Re: DH vs RSA key generation speed

1999-06-25 Thread Anonymous
> On Fri, Jun 25, 1999 at 02:38:48PM -0700, Eric Rescorla wrote: > > >> slow (1024 squaring operations), the obvious change would be to use DH > >> parameters with a 160-bit subprime and a 160-bit secret exponent (160 > >> squarings and ca. 80 full-size multiplications, and even the second > >> e

Re: DH vs RSA key generation speed

1999-06-25 Thread Anonymous
On Fri, Jun 25, 1999 at 02:38:48PM -0700, Eric Rescorla wrote: >> slow (1024 squaring operations), the obvious change would be to use DH >> parameters with a 160-bit subprime and a 160-bit secret exponent (160 >> squarings and ca. 80 full-size multiplications, and even the second >> exponentiatio

RSA - ApacheSSL - SSLeay - openssl - - > legal ?

1999-06-25 Thread Anonymous
Hello All. I have heard various stories as for the the laws, copyrights, etc.. dealing with the the RSA algorithm and was curious if someone could provide info. regarding the above products. Is [EMAIL PROTECTED] the solution here ? .. please share experiences. much thanks Tyler K.

Re: openssl on redhat 6.0

1999-06-25 Thread admin linux
admin linux wrote: > hi, >been trying to make on linux redhat 6.0 openssl unsucessfully. has anyone been able to build cleanly openssl*.tar.gz on redhat 6.0? TIA Rick __ OpenSSL Project ht

Re: DH vs RSA key generation speed

1999-06-25 Thread Anonymous
Ben Laurie <[EMAIL PROTECTED]> writes: > Yeah, but with RSA it costs you a large-prime-generation. Which _is_ a > lot. I'm not arguing that EDH isn't cheaper than ERSA, I'm arguing that it's not worth it even though it's cheaper. -Ekr -- [Eric Rescorla [EMAIL P

Re: DH vs RSA key generation speed

1999-06-25 Thread Anonymous
> On Fri, Jun 25, 1999 at 08:43:14AM -0700, Eric Rescorla wrote: > > >> Forward secrecy is exactly the point (that's what the temporary keys > >> are for, if we leave aside export ciphers). You're right that it > >> shouldn't be necessary to create a fresh key every time we need one, > >> but it

Re: Blocking IO problem under UNIX

1999-06-25 Thread Anonymous
Paul M Fleming wrote: I'm working on a server program that needs to timeout if input isn't entered within a certain time period. I'm doing a select followed by an SSL_read, obviously this isn't correct. I look at the archive and saw some discussion about this but no suggestions on how to solve it

Re: Blocking IO problem under UNIX

1999-06-25 Thread Anonymous
On Fri, Jun 25, 1999 at 03:33:41PM -0500, Paul M Fleming wrote: > I'm working on a server program that needs to timeout if input isn't > entered within a certain time period. I'm doing a select followed by an > SSL_read, obviously this isn't correct. You'll have to use non-blocking sockets and

Re: Non blocking socket

1999-06-25 Thread Anonymous
"Isaac Rajkumar" <[EMAIL PROTECTED]>: > Can someone explain how I can specify non-blocking socket behavior to the > library. I am not using BIO based read/write functions - instead my calls > are through SSL_read and SSL_write. Just switch your sockets to non-blocking mode. The SSL library can h

Re: Interesting Handshake behaviour

1999-06-25 Thread Bodo Moeller
Sarah Bateman <[EMAIL PROTECTED]>: > Client: ssleay 0.8.1 running on NT4 > Server: proxy server using ssleay 0.8.1 library > SSL related server code: [...] > ssl = SSL_new (ctx); > SSL_clear(ssl); (An SSL_clear directly after after the SSL_new is not necessary, but should not cause any problem

Blocking IO problem under UNIX

1999-06-25 Thread Anonymous
I'm working on a server program that needs to timeout if input isn't entered within a certain time period. I'm doing a select followed by an SSL_read, obviously this isn't correct. I look at the archive and saw some discussion about this but no suggestions on how to solve it. I don't think I nee

Expiration date.

