Re: CAs and SubjectAltNames

2006-06-08 Thread Dr. Stephen Henson
On Thu, Jun 08, 2006, Phil Dibowitz wrote: > Dr. Stephen Henson wrote: > > > > You have to explicitly enable copying extensions from a certificate > > request to > > a certificate in the config file. This is off by default because it is > > potentially dangerous for the unwary. See the docs for m

Re: subjectAltName extension of type dNSName

2006-06-08 Thread Victor Duchovni
On Fri, Jun 09, 2006 at 12:25:52AM +0200, Goetz Babin-Ebell wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > david kine schrieb: > Hello David, > > > One more question: how do I, using the CA.pl script, generate a > > certificate with a subjectAltName extension of type dNSName? The

Re: CAs and SubjectAltNames

2006-06-08 Thread Phil Dibowitz
Phil Dibowitz wrote: > Dr. Stephen Henson wrote: >> >> You have to explicitly enable copying extensions from a certificate >> request to >> a certificate in the config file. This is off by default because it is >> potentially dangerous for the unwary. See the docs for more info. > > Thanks, though

Re: CAs and SubjectAltNames

2006-06-08 Thread Phil Dibowitz
Dr. Stephen Henson wrote: > > You have to explicitly enable copying extensions from a certificate > request to > a certificate in the config file. This is off by default because it is > potentially dangerous for the unwary. See the docs for more info. Thanks, though I'm not sure which docs you're

Re: subjectAltName extension of type dNSName

2006-06-08 Thread Goetz Babin-Ebell
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 david kine schrieb: Hello David, > One more question: how do I, using the CA.pl script, generate a > certificate with a subjectAltName extension of type dNSName? The ones I > have already generated do not have this field set. > I suppose there is a

Re: CAs and SubjectAltNames

2006-06-08 Thread Dr. Stephen Henson
On Thu, Jun 08, 2006, Phil Dibowitz wrote: > Didn't see a response to this the first time around, thought I'd give it > another shot. > > > I'm trying to create a CA that has the email address _only_ in > SubjectAltNames (to follow PKIX "valid certificate" recommendations). > > This seems to be

CAs and SubjectAltNames

2006-06-08 Thread Phil Dibowitz
Didn't see a response to this the first time around, thought I'd give it another shot. I'm trying to create a CA that has the email address _only_ in SubjectAltNames (to follow PKIX "valid certificate" recommendations). This seems to be a bit tricky. Currently, I can get a req that looks right,

Re: subjectAltName extension of type dNSName

2006-06-08 Thread david kine
Hello Victor,   Thank you very much, the code you provide is extremely useful!   One more question:  how do I, using the CA.pl script, generate a certificate with a subjectAltName extension of type dNSName?  The ones I have already generated do not have this field set.   I suppose there is an

Re: Need some help debugging SSL error thrown from STunnel using OpenSSL-FIPS

2006-06-08 Thread David Gillingham
Dr. Henson-- Adding in a call to OpenSSL_add_all_algorithms() fixed the error. Thanks for the assistance. __ OpenSSL Project http://www.openssl.org User Support Mailing Listopen

Re: subjectAltName extension of type dNSName

2006-06-08 Thread Victor Duchovni
On Thu, Jun 08, 2006 at 11:40:04AM -0700, david kine wrote: > My code to retrieve the common name from the subject field is: > X509 *cert = [code not shown] > char pName[ 256 ]; > X509_NAME *subj; > subj = X509_get_subject_name( cert ); > X509_NAME_get_text_by_NID( subj, NID_commonNa

subjectAltName extension of type dNSName

2006-06-08 Thread david kine
Hello,   My secure client application performs post-connection fully-qualified-domain-name authentication.  According to RFC 2818, "If a subjectAltName extension of type dNSName is present, that MUST be used as the identity. Otherwise, the (most specific) Common Name field in the Subject fiel

Re: Need some help debugging SSL error thrown from STunnel using OpenSSL-FIPS

2006-06-08 Thread Dr. Stephen Henson
On Thu, Jun 08, 2006, David Gillingham wrote: > I was able to convert the key as you instructed, and I overwrote the > old RSA private key from my server.pem file with the new PKCS8 one. I > am now a getting a different error message. From these new messages, > I'm guessing OpenSSL is expecting

Re: Need some help debugging SSL error thrown from STunnel using OpenSSL-FIPS

2006-06-08 Thread David Gillingham
I was able to convert the key as you instructed, and I overwrote the old RSA private key from my server.pem file with the new PKCS8 one. I am now a getting a different error message. From these new messages, I'm guessing OpenSSL is expecting a file in PKCS12 format, but that my file does not mat

Re: 1095 bit key ??

2006-06-08 Thread Marek Marcola
Hello, After some calculations: > Private-Key: (1095 bit) > modulus: > 4b:e9:e4:a6:3a:30:bc:0b:99:56:c6:b5:19:da:73: > 79:f4:7f:35:15:d6:3f:4c:8d:e2:08:ab:43:c0:84: > 0c:a2:69:98:5a:28:3a:fe:81:ac:ec:14:cb:97:8b: > 48:b7:e6:b2:a9:fb:84:cf:88:77:2a:3b:6d:bf:e7: > ed:7a:c7:92:34

Re: 1095 bit key ??

