation Failure

2009-09-04 Thread Bodo Moeller
On Sep 4, 2009, at 12:29 AM, Will Bickford wrote: In the following sample test case I get a false-positive from OpenSSL 1.0.0 Beta 3. Note that this tests specifically for a vector larger than should be allowed (192/32 = 6 32-bit integers, but Qy requires 7). Other test cases succeed or fail a

Re: Openssl: bio/crypto orthoganalization

2009-01-31 Thread Bodo Moeller
On Sat, Jan 31, 2009 at 6:49 AM, wrote: > I've not looked at the OpenSSL code for a few years now. Last time I looked > the only way to do things was via a "BIO" and the BIO functions did the > crypto. That's not right. The BIO functions don't do crypto (well, you can use BIO structures to

Re: ECC DH

2008-07-23 Thread Bodo Moeller
On Wed, Jul 23, 2008 at 7:06 PM, Keith Ellul <[EMAIL PROTECTED]> wrote: > Basically, I see that ECDH is part of openSSL. I have an ECC keypair, and I > have someone else's ECC public key. I want to use ECDH to agree on some key > material. Can I do this from the command line (ie, using the op

Re: [SPAM] Re: SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER

2007-08-24 Thread Bodo Moeller
On Fri, Aug 24, 2007 at 01:33:17PM +0300, Arne Ansper wrote: > On Mon, 26 Jun 2006, Darryl Miles wrote: >> Bodo Moeller wrote: >>> When using SSL_write() over a non-blocking transport channel, you may >>> have to call SSL_write() multiple times until all your data ha

Re: [PATCH] ECDHE-RSA-AES256-SHA failure with 0.9.9 SNAP 20070221

2007-02-22 Thread Bodo Moeller
On Thu, Feb 22, 2007 at 03:30:12AM -0500, Victor Duchovni wrote: > --- ssl/ssl_lib.c 2007-02-19 12:01:04.0 -0500 > +++ ssl/ssl_lib.c 2007-02-22 03:07:27.0 -0500 > @@ -1946,7 +1946,7 @@ > alg_k = s->s3->tmp.new_cipher->algorithm_mkey; > alg_a = s->s3->tmp.new_cip

Re: ALL vs DEFAULT or how to properly order anonymous ciphers?

2007-02-20 Thread Bodo Moeller
On Mon, Feb 19, 2007 at 03:22:44PM -0500, Victor Duchovni wrote: > As far as the 0.9.9 patch is concerned, is it possible to cache the > initial sorted order? Some applications process cipherlists for every > connection (destination dependent cipher lists), and it would be nice to > keep this effi

Re: ALL vs DEFAULT or how to properly order anonymous ciphers?

2007-02-20 Thread Bodo Moeller
On Mon, Feb 19, 2007 at 02:19:27PM -0500, Victor Duchovni wrote: > Regardless of the specific details, using a comparator makes the order > more systematic. One can still quible over whether anonymous auth beats > RSA auth, and I may not get my wish there, but I still think a sort based > based on

Re: ALL vs DEFAULT or how to properly order anonymous ciphers?

2007-02-20 Thread Bodo Moeller
On Mon, Feb 19, 2007 at 02:19:27PM -0500, Victor Duchovni wrote: > [...] I > think it is cleaner to put the anonymous kEECDH and kEDH ciphers first, > they use the strongest key-exchange mechanisms available, and best meed > the aut

Re: ALL vs DEFAULT or how to properly order anonymous ciphers?

2007-02-19 Thread Bodo Moeller
On Sat, Feb 17, 2007 at 11:45:58PM -0500, Victor Duchovni wrote: > Currently the OpenSSL "DEFAULT" cipherlist serves two functions: > > - Sort the cipherlist to put the strongest, most desirable algorithms > first. > > - Exclude ciphers that most applications should not be exposed to

Re: Cipher Negotiation

2006-06-30 Thread Bodo Moeller
On Fri, Jun 30, 2006 at 09:41:08AM -0700, Chris Clark wrote: >> It's not a bug that AES182 is classified as "HIGH", although it is a >> missing feature that there is no class that encompasses only the >> 256-bit ciphers. That's why there now is "@STRENGTH", which does >> not add any ciphers and j

