Re: openssl clients for windows

2007-05-31 Thread Victor B. Wagner
On 2007.05.31 at 22:28:27 -0700, gary clark wrote: > Hello, > > Using 0.8.9e. > > Attempting to port my openssl testclient to a XP > machine which does not have the complete install of > openssl. > I took the ssleay32.dll and libeay32.dll and installed > them in the system32 directory. > > When

openssl clients for windows

2007-05-31 Thread gary clark
Hello, Using 0.8.9e. Attempting to port my openssl testclient to a XP machine which does not have the complete install of openssl. I took the ssleay32.dll and libeay32.dll and installed them in the system32 directory. When running the client I am seeing it crash with the message "The application

Q's on making 0.9.8e with FIPS 1.1.1 and no-cipher/enable-cipher

2007-05-31 Thread Carlo Milono
On a Linux AS4 machine, I was able to successfully build both 0.9.8.e and FIPS 1.1.1 and have both pass all tests :-) The VERSION in the FIPS Makefile is different than the version of the base OpenSSL, and the only way to change the output of "openssl version" is to change the header file. I'v

RE: Saving (and restoring) cipher context

2007-05-31 Thread Jason Resch
-Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of David Schwartz Sent: Thursday, May 31, 2007 7:17 PM To: openssl-users@openssl.org Subject: RE: Saving (and restoring) cipher context > I think your argument is based on a false premise. In the majority of

RE: Error building FIPS object module in Windows using MinGW and Msys

2007-05-31 Thread hweeli
I've got the errors fixed! Previously when I installed MinGW, I chose the minimal option without installing g++ and make. After I made a MinGW update to install these two packages, the openssl fips object module compiles nicely without errors! Thanks for all the help. hweeli <[EMAIL PROTE

RE: Error building FIPS object module in Windows using MinGW and Msys

2007-05-31 Thread hweeli
Thanks for the reply. Yes, I ran "./config fips". In fact I just tried again, the errors are consistent. To be more specific, the errors occurred at this point during make: ... ar d ../libcrypto.a $exdel ar r ../libcrypto.a fipscanister.o true ../libcrypto.a || echo Never mind. gcc

RE: Saving (and restoring) cipher context

2007-05-31 Thread Jim Wong
Thanks for the information. We were thinking about having the client send up a hash over the entire file any time it attempted to start or resume an upload, and if the computed checksum didn't match the original, just force the client to start over from the beginning. Would this work? -Orig

RE: Saving (and restoring) cipher context

2007-05-31 Thread David Schwartz
> If the server is doing all the encryption, then presumably the server is > responsible for storing the keys someplace where it has ready access to > them. That's really not something you can assume. For example, the server might hold only public keys and when it needs to decrypt something, the

RE: "SSL3_GET_RECORD:wrong version number"

2007-05-31 Thread Marek Marcola
Hello, > Thanks for the info. Is it possible that the client is using version 3 > while the server is using some other version? I'm seeing this > error("error:1408F10B:SSL routines:SSL3_GET_RECORD:wrong version > number") in my client and I'm pretty sure that I'm setting the client's > version t

Re: configuring openSSL in Solaris

2007-05-31 Thread Marek Marcola
Hello, > I have configured openSSL in Win-XP by downloading > Openssl-0.9.8d,tcnative-1.dll and runnig commands as, > openssl req -config openssl.cnf -new -out server.csr > openssl rsa -in privkey.pem -out server.key > openssl x509 -in server.csr -out server.crt -req -signkey server.key -days 365

RE: Saving (and restoring) cipher context

2007-05-31 Thread Jason Resch
If the server is doing all the encryption, then presumably the server is responsible for storing the keys someplace where it has ready access to them. If this is the case, how is encryption protecting the data in the event the server is compromised? My concern is that this provides some level of

RE: Saving (and restoring) cipher context

2007-05-31 Thread Jim Wong
Thanks, I'll look into that, particularly if I can't come up with a way to avoid a restart entirely. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Richard Koenning Sent: Thursday, May 31, 2007 5:54 AM To: openssl-users@openssl.org Subject: Re: Saving (

RE: Saving (and restoring) cipher context

2007-05-31 Thread Jim Wong
Thanks for the suggestion. I think our biggest concern about doing encryption on the client side is exposing the underlying encryption mechanism we're using for stored files. Ideally, we'd like the server to be a secure black box: files go in via SSL, are store securely, and come back out the sam

RE: "SSL3_GET_RECORD:wrong version number"

2007-05-31 Thread Agopian, Carlo
Marek, Thanks for the info. Is it possible that the client is using version 3 while the server is using some other version? I'm seeing this error("error:1408F10B:SSL routines:SSL3_GET_RECORD:wrong version number") in my client and I'm pretty sure that I'm setting the client's version to 3. Ho

RE: Saving (and restoring) cipher context

2007-05-31 Thread Jason Resch
If you have concerns about doing encryption client side and worry about how to securely pass the key around you can try the oft-used strategy of using an asymmetric (RSA) public key to encrypt a randomly generated symmetric (AES) key. This encrypted symmetric key can then be safely stored with the

Re: Saving (and restoring) cipher context

2007-05-31 Thread Richard Koenning
Jim Wong wrote: I'm developing an application in which we're using AES to encrypt files as they're transferred from another system and saved to disk. We'd like to provide the ability for the application to resume a transfer that was interrupted mid-stream, but the encryption throws a bit of a w