What is your platform?  When were each of 0.9.8 (unpatched, it appears) and
1.0.0d compiled?  What toolchains were used to compile them?

-Kyle H


On Sun, Mar 16, 2014 at 8:42 PM, Mithun Kumar <mithunsi...@gmail.com> wrote:

>
> Hello Dave,
>
> When client gets server certificate(SQLServer) and tries to validate it we
> get "ASN1_F_ASN1_CHECK_TLEN" "ASN1_R_WRONG_TAG" error.
>
> i could parse the cert successfully and also dump the asn.1.  I cant
> connect using s_client as it hangs.
>
> When i add logs to the openssl code i see that Field Name = "sig_alg" has
> this problem.
>
> When KeySize =1024 and signature algorithm = SHA1RSA it connects
> successfully where as with KeySize=2048 and signature Algorithm = SHA1RSA
> it fails.  Also the failing cert works with V1.0.0.d and not with 0.9.8.
> Did we fix any bugs around above mentioned problem? Are there any work
> around that i can try?
>
> Not sure how to proceed forward. :(
>
> -Thanks
>
>
>
>
> On Sat, Mar 15, 2014 at 1:09 AM, Dave Thompson <dthomp...@prinpay.com>wrote:
>
>> OpenSSL has long limited RSA key moduli to 16384 bits, far more than
>> 2048.
>>
>> It also has limits on other kinds of keys; if you meant to ask about
>> them, be specific.
>>
>>
>>
>> Do you really mean 0.9.8 with no suffix? Vanilla or patched?
>>
>> The oldest and newest 0.9.8 versions I have installed (g and x) handle
>> RSA-2048 fine –
>>
>> even with SHA-256 for signature which your example doesn’t do. (NIST
>> rates RSA-2048
>>
>> strength equivalent to 112 bits, but SHA-1 drags signature strength down
>> to 80 bits
>>
>> or less, especially for partly-chosen data like certs.)
>>
>>
>>
>> Does the error occur with s_client or something else, and if something
>> else
>>
>> can you reproduce it with s_client? What exactly is the error?
>>
>>
>>
>>
>>
>> *From:* owner-openssl-us...@openssl.org [mailto:
>> owner-openssl-us...@openssl.org] *On Behalf Of *Mithun Kumar
>> *Sent:* Friday, March 14, 2014 11:53
>> *To:* openssl-users@openssl.org
>> *Subject:* *** Spam *** Re: Need understanding on certutil output.
>>
>>
>>
>> Hello Viktor,
>>
>>
>>
>> Thanks for the reply.
>>
>>
>>
>> Is there any limitations with Key Size?
>>
>>
>>
>> When cert 2 is received by the client from the server. I get a incorrect
>> tag length error ? Currently i am using Openssl Version 0.9.8. Same
>> cert(Cert2) works correctly for v1.0.0.d
>>
>>
>>
>> -Thanks
>>
>>  mithun
>>
>>
>>
>>
>>
>>
>>
>>
>>
>> On Fri, Mar 14, 2014 at 8:02 PM, Viktor Dukhovni <
>> openssl-us...@dukhovni.org> wrote:
>>
>> On Fri, Mar 14, 2014 at 06:18:49PM +0530, Mithun Kumar wrote:
>>
>> > What is the difference between these two formats
>>
>> The first contains a 1024 bit RSA-SHA1 public key, the second a
>> 2048-bit key.
>>
>>
>> > Below is the ASN output using certuil tool.
>> >
>>
>> > *Cert1:-*
>>
>> >
>> > 0618:    30 0d ; SEQUENCE (d Bytes)
>> > 061a:    |  06 09 ; OBJECT_ID (9 Bytes)
>> > 061c:    |  |  2a 86 48 86 f7 0d 01 01  05
>> >             |  |     ; 1.2.840.113549.1.1.5 sha1RSA
>> > 0625:    |  05 00 ; NULL (0 Bytes)
>> > 0627:    03 81 81 ; BIT_STRING (81 Bytes)
>> >
>>
>> > *Cert2:-*
>>
>> >
>> > 0780:    30 0d ; SEQUENCE (d Bytes)
>> > 0782:    |  06 09 ; OBJECT_ID (9 Bytes)
>> > 0784:    |  |  2a 86 48 86 f7 0d 01 01  05
>> >             |  |     ; 1.2.840.113549.1.1.5 sha1RSA
>> > 078d:    |  05 00 ; NULL (0 Bytes)
>> > 078f:    03 82 01 01 ; BIT_STRING (101 Bytes)
>> > 0793:       00
>> >
>> > What does the highlighted values  indicate? Any idea?
>>
>> The signature algorithm name and key length.  The byte counts are
>> reported in hex by the tool you're using, so 0x101 is 257 decimal,
>> and 0x81 is 129 decimal.
>>
>> --
>>         Viktor.
>> ______________________________________________________________________
>> OpenSSL Project                                 http://www.openssl.org
>> User Support Mailing List                    openssl-users@openssl.org
>> Automated List Manager                           majord...@openssl.org
>>
>>
>>
>
>

Reply via email to