Re: Cipher Negotiation

2006-06-30 Thread Bodo Moeller
On Fri, Jun 30, 2006 at 07:29:04AM -0400, Victor Duchovni wrote: >>> Currently I specify the group (HIGH/MEDIUM/LOW) and remove some ciphers >>> from a group (IDEA and ADH). I also remove AES at the beginning (Shif >>> +="-AES:") and add it later because if I don't remove AES there is no >>> way t

Re: SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER

2006-06-26 Thread Bodo Moeller
On Mon, Jun 26, 2006 at 02:04:47PM +0100, Darryl Miles wrote: > Bodo Moeller wrote: >> On Mon, Jun 26, 2006 at 12:35:57PM +0100, Darryl Miles wrote: >> Yes. During the first call to SSL_write(), OpenSSL may take as many >> bytes as fit into one TLS record, and encrypt this f

Re: SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER

2006-06-26 Thread Bodo Moeller
On Mon, Jun 26, 2006 at 12:35:57PM +0100, Darryl Miles wrote: > "Some of the calls to SSL_write() may read some of your data", I am > still not such how the reading of data impacts the write operation. Are > you saying that when WANT_READ is returned from SSL_write() the OpenSSL > library has

Re: OpenSSL and multiple threads

2006-06-26 Thread Bodo Moeller
On Mon, Jun 26, 2006 at 12:25:09PM +0200, Leon wrote: > On Mon, 2006-06-26 at 11:44 +0200, Bodo Moeller wrote: >> What is the file descriptor number that you observe during these >> calls? > The file descriptor is 1507 which seems correct since each thread opened > a soc

Re: OpenSSL and multiple threads

2006-06-26 Thread Bodo Moeller
On Mon, Jun 26, 2006 at 08:49:19AM +0200, Leon wrote: > I tracked the bug with gdb and found that it fails in RAND_poll(), > called from SSL_accept(), when a new session key is generated. The > strange thing is that after the file descriptor set is zeroed > [(FD_ZERO(&fset)] the call [FDSET(fd,&fs

Re: SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER

2006-06-26 Thread Bodo Moeller
On Thu, Jun 22, 2006 at 10:41:14PM +0100, Darryl Miles wrote: > SSL_CTX_set_mode(3) > > SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER > Make it possible to retry SSL_write() with changed buffer > location (the buffer contents must stay the same). This is not the > default to avoid the mis- >

Re: Error in 20060610 releases

2006-06-10 Thread Bodo Moeller
On Sat, Jun 10, 2006 at 06:25:33AM -0600, The Doctor wrote: [...] > making all in crypto/evp... > make: don't know how to make e_camellia.o. Stop > *** Error code 1 Oops ... a new file that I forgot to add to the CVS. This will be fixed in the next snapshot (20060611). _

Re: Openssl multithreaded use with only 2 threads and SSL_CTX per thread

2005-05-30 Thread Bodo Moeller
On Sun, May 29, 2005 at 03:43:33PM +0200, Nadav Golombick wrote: > If I am using only 2 threads with each thread containing its own SSL_CTX > object, do I still need to use locking functions? Yes! This is very important because OpenSSL uses some global data structures that will be shared by all

Re: SSL_write error - SSL3_WRITE_PENDING

2003-06-23 Thread Bodo Moeller
On Mon, Jun 23, 2003 at 11:46:57AM +0530, Wilson wrote: > Im facing a problem with SSL_write(). I have a server and client > communicating over TLS. Initial handshaking is done successfully. But as I > increase the load on server (Connecting more clients[5 to 10 ] and increaded > the message size)

Re: Timing attack

2003-03-10 Thread Bodo Moeller
Christopher Fowler <[EMAIL PROTECTED]> in epsilon.openssl.users: > I'm using the openssl source and not redhat packages. I recently got an > email from Red Hat that had this header: > > Security Advisory - RHSA-2003:062-11 > Since I'm on source and not rpm, I'm looking for a patch. Is there a

Re: Encryption / Decryption

2003-02-14 Thread Bodo Moeller
On Thu, Feb 06, 2003 at 01:38:11PM +, Séamus O'Toole wrote: > I have recently downloaded the latest version of OpenSSL and I am using it > in the development of a Secure Voice over IP Project. > > Is there a way to extract the session key from the SSL session and use it to > encrypt the dat

Re: SSL_poll() ???