1999-06-25 Thread Anonymous
X509_get_notAfter(X509 *spYourCertificate, char *cpADate) cpAfterdate - Buffer to get valid upto date of the certificate RETURNS: 1 - Valid upto date obtained Also X509_get_notBefore(X509 *spYourCertificate, char *cpBDate) cpBeforedate - B

Re: certificates of major CAs

1999-06-25 Thread Thomas Reinke
Or you can just grab them here: http://www.e-softinc.com/cacerts.txt These are the certs we've grabbed as part of an SSL survey that we are compiling. (Compiled from a variety of sources, including Netscape 4.0, I believe) Note the URL must be visited directly, it is not visible by following an

Re: DH vs RSA key generation speed

1999-06-25 Thread Anonymous
Eric Rescorla wrote: > > > > is any virtue in generating new DH keys for every transaction > > > other than Perfect Forward Secrecy -- which you could do > > > just as good a job with by refreshing the key every couple > > > hours. > > > > Forward secrecy is exactly the point (that's what the tem

Re: DH vs RSA key generation speed

1999-06-25 Thread Anonymous
On Fri, Jun 25, 1999 at 08:43:14AM -0700, Eric Rescorla wrote: >> Forward secrecy is exactly the point (that's what the temporary keys >> are for, if we leave aside export ciphers). You're right that it >> shouldn't be necessary to create a fresh key every time we need one, >> but it does not co

Expiration date.

1999-06-25 Thread Carles Xavier Munyoz Baldó
Hello, Is there any function in the openssl library that tells the expiration date of a certificate saved in a file in PEM format ? Many thanks. --- CTV-JET Carles Xavier Munyoz Baldó / [EMAIL PROTECTED] http://www.ctv.es/USERS/carles Dpto. Sistemas / System Department Clave pública PGP / PGP pu

Re: certificates of major CAs

1999-06-25 Thread Goetz Babin-Ebell
Hallo, Ups, sorry: >You could try the folowing: >1. load Netscape.exe in a editor capable of handling so big binary files. > >2. search for the string MIIC Just search for the string MII. There should be some non printable char in front of it. >3. extract everything until the next unprintable c

Re: certificates of major CAs

1999-06-25 Thread Goetz Babin-Ebell
At 17:27 25.06.99 +0200, you wrote: Hallo, >Goetz Babin-Ebell wrote: >> At 10:01 24.06.99 +0200, you wrote: >> >I know that major WWW browsers have a set of compiled-in >> >certificates like Verisign, Thawte etc. I need the same >> >for my application. Where can I find certificates >> >for Verisi

Interesting Handshake behaviour

1999-06-25 Thread Anonymous
Hi I have been looking at this problem for a week now and am at my wits end. I'm sure it's something trivial but I certainly can't find the solution. I'm afraid it's an old version of ssleay, 0.8.1, but up until now this has been stable and caused no problems. So here is the description of th

RE: certificates of major CAs

1999-06-25 Thread Anonymous
Another option is to extract them from IE. Use CertMgr.exe and then click on the "trust certificates" tab. Then you can extract them one by one in a DER format or extract a collection in a PKCS#7-cert format. > -Original Message- > From: [EMAIL PROTECTED] > [mailto:[EMAIL PROTECTED]]On B

Re: DH vs RSA key generation speed

1999-06-25 Thread Anonymous
> > is any virtue in generating new DH keys for every transaction > > other than Perfect Forward Secrecy -- which you could do > > just as good a job with by refreshing the key every couple > > hours. > > Forward secrecy is exactly the point (that's what the temporary keys > are for, if we leave

Re: certificates of major CAs

1999-06-25 Thread Massimo Capodicasa
Goetz Babin-Ebell wrote: > > At 10:01 24.06.99 +0200, you wrote: > >Hi, > Hallo, > > >I know that major WWW browsers have a set of compiled-in > >certificates like Verisign, Thawte etc. I need the same > >for my application. Where can I find certificates > >for Verisign, Thawte etc. ? > > You

RE: Netscape double prompting certificates *also* IE 5 does not work ....

