Re: connection problem with the version 1.0.1e

2013-10-11 Thread nehakochar
Rajesh Malepati wrote On Wed, Jul 24, 2013 at 9:30 PM, kirpit lt; kirpit@ gt; wrote: The server doesn't seem to care to respond to clients supporting TLS 1.2 ok: openssl s_client -tls1 -connect emea.webservices.travelport.com:443 no reply: openssl s_client -tls1_2 -connect

Re: connection problem with the version 1.0.1e

2013-10-11 Thread nehakochar
nehakochar wrote Is this expected behavior with OpenSSL 1.0.1e? If it is, then this would need to be fixed as it is not compliant with the RFC. Correction: I am not sure if it is 1.0.1e that is the problematic version. But would like to know if this is expected behavior (although incorrect)

Query related to d2i_X509 and X509_free

2013-10-11 Thread sandeepa sharma
Hi, We are using openssl-1.0.0e. I am facing a memory leak of 98 bytes when I use d2i_X509() function. This memory leak is seen even if d2i_X509() return NULL. I couldn't find the source code for d2i_X509() and X509_free() function. Can you please help me in this. int

Re: Abort after free() of non-allocated pointer

2013-10-11 Thread Daode
FYI: it's hard to believe the error is on the OpenSSL side (the software shows timing errors (the way i use it at least), and these are always handled properly by the OpenSSL layer), but i have nonetheless added a 'debug-darwin64-x86_64-cc' to 'Configure' and got some debug libraries ( 206984

Re: [openssl-users] Re: connection problem with the version 1.0.1e

2013-10-11 Thread Erwann Abalea
Bonjour, Le 11/10/2013 03:35, nehakochar a écrit : Rajesh Malepati wrote On Wed, Jul 24, 2013 at 9:30 PM, kirpit lt; kirpit@ gt; wrote: The server doesn't seem to care to respond to clients supporting TLS 1.2 ok: openssl s_client -tls1 -connect emea.webservices.travelport.com:443 no

Re: OpenSSL OCSP

2013-10-11 Thread Anju Ramani
Hi, Could you please tell me how to do the set up of local ocsp responder as you did it like http://ocsp_responder:3456.? Its really urgent and time is less. -- View this message in context: http://openssl.6102.n7.nabble.com/OpenSSL-OCSP-tp15350p46874.html Sent from the OpenSSL - User

Best practices guidance for using OpenSSL to make cetificate authorities

2013-10-11 Thread Ted Byers
I found a Linux FAQ dealing with this subject, but it is very dated (11.5 years old) and I do not know how much has changed since it was last updated. While I am a programmer, I am looking only to use openssl to make the certificates and keys I need, and not to create new programs using openssl

Re: Best practices guidance for using OpenSSL to make cetificate authorities

2013-10-11 Thread Ryan Hurst
This might be useful http://unmitigatedrisk.com/?p=194 Ryan Hurst Sent from my phone, please forgive the brevity. On Oct 12, 2013, at 12:53 AM, Ted Byers r.ted.by...@gmail.com wrote: I found a Linux FAQ dealing with this subject, but it is very dated (11.5 years old) and I do not know how

RE: Increasing key size from 1024 to 2048?

2013-10-11 Thread Dave Thompson
Not so much. Factoring reached 768 several years ago, and the consensus seems to be that RSA-1024, and DSA and DH, is in danger within not too many years though not broken now. And it often takes months or years to get new crypto, or even new keys, fully deployed especially when you can't have

RE: [openssl-users] Re: connection problem with the version 1.0.1e

2013-10-11 Thread Dave Thompson
From: owner-openssl-users On Behalf Of Erwann Abalea Sent: Friday, October 11, 2013 08:49 Le 11/10/2013 03:35, nehakochar a écrit : Rajesh Malepati wrote On Wed, Jul 24, 2013 at 9:30 PM, kirpit lt;kirpit@gt; wrote: The server doesn't seem to care to respond to clients supporting TLS 1.2