2003-02-10 Thread Bodo Moeller
On Fri, Feb 07, 2003 at 03:57:17PM +0100, Alexander Biehl wrote: > but, is there no way to use blocking sockets and to use poll() or > select()? When select() or poll() indicate that *some* data is available for reading, there is no guarantee that it is enough data for OpenSSL to continue without

Re: SSL_accept hang

2003-02-10 Thread Bodo Moeller
On Fri, Feb 07, 2003 at 12:15:31PM -0800, David Schwartz wrote: > On Fri, 7 Feb 2003 20:42:50 +0100, Jasper Spit wrote: >> My point was to make clear that your statement that 'it is almost always >> an error to use select() with non blocking sockets' is simply not true. >> I think that might be re

Re: SSL_poll() ???

2003-02-07 Thread Bodo Moeller
On Fri, Feb 07, 2003 at 01:10:30PM +0100, Alexander Biehl wrote: > is there any function "SSL_poll()"? > i would like to see, if there is data I can read. You can use SSL_pending(ssl) to check if data is available for immediate reading. However, this will just report on data that has already rea

Re: no-err option

2003-02-03 Thread Bodo Moeller
On Thu, Jan 30, 2003 at 11:02:33AM +0100, Martin Witzel wrote: > This refers to 0.9.7. I have not verified it with earlier versions > > When I setup the build process with the 'config no-err' option, I get a lot > of _link_ errors in the apps directory, because the complete crypto/err > directory

Re: renegotiation in 0.9.7

2003-01-30 Thread Bodo Moeller
On Thu, Jan 30, 2003 at 10:41:08AM -, Nigel Spowage wrote: > my client app calls SSL_renegotiate() and gets a return value of 1 > (success i presume, as i cann't find a man page for this > function). this sets up internal flags in ssl ready to negotiate the > connection. > > i call SSL_do_han

Re: renegotiation in 0.9.7

2003-01-28 Thread Bodo Moeller
On Mon, Jan 27, 2003 at 03:21:45PM -, Nigel Spowage wrote: > okay, so the proper way to renegotiate a connection is : > > 1 - call SSL_renegotiate() > 2 - call SSL_do_handshake() > 3 - wait for either > 3a- SSL_renegotiate_pending() to return 0, or > 3b- an acceptable amount of time (which

Re: renegotiation in 0.9.7

2003-01-27 Thread Bodo Moeller
On Mon, Jan 27, 2003 at 10:33:44AM -, Nigel Spowage wrote: > i'm currently trying to implement ssl renegotiation for an > application which uses openssl in a non-blocking mode. > SSL_renegotiate(ssl); > result = SSL_do_handshake(ssl); > /* result is okay at this point */ > > /* my app waits

Re: Error using Eudora, Sendmail and SSL

2002-11-18 Thread Bodo Moeller
Claus Assmann <[EMAIL PROTECTED]>: >> Ed Kasky <[EMAIL PROTECTED]>: >>> 27781:error:140890E9:SSL routines:SSL3_GET_CLIENT_CERTIFICATE:tls peer did >>> not respond with certificate list:s3_srvr.c:1638: > AFAIK the client can respond with an empty list (RFC 2246, section > 7.4.6). This is what sen

Re: Elliptic Curve module

2002-08-27 Thread Bodo Moeller
On Wed, Jul 24, 2002 at 04:07:46PM +0100, Haikel MEJRI wrote: > I'm trying openssl-0.9.7-beta2, I want to know why the elliptic curve > module is not included in the openssl command line tool? 0.9.7 includes just a library for elliptic curve arithmetic, but no further ECC support. This will cha

Re: [ANNOUNCE] OpenSSL 0.9.6g released

2002-08-10 Thread Bodo Moeller
Gregg Andrew <[EMAIL PROTECTED]>: > That being said, are the fixes in 0.9.6g reliavant to upgrading > 0.9.6e on unix/solaris platform, Unless you have already installed 0.9.6f, you may want to upgrade to 0.9.6g. Most problems are fixed in 0.9.6e, but there's at least a possibility of denial of

Re: Problems with non-blocking sockets and SSL

2002-06-14 Thread Bodo Moeller
On Fri, Jun 14, 2002 at 04:17:58PM +0200, Martin Sjögren wrote: > I'm having a few delicate problems, and I think at least one of them > adheres to non-blocking sockets, which is what I use. > > 1) Is it possible to get a WANT_WRITE error when I actually don't have > anything to send (on my high

Re: Interop problem iaik ssl 3.03 with 0.9.7-beta1

2002-06-14 Thread Bodo Moeller
On Tue, Jun 11, 2002 at 11:16:49AM +0200, Joerg Bartholdt wrote: > trying the 0.9.7-beta1 I came across a problem with a OpenSSL097 server > (e.g. openssl s_server) and a iSaSiLk 3.03 client (demo.basic.SSLClient). > When the Handshake took place, and the client send some initial data > (e.g. a

Re: openssl 0.9.6 returning premature eof?

