Re: Security Vulnerability issue in openssl 9.8 version

2009-06-03 Thread tensy joseph
Customer are started asking me for this fix . So i need to release an immediate release of openssl with this fix . Not sure whether they are using DTLS . If any customer ask for the fix , i need to release the fix immediately (business policy). The patch which i have applied is this(for openssl 9.

Re: What type of DES is DES_ecb_encrypt?

2009-06-03 Thread Kyle Hamilton
DES_ecb_encrypt encrypts as single DES, 56-bit key, in a block mode which has been deemed completely insecure. -Kyle H On Wed, Jun 3, 2009 at 12:46 PM, Michael Kurecka wrote: > Does the method DES_ecb_encrypt encrypt as Triple or Single DES ___

Re: Callback suggestion for unsupported cert extensions

2009-06-03 Thread Randy Turner
There are also strict rules regarding the certificate validation process, which openssl will let you entirely "pre-empt" and completely take over the validation process. All we would be asking for would be a callback that lets us "extend" the functionality of openssl regarding cert extensi

RE: Callback suggestion for unsupported cert extensions

2009-06-03 Thread Brad Mitchell
The thing is, RFC3280 states... Implementors are warned that the X.500 standards community has developed a series of extensibility rules. These rules determine when an ASN.1 definition can be changed without assigning a new object identifier (OID). For example, at least two extension

Re: Callback suggestion for unsupported cert extensions

2009-06-03 Thread Randy Turner
I agree that there should probably be a callback for extensions not recognized and supported by OpenSSL...the callback could return a failure code that openssl would look at, and if it is set to an "error" then openssl would run it's normal failure return path (up the call stack). If the c

Re: RE: Problems verifying certificates generated by Microsoft Certificate Authority and timestamping

2009-06-03 Thread Victor B. Wagner
On 2009.06.04 at 09:04:11 +1000, Brad Mitchell wrote: > > The reason we use command-line utilities to verify is for transparency. > Data could be used in the courts for example and having that "hey.. go > download openssl and verify it yourself" is a lot better than.. here is a > util we wrote to

Re: Re: Re: about ec_point and ec_group

2009-06-03 Thread Victor B. Wagner
On 2009.06.04 at 08:13:05 +0800, jazeltq wrote: > >I'm afraid that it is not a good code to study ecc. > > > >Implementation, which is currently in OpenSSL is full of obscure > >performance hacks and is not well-documented. > Yse, it's a problem . May be it will be relief afer my paper finish

RE: Problems verifying certificates generated by Microsoft Certificate Authority and timestamping

2009-06-03 Thread Brad Mitchell
The ts command is to create requests, sign requests and verify timestamps according to RFC3161. So the exercise I was trying to demonstrate at work was to create a certificate for the purpose of timeStamping (critical extension timeStamping on the cert) to sign digests into a token. The verify

Re:Re: Re: about ec_point and ec_group

2009-06-03 Thread jazeltq
在2009-06-03,"Victor B. Wagner" 写道: >On 2009.06.03 at 08:23:52 +0800, jazeltq wrote: > >> >file ec_lcl.h, which present in the OpenSSL sources, but not included in >> which directory include file ec_lcl.h, is it in the ec directory ?but in >> my sources i can't find it. > >It is in crypto/

Re: TLS compatibility problem -- can connect to server with NSS but not OpenSSL.

2009-06-03 Thread Victor Duchovni
On Wed, Jun 03, 2009 at 10:24:47PM +0100, David Woodhouse wrote: > On Wed, 2009-06-03 at 15:02 -0400, Victor Duchovni wrote: > > with SSL_CTX_use_certificate_chain_file() the entire trust chain is > > loaded from the provided file bottom-up order. The first certificate > > is the leaf and must mat

Re: TLS compatibility problem -- can connect to server with NSS but not OpenSSL.

2009-06-03 Thread David Woodhouse
On Wed, 2009-06-03 at 15:02 -0400, Victor Duchovni wrote: > with SSL_CTX_use_certificate_chain_file() the entire trust chain is > loaded from the provided file bottom-up order. The first certificate > is the leaf and must match the private key provided. Ah, right. Most files I've encountered have

Regarding the corresponding remove functions

2009-06-03 Thread Tushar Patel
We are currently using OpenSSL 0.9.8j and have a question related to X509_LOOKUP_ctrl and X509_LOOKUP_load_file. Basically, we are using one of the above functions to add the files to the LOOKUP, however, under some conditions, it is required to remove the file. Would there be any document or f

What type of DES is DES_ecb_encrypt?

2009-06-03 Thread Michael Kurecka
Does the method DES_ecb_encrypt encrypt as Triple or Single DES

Re: TLS compatibility problem -- can connect to server with NSS but not OpenSSL.

2009-06-03 Thread Victor Duchovni
On Wed, Jun 03, 2009 at 07:27:00PM +0100, David Woodhouse wrote: > On Tue, 2009-06-02 at 21:39 -0400, Victor Duchovni wrote: > > The CAfile is for verification, not for sending alon the trust chain > > of a given certificate. > > OpenSSL currently _does_ use the CAfile for sending along the trus

Re: TLS compatibility problem -- can connect to server with NSS but not OpenSSL.

2009-06-03 Thread David Woodhouse
On Tue, 2009-06-02 at 21:39 -0400, Victor Duchovni wrote: > The CAfile is for verification, not for sending alon the trust chain > of a given certificate. OpenSSL currently _does_ use the CAfile for sending along the trust chain of its client certificate. It's buggy, but it tries :) > DO NOT app

Re: Problems verifying certificates generated by Microsoft Certificate Authority and timestamping

2009-06-03 Thread Randy Turner
Hi Brad, I guess I'm going to have the same problem (Microsoft CA generating certs I have to verify with OpenSSL). I wasn't aware of the "ts" command, but I'm assuming that I can always verify MS-CA certificates if I do this programatically, using the openssl api. I will have to verify

Re: s_client output

2009-06-03 Thread Bruce Stephens
Joe Friedeggs writes: > I'm pretty much a noob when it comes to SSL, so any help would be > greatly appreciated. I just installed Openldap running TLS with self > signed certs. Everything *seems* to be working fine (LDAP logs show > TLS encryption), but when I run the s_client from the LDAP (Li

s_client output

2009-06-03 Thread Joe Friedeggs
I'm pretty much a noob when it comes to SSL, so any help would be greatly appreciated. I just installed Openldap running TLS with self signed certs. Everything *seems* to be working fine (LDAP logs show TLS encryption), but when I run the s_client from the LDAP (Linux) client, I only see ONLY

Re: Re: about ec_point and ec_group

2009-06-03 Thread Victor B. Wagner
On 2009.06.03 at 08:23:52 +0800, jazeltq wrote: > >file ec_lcl.h, which present in the OpenSSL sources, but not included in > which directory include file ec_lcl.h, is it in the ec directory ?but in my > sources i can't find it. It is in crypto/ec. Which version of OpenSSL are you using? In

RE: Problems verifying certificates generated by Microsoft Certificate Authority and timestamping

2009-06-03 Thread Brad Mitchell
For anyone that cares. I ran: certutil -showreg policy which gave me the registry entry for cert policies: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\CertSvc\Configuration\L UCINDA ROOT CA\PolicyModules\CertificateAuthority_MicrosoftDefault.Policy I modified the multi-