2006-06-08 Thread Saurabh Arora
here it is :: -- Private-Key: (1095 bit) modulus: 4b:e9:e4:a6:3a:30:bc:0b:99:56:c6:b5:19:da:73: 79:f4:7f:35:15:d6:3f:4c:8d:e2:08:ab:43:c0:84: 0c:a2:69:98:5a:28:3a:fe:81:ac:ec:14:cb:97:8b: 48:b7:e6:b2:a9:fb:84:cf:88:77:2a:3b:6d:bf:e7: ed:7a:c7:92:34:75:9d:c8:6c:9

Re: 1095 bit key ??

2006-06-08 Thread Victor Duchovni
On Thu, Jun 08, 2006 at 07:05:36PM +0200, Marek Marcola wrote: > > Also any non-anecdotal evidence that a 2048 bit key was actually > > requested? Not sure how the private key will help, the *modulus* is > > 1095 bits, and it is the same for the private and public keys. > > Private key has also p

Re: 1095 bit key ??

2006-06-08 Thread Victor Duchovni
On Thu, Jun 08, 2006 at 06:56:33PM +0200, Saurabh Arora wrote: > in else case heres my private key : > > -BEGIN RSA PRIVATE KEY- > Proc-Type: 4,ENCRYPTED > DEK-Info: DES-EDE3-CBC,A7C341355547B565 > > lOJoiNoFcvBmlxQbXiR+KQxw66ct9mxQ1KVIzB2HD/oGOxGgso5Cd5W7+2gA5hJ/ > Y/SBke/xdEjzn9dsMi8cQ

Re: 1095 bit key ??

2006-06-08 Thread Marek Marcola
Hello, > in else case heres my private key : > > -BEGIN RSA PRIVATE KEY- > Proc-Type: 4,ENCRYPTED > DEK-Info: DES-EDE3-CBC,A7C341355547B565 > > lOJoiNoFcvBmlxQbXiR+KQxw66ct9mxQ1KVIzB2HD/oGOxGgso5Cd5W7+2gA5hJ/ > Y/SBke/xdEjzn9dsMi8cQM11Gj/CoczBYL30ec4x+YNBm8TiKe3mzX1utdzuOEIS > dTk3zzMwQ47

Re: 1095 bit key ??

2006-06-08 Thread Marek Marcola
Hello, > > > what is 1095 bit key means?? > > Interesting, can you send private key for this certificate, > > provided that you will be not use this key of course :-) > > Also any non-anecdotal evidence that a 2048 bit key was actually > requested? Not sure how the private key will help, the *mo

Re: 1095 bit key ??

2006-06-08 Thread Saurabh Arora
hi now on regeneration and changing the key is working fine. so may be i misspelt and incidently added 1095 (if thats the case .. then i m sorry for being silly) in else case heres my private key : -BEGIN RSA PRIVATE KEY- Proc-Type: 4,ENCRYPTED DEK-Info: DES-EDE3-CBC,A7C341355547B565

Re: 1095 bit key ??

2006-06-08 Thread Victor Duchovni
On Thu, Jun 08, 2006 at 06:32:54PM +0200, Marek Marcola wrote: > Hello, > > > i generated a self signed certificate and i found this : > > > > Subject Public Key Info: > > Public Key Algorithm: rsaEncryption > > RSA Public Key: (1095 bit) > > Modulus (1095

Re: 1095 bit key ??

2006-06-08 Thread Marek Marcola
Hello, > i generated a self signed certificate and i found this : > > Subject Public Key Info: > Public Key Algorithm: rsaEncryption > RSA Public Key: (1095 bit) > Modulus (1095 bit): > 4b:e9:e4:a6:3a:30:bc:0b:99:56:c6:b5:19:da:73: >

1095 bit key ??

2006-06-08 Thread Saurabh Arora
hi all i generated a self signed certificate and i found this : Subject Public Key Info: Public Key Algorithm: rsaEncryption RSA Public Key: (1095 bit) Modulus (1095 bit): 4b:e9:e4:a6:3a:30:bc:0b:99:56:c6:b5:19:da:73: 79:

Re: Need some help debugging SSL error thrown from STunnel using OpenSSL-FIPS

2006-06-08 Thread Dr. Stephen Henson
On Wed, Jun 07, 2006, David Gillingham wrote: > Hello all, > > I've been tasked to internally investigate a system that utilizes > STunnel and OpenSSL to create a secure wrapper for a propietary > protocol. Additionally, this solution must eventually be FIPS 140-2 > compliant. > > So, using ins

Re: Need some help debugging SSL error thrown from STunnel using OpenSSL-FIPS

2006-06-08 Thread Dr. Stephen Henson
On Wed, Jun 07, 2006, David Gillingham wrote: > Hello all, > > I've been tasked to internally investigate a system that utilizes > STunnel and OpenSSL to create a secure wrapper for a propietary > protocol. Additionally, this solution must eventually be FIPS 140-2 > compliant. > > 608008D: erro