2002-06-14 Thread Bodo Moeller
On Fri, Jun 07, 2002 at 05:18:06PM +0200, Bodo Moeller wrote: > On Wed, Jun 05, 2002 at 07:27:15PM -0400, Shekhar Mahadevan wrote: >> I'm trying to connect to https://secure01.principal.com/ using OpenSSL. >> Three other SSL toolkits (including JSSE) work OK, but OpenSSL resu

Re: problems with SSL_pending / SSL_want

2002-03-17 Thread Bodo Moeller
Magnus Kulke <[EMAIL PROTECTED]>: > i'm writing an ssl client application for encrypted ftp. (i use SSL_set_fd > for IO) however i have the problem that performing an SSL_read, it delivers > only parts of the text. i have to perform SSL_read three times to (output > looks like this: 'break!200

Re: SSL_pending() and SSL_ERROR_WANT_READ

2002-03-15 Thread Bodo Moeller
On Thu, Mar 14, 2002 at 01:00:46PM -0800, John Hughes wrote: > Since s->rstate is set to SSL_ST_READ_HEADER prior to record > decryption and decompression, wouldn't SSL_pending() still > incorrectly indicate that there is data ready to be read in cases > where either of these fail? I guess so, b

Re: SSL_pending() and SSL_ERROR_WANT_READ

2002-03-14 Thread Bodo Moeller
John Hughes <[EMAIL PROTECTED]>: > I can confirm: There is a discrepancy between the SSL_pending() > manpage and the source. SSL_pending() returns rrec.length in > ssl3_pending() (as of 0.9.6a, we also verify that the SSL record > being processed is application data, else zero is returned). Thi

Re: Using SSL_clear to reuse SSL object

2002-02-26 Thread Bodo Moeller
Lutz Jaenicke <[EMAIL PROTECTED]>: > On Wed, Feb 20, 2002 at 12:29:03PM +0200, Yoram Zahavi wrote: >> My server application is using SSL_clear to reuse the SSL object, instead of >> allocating a new one on every new connection. On first connection the client >> succeeds to connect the server, and

Re: installing openssl in different directories

2002-02-13 Thread Bodo Moeller
On Mon, Jan 28, 2002 at 06:02:32PM -0600, Phil Howard wrote: > Does OpenSSL integrate installation paths into its installed files? > > If the answer is NO, then that should mean it is safe to move the > library files from /usr/lib to /lib, right? The answer is yes, but it usually should be safe

Re: Problem with server_finished in SSL V2

2002-01-26 Thread Bodo Moeller
Steve Shanks <[EMAIL PROTECTED]>: > We have a situation with a non-openssl server (version 2 of SSL, > SSL_CK_RC4_128_EXPORT40_WITH_MD5) under development interfacing into an > openssl client (I downloaded a windows binary of openssl 0.9.6b). Everything > goes good until the server_finished is se

Re: nonblocking sockets and FTP

2002-01-25 Thread Bodo Moeller
On Mon, Jan 07, 2002 at 06:58:07PM +0100, Tomas Svensson wrote: > 1) Non-blocking SSL_accept() > > SSL_accept() always returns -1 and SSL_ERROR_WANT_READ (via > SSL_get_error()) but when I do SSL_read() in response to the first > error, [...] Why do you do that? Please read the SSL_get_error m

Re: Problems re-using SSL connections with 0.9.6c...

2002-01-14 Thread Bodo Moeller
Rob Beckers <[EMAIL PROTECTED]>: [...] > I'm glad you can reproduce the problem, that's half the battle. I'm using > OpenSSL's internal cache (single threaded program using async sockets, so > no need for external cache), and as stated it's not re-using. > > There's no particular hurry to get

Re: Sharing an SSL_connection across threads.