1999-06-25 Thread Shawn Tagseth
I've found IE 5 to be funny animal.. Go into Tools, Options, Advanced and hit restore defaults.(what default is it setting?? I haven't bothered to figure it out.) That has fixed about 90% of my problems with clients and IE5. The other 10 needed to go request a new certificate after they did th

Re: OpenSSL & Crypt::SSLeay support (was using ssl with Perl LWP)

1999-06-25 Thread Anonymous
Joshua, Thanks for the module. I hate to ask this BUT, would you be able to give me some pointers on what packages I should build with and where the ssleay.xs should go etc. I did build this stuff once on NT, but I had to do a ton of hacking to get things built and it got very ugly. I lost what ve

Netscape double prompting certificates *also* IE 5 does not work....

1999-06-25 Thread Anonymous
I'm using apache 1.3.6 with appropriate mod_ssl and openssl. When I connect to the web server under ssl, I get prompted for a certificate appropriately. Then, the base "It Worked!" page comes up. But, then I get prompted again for the certificate and the bitmaps at the bottom of the page show up

Re: Certificate conversion

1999-06-25 Thread Anonymous
Oliver Floericke schrieb: > > Hello! > > how can I convert a certificate created by ca from PEM into DER? I've tried > > 'openssl x509 -inform PEM -outform DER -in myCert.pem -out myCert.der' > > but the result is a binary file which it should not be (or should it?!??!) It should, really

Re: Anonymous DH

1999-06-25 Thread Anonymous
On Thu, Jun 24, 1999 at 11:03:34AM +0200, Ralf S. Engelschall wrote: >> I thought this wasn't necessary anymore. I suggest we dump this >> compilation flag and do something similar to the NULL ciphers: allow >> them to be used but they need to be explicitly allowed in the cipher >> list. Comments

Re: What is SSLeay? (was: Re: Stunnel 3.3)

1999-06-25 Thread Anonymous
Have a look at http://www.cryptsoft.com/~eeay/ http.//www.openssl.org The latter explicitely states: "OpenSSL is based on the excellent SSLeay library developed by Eric A. Young and Tim J. Hudson." Next question, please ;-) Alessandro Vesely schrieb: > > May I ask what _is_ SSLeay? > > I fou

Re: DH vs RSA key generation speed

1999-06-25 Thread Anonymous
On Thu, Jun 24, 1999 at 09:38:56PM -0700, EKR wrote: > Bodo Moeller <[EMAIL PROTECTED]>: >> No. DH *key* generation is fast, but only if you have done DH >> *parameter* generation before. Then the secret key is just a random >> number x, and the corresponding public key is g^x mod p. >> DH p

AW: Certificate conversion

1999-06-25 Thread Anonymous
Hi Oliver! > how can I convert a certificate created by ca from PEM into DER? I've > tried > > 'openssl x509 -inform PEM -outform DER -in myCert.pem -out > myCert.der' > [ew] That's ok. > but the result is a binary file which it should not be (or should > it?!??!) > [ew] Yes, it should

RE: What is SSLeay? (was: Re: Stunnel 3.3)

1999-06-25 Thread Anonymous
>May I ask what _is_ SSLeay? SSLeay is a prior incarnation of openSSL and indeed refers to Eric Young who who wrote the package. Eric now works for RSA and the package has been renamed openSSL to indicate its new status. __ Ope

What is SSLeay? (was: Re: Stunnel 3.3)

1999-06-25 Thread Anonymous
Alessandro Vesely wrote: > May I ask what _is_ SSLeay? Is it some package maintained > by someone somewhere, or what? It _is_ an *absolete* SSL library written by Eric A. Young. Currently not maintained. 8-( Regards, Mike --- Michal Trojnara * +48 501 00 12 43 IT Security Offic

Certificate conversion

1999-06-25 Thread Anonymous
Hello! how can I convert a certificate created by ca from PEM into DER? I've tried 'openssl x509 -inform PEM -outform DER -in myCert.pem -out myCert.der' but the result is a binary file which it should not be (or should it?!??!) And BTW: does anybody know a link where I can find more info