Re: encrypting long strings

2010-07-08 Thread Chuck Pareto
Hi, Thanks for the reply Phillip. One quick question. Is the randomly-generated key PUBLIC? I know the public RSA key to encrypt the key is public, but is the randomly-generated key PUBLIC? Thanks. On Thu, Jul 8, 2010 at 8:43 PM, Phillip Hellewell wrote: > The general approach is to encrypt data

Re: encrypting long strings

2010-07-08 Thread Phillip Hellewell
The general approach is to encrypt data using a symmetric cipher (e.g., AES-256) with a randomly-generated key, and then encrypt that symmetric key with the RSA (public) key. And for the symmetric encryption you'll also have to make a decision about what mode to use (ECB, CBC, CTR, etc). Whatever

encrypting long strings

2010-07-08 Thread Chuck Pareto
Is there an algorithm that I can use, similar to RSA with public/private key, that will allow me to encrypt really long strings (like an email/text file)? Actually no limit on the size would be ideal.

question about max length string to encrypt with rsa 2048

2010-07-08 Thread Chuck Pareto
My group is using RSA with a key thats 2048 in size. We want to encrypt strings that are longer then this key size gives. If we switch to a key that is 4096 what is the max string length we can encrypt? is it double?

RE: Can't get RSA object from .pem file after base64 decoding it

2010-07-08 Thread Dave Thompson
> From: owner-openssl-us...@openssl.org On Behalf Of Carlos Saldaña > Sent: Thursday, 08 July, 2010 18:51 > I'm to openssl and PKI in general and got a problem whit decrypting in my application. > My partners provided me with two files: publickey.x509 and publickey.pem >

Can't get RSA object from .pem file after base64 decoding it

2010-07-08 Thread Carlos Saldaña
Hi, I'm to openssl and PKI in general and got a problem whit decrypting in my application. My partners provided me with two files: publickey.x509 and publickey.pem to find a wy to send messages between server and my client application. So far I've dicovered that .pem files are just base64 encoded

Re: Frustration with method based on EVP_PKEY_METHOD

2010-07-08 Thread Jeff Saremi
OK. Thanks for replying. On Thu, 2010-07-08 at 18:59 +0200, Dr. Stephen Henson wrote: > The only current example of an external EVP_PKEY_METHOD (in the gost ENGINE) > implements everything from scratch. > > It is perfectly reasonable for another implementation to copy existing methods > or inter

RPMBuild for FIPS OpenSSL

2010-07-08 Thread Mark Parr
First, let me say that this is my first attempt to install any version of the OpenSSL other than what gets distributed w/ the Linux OS and any updates that are provided via subscription thereafter. It is also my first attempt at enabling the FIPS option. On a SUSE 10 SP2 release, I have succes

'decryption failed or bad record mac' during SSL_accept

2010-07-08 Thread Amit Ben Shahar
I am having issues with a server, i'm getting many of these errors especially while running a load (~80 users), up to a point that every client i use gets this error the decryption_failed_or_bad_record_mac flag is set in s3_pkt.c:466, the mac does not match the 'md' variable Here is the call stack:

Re: Frustration with method based on EVP_PKEY_METHOD

2010-07-08 Thread Dr. Stephen Henson
On Thu, Jul 08, 2010, Jeff Saremi wrote: > The structure itself is only forward-declared meaning that a programmer > has no way of getting into the actual evp_pkey_method_st and its fields. > Now that would be fine if there were a complete set of methods > EVP_PKEY_meth_* to manipulate the pointer

Re: crash from curl with pkcs12 certs and threads

2010-07-08 Thread Dr. Stephen Henson
On Thu, Jul 08, 2010, Brian Makin wrote: > > Ahh, got it. > in crypto/evp/evp_pbe.c:EvP_PBE_alg_add > pbe_tmp isn't initialized which means sometimes it has a bogus value. > > 119c119 > < EVP_PBE_CTL *pbe_tmp = NULL, pbelu; > --- > > EVP_PBE_CTL *pbe_tmp, pbelu; > > Is that all that is

Re: 'No shared cipher error' connecting to OpenSSL server with Firefox using TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (0xc00a) cipher suite

2010-07-08 Thread Michael S. Zick
On Thu July 8 2010, Dirk Menstermann wrote: > Hi, > > on https://developer.mozilla.org/en/Security_in_Firefox_2 I found that FF 2 > does > support only curves with 256, 384, and 521. Maybe this is the same for FF 3 > and > your 160 bit curve is not supported. > Try: about:config in your browse