2001-11-30 Thread Bodo Moeller
On Mon, Nov 26, 2001 at 05:47:16PM -, Andy Schneider wrote: > If I don't renogiate, can I put a read () and write () down in an > SSL_connection in two different threads at the same time? No. -- Bodo Möller <[EMAIL PROTECTED]> PGP http://www.informatik.tu-darmstadt.de/TI/Mitarbeiter/moel

Re: SSL_pending()

2001-11-26 Thread Bodo Moeller
On Mon, Nov 26, 2001 at 11:39:26AM +0100, Rygg Christian Ingemann wrote: > I'm making a few objects that are communicating with eachother using SSL. It > almost works now, but I want my client to read from the connection until > there are no more to read, without knowing how much the server is se

Re: tru64 multi-threading needed

2001-09-24 Thread Bodo Moeller
Per F. <[EMAIL PROTECTED]>: > Is it really that simple? No. > I'm asking because the Configure script told me that it configured > without threads support, see the command output below. Isn't something > like "-threads" or "-D_REENTRANT" needed in CFLAGS for thread support? Many systems need

Re: OpenSSL PRNG analysis

2001-09-21 Thread Bodo Moeller
On Fri, Sep 21, 2001 at 04:59:17PM +0300, Marko Asplund wrote: > has anyone done an analysis of the OpenSSL PRNG which would be available > for public? i've read the Random Number Generation chapter of Peter > Gutmann's PhD thesis (The Design and Verification of a Cryptographic > Security Archite

Re: SSL renegotiation and SSL_bio (more data)

2001-09-21 Thread Bodo Moeller
On Fri, Sep 21, 2001 at 10:09:37AM +0100, Andy Schneider wrote: > This patch works. However it is also worth noting that my tests expose a > minor caveat. If a client and server request handshakes thus: > > Server: > Read > Renegotiate > Read > Write > > Client: >

Re: SSL renegotiation and SSL_bio (more data)

2001-09-20 Thread Bodo Moeller
Bodo moeller <[EMAIL PROTECTED]>: > Andy Schneider <[EMAIL PROTECTED]>: >> I applied the patch and it has allowed me to perform a handshake even >> when there are writes in-flight. [...] > Please try the following patch instead. This should remove the cause > o

Re: SSL renegotiation and SSL_bio (more data)

2001-09-20 Thread Bodo moeller
Andy Schneider <[EMAIL PROTECTED]>: > I applied the patch and it has allowed me to perform a handshake even > when there are writes in-flight. For the record then (and those who have > wrestled with SSL_renegotiate and have found this through a search): > > 1) I use SSL_renegotiate () and SSL_re

Re: SSL renegotiation and SSL_bio (more data)

2001-09-20 Thread Bodo Moeller
Lutz Jaenicke <[EMAIL PROTECTED]>: > There exists an address "[EMAIL PROTECTED]", but in fact the > email is just forwarded to openssl-dev. Therefore, please send bug > bug reports to [EMAIL PROTECTED] No, to openssl-bugs please (which can be treated specially by programs such as procmail).

Re: SSL_accept timeout

2001-09-14 Thread Bodo Moeller
On Fri, Sep 07, 2001 at 11:06:06AM +0300, Andrew Popov wrote: > We need to set timeout on SSL_accept() > Seting with SSL_CTX_set_timeout(SSL_CTX *ctx, long t) has no effect No, this function is not about connection timeouts (it is about the session cache). To impose a timeout on SSL_accept, use

Re: SSL_OP_NON_EXPORT_FIRST question

2001-09-14 Thread Bodo Moeller
On Wed, Aug 29, 2001 at 03:57:07PM +0200, Peter Sommerlad wrote: > How do I ensure browsers with both export grade and non-export grade > ciphers connect using stronger encryption? Or is that done > automatically today? Yes, this should always happen automatically. The client presents its list

Re: Mod exp vs. mult

2001-08-01 Thread Bodo Moeller
On Tue, Jul 31, 2001 at 08:26:42PM -0700, Yongdae Kim wrote: > I think my question is basically "how much more expensive modular > exponentiation is compared to modular multiplication for the given > parameters using OpenSSL library?"... And my simulation shows that it is > around 80 times...

Re: Generating certificate with large public key expoent value

2001-05-02 Thread Bodo Moeller
Jamshid Shoghli <[EMAIL PROTECTED]> in epsilon.openssl.dev: > I am trying to generate certificates with public exponent of the public key > with value 244 or higher, > >RSA_generate_key(bits, exp, NULL, NULL); > where bits is 1024, and exp is 244. > > But this call never comes back. I tri

Re: BSD-style MD5-based passwd (previous mail with wrong subject)

2001-03-28 Thread Bodo Moeller
On Wed, Mar 28, 2001 at 11:48:31AM +, Paulo Matos wrote: > Changes between 0.9.7 and 0.9.6 (from CVS) > *) Fix 'openssl passwd -1'. > [Bodo Moeller] > > Changes between 0.9.6 and 0.9.5a > *) Add BSD-style MD5-based passwords to 'openssl passw

Re: OpenSSL poll()?

