openssl support TLS 1.0 (RFC 2246) and TLS 1.1 (RFC 4346) ?

2007-09-26 Thread Manish Jain
Hi, With reference to openssl's README, it supports TLS v1; does it mean that it supports TLS 1.0 (RFC 2246) and TLS 1.1 (RFC 4346) ? Best Regards, Manish Jain __ OpenSSL Project http://www.openssl

SSL interface for PKCS12

2007-09-26 Thread Manish Jain
Hi, Which SSL API will be used to load PKCS certificate in SSL_CTX? OR (in other words) What is the alternative for SSL_CTX_use_certificate_file() in case of PKCS12? Best Regards, Manish Jain __ OpenSSL Project

Re: Safe signed certificate generation during server installation ?

2007-09-26 Thread Victor Duchovni
On Wed, Sep 26, 2007 at 04:28:15PM -0700, David Schwartz wrote: > > Victor Duchovni wrote: > > > Use a self-signed cert and and a trusted source of peer<->cert or cert > > fingerprint mappings. The public CA is just one mapping function. > > Well then you're going to have to argue with yourself

RE: Safe signed certificate generation during server installation ?

2007-09-26 Thread Marek Marcola
Hello, > Now you *are* saying that if you just use something to validate the > certificate, you are safe. > > You and I are in violent agreement, you just don't see it. You also suggest > setting up an SSL connection that provides everything except MITM detection. > You then take something from th

Re: Question about an error: "decryption failed or bad record mac"

2007-09-26 Thread Marek Marcola
Hello, > My SSL application recently began throwing the following error > whenever I try to connect: > > SSL error (-1, 1, 336130329) (error:1408F119:SSL > routines:SSL3_GET_RECORD:decryption failed or bad record mac) > > The strange thing is that the same application, running on a > differ

Re: RSA key conversion

2007-09-26 Thread Marek Marcola
Hello, > Hi, I'm developing a client-server architecture to encrypt/decrypt > data which works like this: the client asks the server for the key > using a ssl connection, the server transmits the key to the client that > then encrypts/decrypts the data. > > I'd like to know if there is a way to c

Re: ASN1_item_sign() / ASN1_item_verify()

2007-09-26 Thread Marek Marcola
Hello, > Indeed when I call the ASN1_item_verify(), in the asn1/a_verify.c function > the following error occurs: > > 14250:error:0D0C50A1:lib(13):func(197):reason(161):a_verify.c:141: > > I tried to trace the problem, and I found that it resides in the > following piece of code: > > i=

Re: ASN1_item_sign() / ASN1_item_verify()

2007-09-26 Thread Massimiliano Pala
Hello, Small update on the problem.. fixed it! :) Thanks to the people who helped me... Anyhow, now I have a signature verification problem. Indeed when I try to verify the signature after reloading it, it fails saying that it does not find the digest algorithm. Indeed when I call the ASN1_item

RSA key conversion

2007-09-26 Thread eclisse
Hi, I'm developing a client-server architecture to encrypt/decrypt data which works like this: the client asks the server for the key using a ssl connection, the server transmits the key to the client that then encrypts/decrypts the data. I'd like to know if there is a way to convert a RSA* key o

RE: Safe signed certificate generation during server installation ?

2007-09-26 Thread David Schwartz
Victor Duchovni wrote: > Use a self-signed cert and and a trusted source of peer<->cert or cert > fingerprint mappings. The public CA is just one mapping function. Well then you're going to have to argue with yourself since you said not to do this two posts ago: >>>Actually not the certificate,

Re: Safe signed certificate generation during server installation ?

2007-09-26 Thread Victor Duchovni
On Wed, Sep 26, 2007 at 03:58:08PM -0700, David Schwartz wrote: > I am not enough of an expert to comment for sure on this, but it seems that > there would be no harm in using the certificate for this purpose. A MITM > cannot create an SSL session that uses the same certificate as the real > serve

RE: Safe signed certificate generation during server installation ?