Re: 'No shared cipher error' connecting to OpenSSL server with Firefox using TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (0xc00a) cipher suite

2010-07-08 Thread Dirk Menstermann
Hi, on https://developer.mozilla.org/en/Security_in_Firefox_2 I found that FF 2 does support only curves with 256, 384, and 521. Maybe this is the same for FF 3 and your 160 bit curve is not supported. Bye Dirk Alex Birkett wrote: > Hi, > > Firefox 3.6.2 supports the TLS_ECDHE_ECDSA_WITH_AES_2

Re: crash from curl with pkcs12 certs and threads

2010-07-08 Thread Brian Makin
> On Wed, 2010-07-07 at 21:28 +0200, Dr. Stephen Henson wrote: > > On Wed, Jul 07, 2010, Brian Makin wrote: > > > > > > > > The snapshots all seem to be failing in make test... > > > Is this a known issue or might it be a problem on my end? > > > > > > Testing key generation with NIST Binary-Cu

RE: 'No shared cipher error' connecting to OpenSSL server with Firefox using TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (0xc00a) cipher suite

2010-07-08 Thread Eisenacher, Patrick
Hi Alex, are you sure, ff ist talking to the same server on port 4433? Do you get a successful handshake when using a different ciphersuite on the server? Patrick Eisenacher -Original Message- From: Alex Birkett Hi Patrick, openssl s_client -connect localhost:4433 -cipher ECDHE-ECDSA

Frustration with method based on EVP_PKEY_METHOD

2010-07-08 Thread Jeff Saremi
The structure itself is only forward-declared meaning that a programmer has no way of getting into the actual evp_pkey_method_st and its fields. Now that would be fine if there were a complete set of methods EVP_PKEY_meth_* to manipulate the pointers to EVP_PKEY_METHOD. But alas there's only a few.

Re: 'No shared cipher error' connecting to OpenSSL server with Firefox using TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (0xc00a) cipher suite

2010-07-08 Thread Alex Birkett
Hi Patrick, openssl s_client -connect localhost:4433 -cipher ECDHE-ECDSA-AES256-SHA works fine it sends the following cipher suite in the client hello message: Cipher Suite: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (0xc00a) Just double checked with wireshark and FF also sends Cipher Suite: TLS_ECDHE_

RE: 'No shared cipher error' connecting to OpenSSL server with Firefox using TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (0xc00a) cipher suite

2010-07-08 Thread Eisenacher, Patrick
Hi Alex, if you configure s_client with the same list of ciphersuites that firefox sends, then s_server will show the same reaction. That means your ff and your s_client send different lists of ciphersuites. You seem to invoke s_client with the standard list of ciphersuites...whatever that is.

Re: 'No shared cipher error' connecting to OpenSSL server with Firefox using TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (0xc00a) cipher suite

2010-07-08 Thread Alex Birkett
Hi Patrick, Thanks for your response. FF 3.6.2 is sending TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA in it's client hello message. The command line OpenSSL client can be made to connect using this cipher suite. Any ideas? Thanks, Alex On 8 July 2010 13:41, Eisenacher, Patrick wrote: > Hi Alex, >

RE: 'No shared cipher error' connecting to OpenSSL server with Firefox using TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (0xc00a) cipher suite

2010-07-08 Thread Eisenacher, Patrick
Hi Alex, just check the list of ciphersuites that FF sends in its client hello message and you'll see which ciphersuites FF supports. HTH, Patrick Eisenacher -Original Message- From: Alex Birkett Hi, Firefox 3.6.2 supports the TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA cipher suite. I've co

'No shared cipher error' connecting to OpenSSL server with Firefox using TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA (0xc00a) cipher suite

2010-07-08 Thread Alex Birkett
Hi, Firefox 3.6.2 supports the TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA cipher suite. I've configured Open SSL (version 1.0.0.a) as a test server with what I think is a suitable ECC key/certificate (attached) The keys were created with the attached script. The server was started like this: openssl s

RE: Huge performance issues using SSL3

2010-07-08 Thread Ludwig Groten
We could identify the issue. On the server we used an apache proxy to tomcat using mod_ajp to speed up SSL downloads. Switching to mod_jk solved the issue. Sorry for posting to the wrong list. Ludwig > -Original Message- > From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...