2001-03-20 Thread Bodo Moeller
On Mon, Mar 19, 2001 at 11:13:22PM -0700, Nathan Parker wrote: > How can I poll the SSL layer to see if it has data I can read? I want to > implement a function to read N bytes with a time limit, but using select() > messes me up -- it doesn't know if there is data available within SSL. SSL_p

Re: SSL_peek problem

2001-03-20 Thread Bodo Moeller
On Mon, Mar 19, 2001 at 01:54:46PM -0500, ackka ackka wrote: > [...] When looking into this more I found that the infinite loop is caused > on a SSL_peek call. Please try the beta for OpenSSL 0.9.6a (available from ftp.openssl.org or one of the mirrors, http://www.openssl.org/source/mirror.html

Re: error when install ssl on SunOS5.8

2001-03-09 Thread Bodo Moeller
On Fri, Mar 09, 2001 at 10:19:47AM -0800, Marcos Mensalvas wrote: > When I tried to install openssl on my solaris 5.8 box it responded with a > error during the > 'make' command was executed: > > Error code 1 > make:Fatal error: Command failed for target 'cryptlib.o' > > Error code 1 > make: Fa

Re: Why no sig for openssl src?

2001-03-09 Thread Bodo Moeller
On Fri, Mar 09, 2001 at 09:30:10AM -0600, John Pliam wrote: > I was trying to download the latest openSSL *and* check it's integrity. > But I could not find a signature or find a website that served the source > from an https URL. (https://www.openssl.org/ redirects to a secure site > mainta

Re: ERR_error_string usage (was: enhancement request: 0.9.6 error message quality when RAND fails)

2001-03-07 Thread Bodo Moeller
Dan Kegel <[EMAIL PROTECTED]>: >>> The symptom was, SSL_write returned -1. SSL_get_error returned 1 (SSL_ERROR_SSL). >>> ERR_error_string returned "error::lib(255):func(4095):reason(4095)". >> Use ERR_error_string() on the return value of ERR_get_error(), not on the >> return value of S

Re: SSL_peek() not supported with SSLv23_server_method?

2001-03-07 Thread Bodo Moeller
Dan Kegel <[EMAIL PROTECTED]>: > Bodo Moeller: >> Dan Kegel <[EMAIL PROTECTED]>: >>> I just realized I have to accept either SSLV2 or SSLV3 (or TLS) >>> connections, so I switched from SSLv3_server_method() to >>> SSLv23_server_method(). But oops,

Re: /dev/urandom

2000-12-16 Thread Bodo Moeller
Michael Sierchio <[EMAIL PROTECTED]>: > FreeBSD's implementation of /dev/random allows one to specify > which interrupts stir the entropy pool. This, from the /etc/rc.conf > > and_irqs="4 6 7 9 10 11 12 14 15" > > I haven't found anything similar on Linux, and would be grateful > for sug

Re: cipher suite issue?

2000-12-05 Thread Bodo Moeller
On Mon, Dec 04, 2000 at 04:34:52PM -0800, Jeffrey Ricks wrote: [...] > If I use my java client with the DES-CBC3-SHA cipher, everything works > fine. It's when I use that cipher with any openssl-based apps > (including s_client) that things don't work. If I run this: > > openssl s_client -conn

Re: Solaris64 compile.

2000-11-30 Thread Bodo Moeller
On Tue, Nov 28, 2000 at 09:13:43AM -0800, Bill Browning wrote: > Has anyone done a Solaris64 compile with openssl 0.9.6 ? I have tried to do > so (commands & errors listed below) but am at a bit of a loss as to why this > compile type works with the 0.9.5a tar file and not with the 0.9.6 tar file

Re: My session caching is flaky...