2007-09-26 Thread David Schwartz
> On Wed, Sep 26, 2007 at 11:03:21AM +0200, Steffen DETTMER wrote: > > > > > So your point is that some property from the original > > > > certificate (lets say some hash or so) could be included in > > > > the extra authentication to detect a MITM (or whatever faked) > > > > certificate? In that

openssl support TLS 1.0 (RFC 2246) and TLS 1.1 (RFC 4346) ?

2007-09-26 Thread Manish Jain
Hi, With reference to openssl's README, it supports TLS v1; does it mean that it supports TLS 1.0 (RFC 2246) and TLS 1.1 (RFC 4346) ? Best Regards, Manish Jain __ OpenSSL Project http://www.openssl

Re: Safe signed certificate generation during server installation ?

2007-09-26 Thread Victor Duchovni
On Wed, Sep 26, 2007 at 11:03:21AM +0200, Steffen DETTMER wrote: > > > So your point is that some property from the original > > > certificate (lets say some hash or so) could be included in > > > the extra authentication to detect a MITM (or whatever faked) > > > certificate? In that case, SSL w

Re: ASN1_item_sign() - Signing and i2d_ problem :(

2007-09-26 Thread Massimiliano Pala
Dr. Stephen Henson wrote: Well it looks like you aren't using a debug version of OpenSSL. That would give a more meaningful backtrace. :( Right.. I should at this point... When you get that print out the ASN1_ITEM structure in some of the frames: that should tell you exactly which field is ca

Question about an error: "decryption failed or bad record mac"

2007-09-26 Thread David Lobron
Hi All- My SSL application recently began throwing the following error whenever I try to connect: SSL error (-1, 1, 336130329) (error:1408F119:SSL routines:SSL3_GET_RECORD:decryption failed or bad record mac) The strange thing is that the same application, running on a different machine

Re: AW: via padlock support much slower in 0.9.8e than in 0.9.8d, why?

2007-09-26 Thread Harald Latzko
Hi! perhaps the benchmark differences come from the different CPU types (I've got an Esther CPU with 1.2GHz). Here is the content of the / proc/cpuinfo of Linux: processor : 0 vendor_id : CentaurHauls cpu family : 6 model : 10 model name : VIA Esther processor

Re: Safe signed certificate generation during server installation ?

2007-09-26 Thread Steffen DETTMER
* David Schwartz wrote on Tue, Sep 25, 2007 at 14:47 -0700: [...] > > I'm not sure if I understand "...including these...". If, for > > instance, each side (and only them) share a secret 3DES key and > > use it for some challenge-response-authentication inside a SSL > > tunnel then I would assume

Re: ASN1_item_sign() - Signing and i2d_ problem :(

2007-09-26 Thread Dr. Stephen Henson
On Wed, Sep 26, 2007, Massimiliano Pala wrote: > Anyhow when I want to write it to a BIO (i2d_PRPQ_RESP_bio), I get > a segmentation fault: > > == > Program received signal SIGSEGV, Segmentation fault. > [Switching to Thread -1284179056 (LWP 21851)] > 0x4186f6d5 in memcpy () from /lib/lib

ASN1_item_sign() - Signing and i2d_ problem :(

2007-09-26 Thread Massimiliano Pala
Hi all, I am trying to sign an ASN1 object. Basically the object is very similar to an OCSP request - it is the PRQP response message (new proposal at IETF for PKI Discovery Query Protocol). The basic structure is reported here: /* PRQPResponse ::= SEQUENCE { * respData

Re: DTLS non-compliant list (based on snapshot 20070801)

2007-09-26 Thread Andy Polyakov
4) Handshake "headers" are omitted in the signature computation in both CertificateVerify and Finished messages. (RFC 4347 does not clearly state what is to be included. However, according to the TLS v1.1 (RFC 4346), it shall be the complete handshake message, starting from Handshake.msg_type. H