2000-11-17 Thread Bodo Moeller
On Sun, Nov 05, 2000 at 10:17:08PM -0600, Scott Goodwin wrote: > The behavior: > > 1. First hit from browser: session id is generated > and stored in cache. > > 2. Second hit: session id is found in the cache > and used as expected. > > 3. Third hit: session id is found, but *not* used

Re: RSA key generation on Windows

2000-11-10 Thread Bodo Moeller
On Wed, Nov 08, 2000 at 12:00:57PM +0100, Frédéric Gariador wrote: > I'd like to use Openssl to generate a RSA key pair on Window NT. > > I wonder about some issues : > > - I use the -rand option to specify files used to seed the random number > generator. > According to the number of these fil

Re: (Another) Transport Layer Question

2000-11-03 Thread Bodo Moeller
On Tue, Aug 29, 2000 at 02:17:24PM +0200, Andreas Jungmaier wrote: [...] > After looking through the openssl-source code I figured (since there > are BIO-class implementations for memory i/o, socket i/o as well as > remote procedure call-based i/o and a BIO-null class template) that > it s

Re: co-operative threads and OpenSSL

2000-11-03 Thread Bodo Moeller
On Thu, Nov 02, 2000 at 03:34:07PM -0500, Gregory Nicholls wrote: > I'm using the State Threads package to implement an SSL > server. State Threads are non-preemptive and only context switch at > defined API boundaries (specifically when performing network > IO). This means that multiple thre

Re: multiple ssl servers on the same box?

2000-11-03 Thread Bodo Moeller
On Thu, Nov 02, 2000 at 08:46:15AM -0800, Geoff Thorpe wrote: > On Thu, 2 Nov 2000, Alex Bourov wrote: >> If you have multiple network cards on the system with various IP addresses >> or you assigned several IP addresses to this server, then you can >> distinguished between then by using . If yo

Re: howto build without ssl2

2000-10-23 Thread Bodo Moeller
On Thu, Oct 19, 2000 at 06:03:02PM +0200, Thomas Leyer wrote: > I want to use this in kernel mode, so I think the > exclusion of ssl2 should take place while I build the > libs... Try compiling with -DNO_SSL2. If this does not work out of the box, send patches to openssl-dev. __

Re: bad mac decode (Was: CodeWarrior and openssl)

2000-09-20 Thread Bodo Moeller
On Wed, Sep 20, 2000 at 05:45:52PM +0200, Nick De Roeck wrote: > Anyway, I'll try the test-run as you suggested (SSL_set_cipher_list(ctx > *,"RC4-SHA) I presume ;-)). also, some tests I did today seem to show that > the error disapears when using SSLv2_server_method. ..._client_method, presumabl

Re: bad mac decode (Was: CodeWarrior and openssl)

2000-09-20 Thread Bodo Moeller
On Wed, Sep 20, 2000 at 04:48:39PM +0800, Michael Lee wrote: [...] > I have encountered exactly the same "bad mac decode" error before, although > I am using VC++6 on Windows 98. My HTTPS client application attempts to > connect to its.bocgroup.com (210.177.52.102) using SSLv23_method, but fails

Re: SSLv2_method and SSLv23_method

2000-09-14 Thread Bodo Moeller
On Fri, Sep 15, 2000 at 09:22:24AM +0800, Michael Lee wrote: > Bodo Moeller wrote: >> Note that SSLv2_method will fail for some servers because they >> no longer support SSL 2.0 (and stopping to support it is a good >> thing because of its deficiencies). I suggest using >

Re: Serious Bug in ssl3_get_record

2000-09-12 Thread Bodo Moeller
On Sat, Sep 09, 2000 at 09:19:34AM +0800, Fung wrote: > If you look at the source code, you will see the following > static int ssl3_get_record(SSL *s) > [...skipped] > n=ssl3_read_n(s,SSL3_RT_HEADER_LENGTH, >SSL3_RT_MAX_PACKET_SIZE,0); > if (n <= 0) return(n); /* error or non-blocking */

Re: Serious Bug in ssl3_get_record

2000-09-08 Thread Bodo Moeller
On Fri, Sep 08, 2000 at 05:44:35PM +0800, Fung wrote: > I have found that there is a serious bug located in the static > function ssl3_get_record in s3_pkt.c. The fault is that the function > NEVER gets the version number of SSL and MUST returns "wrong version > number" error. That means if I cre

Re: SSLv2_method and SSLv23_method

2000-09-08 Thread Bodo Moeller
On Fri, Sep 08, 2000 at 11:10:23AM +0800, Fung wrote: > Do anyone know what is the diff. between SSLv2_method and > SSLv23_method?? Once I used SSLv23_method to create SSL_CTX for my > client program, handshake failure returned when connected to some > web server. When I changed to use SSLv2_meth

  1   2   3   4   >