Re: DTLS connection problems

2013-02-18 Thread T J
OK, I followed the advice documented for the SSL_ERROR_SYSCALL case and since ERR_get_error() returns 0, ended up with this situation : "If *ret == 0*, an EOF was observed that violates the protocol." Disabling the server results in SSL_connect never returning, so I suspect that, when the serv

Building issues with openssl 0.9.8y and 1.0.1e

2013-02-18 Thread Brad Blasing
Currently using 0.9.7, trying to upgrade. When configuring with "solaris64-x86_64-cc", I get a build error, but in an unusual spot: > ./Configure solaris64-x86_64-cc Seems to go ok. Build: > test-mn$ make ... > cc -I.. -I../.. -I../../include -DOPENSSL_THREADS -D_REENTRANT -DDSO_DLFCN > -DHAVE_

Re: DTLS connection problems

2013-02-18 Thread Dr. Stephen Henson
On Tue, Feb 19, 2013, T J wrote: > I think it might be my client as SSL_connect() is returning 0. When > I plug that value + the clients' ssl into SSL_get_error(), it > returns a value of 5. strerror(5) returns "Input/output error". Not > much help there! Can anyone point me in the right direction

Re: OCSP stapling

2013-02-18 Thread Dr. Stephen Henson
On Sun, Feb 17, 2013, Jeremy Harris wrote: > On 02/16/2013 10:51 PM, Dr. Stephen Henson wrote: > >So you could supply an application defined callback that just calls > >X509_verify_cert too which keeps the current behaviour. If that call is > >successful you can then note the chain for future use

Re: DTLS connection problems

2013-02-18 Thread T J
I think it might be my client as SSL_connect() is returning 0. When I plug that value + the clients' ssl into SSL_get_error(), it returns a value of 5. strerror(5) returns "Input/output error". Not much help there! Can anyone point me in the right direction to track that down further to find ex

Re: DTLS connection problems

2013-02-18 Thread T J
Well passing the ret value from SSL_get_error() (which is 2) to ERR_error_string() results in: ... error:0002:lib(0):func(0):system lib ... which is a system error isn't it? - hence my reasoning to try using strerror(). Removing the timeout causes the socket to block and then DTLS

Re: cipher suites for DTLSv1

2013-02-18 Thread Joel Dice
On Fri, 15 Feb 2013, Joel Dice wrote: On Fri, 15 Feb 2013, Joel Dice wrote: On Thu, 14 Feb 2013, Dr. Stephen Henson wrote: On Thu, Feb 14, 2013, Joel Dice wrote: Although OpenSSL seems to allow CBC-based suites with DTLS, from what I've read a block in a CBC stream can't be properly decode

RE: DTLS connection problems

2013-02-18 Thread Dave Thompson
>From: owner-openssl-us...@openssl.org On Behalf Of David Geib >Sent: Monday, 18 February, 2013 09:45 >You can't use strerror for OpenSSL errors. Look into >ERR_get_error() and ERR_error_string(). After *most* OpenSSL errors. Errors (only) on an underlying I/O operation, in particular a socket

RE: Failed SSL/HTTP connections via Apache(2.4.3)SSL when going from 1.0.1c to 1.0.1e

2013-02-18 Thread Dave Thompson
> From: owner-openssl-us...@openssl.org On Behalf Of Joel Bion > Sent: Monday, 18 February, 2013 13:57 > The issue I have been reporting has never been on the client > side, as the > problem is seen when connecting into a server that is booted into a > 1.0.1e-environment vs. a 1.0.1c based enviro

Re: Failed SSL/HTTP connections via Apache(2.4.3)SSL when going from 1.0.1c to 1.0.1e

2013-02-18 Thread Matthew Hall
On Mon, Feb 18, 2013 at 10:57:14AM -0800, Joel Bion wrote: > 3372:error:140790E5:SSL routines:SSL23_WRITE:ssl handshake > failure:.\ssl\s23_lib.c:177: I think this is the important thing to check: error:[error code]:[library name]:[function name]:[reason string] error:140790E5:SSL routines:SSL23_

RE: Failed SSL/HTTP connections via Apache(2.4.3)SSL when going from 1.0.1c to 1.0.1e

2013-02-18 Thread Joel Bion
On Mon, February 18, 2013 3:04 am, Eisenacher, Patrick wrote: > Hi Joel, > > > Looks like your client doesn't trust the server's root CA certificate. > Try to invoke s_client with either the -CApath or the -CAfile option. > > Thanks for your note. The issue I have been reporting has never been o

How to verify the bug fix for CVE-2013-0169 in openssl 0.9.8?

2013-02-18 Thread Shawn
hi ALL, There were 13 upstream commits for fixing the Lucky-13 issue in openssl 0.9.8. For this issue, modified/deleted thousand of lines of code. Is there any method or POC code for verification? Any ideas? Thanks! -- GNU powered it... GPL protect it... God blessing it... regards Shawn __

Re: OCSP stapling

2013-02-18 Thread Jeffrey Walton
On Sun, Feb 17, 2013 at 10:02 AM, Jeremy Harris wrote: > On 02/16/2013 10:51 PM, Dr. Stephen Henson wrote: >> >> So you could supply an application defined callback that just calls >> X509_verify_cert too which keeps the current behaviour. If that call is >> successful you can then note the chain

Re: DTLS connection problems

2013-02-18 Thread David Geib
You can't use strerror for OpenSSL errors. Look into ERR_get_error() and ERR_error_string(). I think what's happening with your code is that you set a recv timeout on the listen socket, so you listen for one second and then hit the timeout and the socket returns EWOULDBLOCK/EAGAIN to OpenSSL which

Re: Seg fault from d2i_RSAPrivateKey_fp

2013-02-18 Thread Jeffrey Walton
On Mon, Feb 18, 2013 at 8:31 AM, Nick wrote: > On Mon, 2013-02-18 at 08:12 -0500, Jeffrey Walton wrote: >> It looks like the GCC tool chain has let you down: "C/C++ Option to >> Initialize Variables?", >> http://gcc.gnu.org/ml/gcc/2013-02/msg00207.html. >> >> Visual Studio has a similar feature fo

Re: Seg fault from d2i_RSAPrivateKey_fp

2013-02-18 Thread Nick
On Mon, 2013-02-18 at 14:18 +0100, Dr. Stephen Henson wrote: > > Can you confirm the same logic applies to d2i_X509_fp? > > > > Yes, it applies to any function of the form d2i__fp. > I'll make the appropriate changes elsewhere then. Thank you very much for your prompt & helpful responses. Ni

Re: Seg fault from d2i_RSAPrivateKey_fp

2013-02-18 Thread Nick
On Mon, 2013-02-18 at 08:12 -0500, Jeffrey Walton wrote: > It looks like the GCC tool chain has let you down: "C/C++ Option to > Initialize Variables?", > http://gcc.gnu.org/ml/gcc/2013-02/msg00207.html. > > Visual Studio has a similar feature for debug builds, and I don't ever > recall being burn

Re: Seg fault from d2i_RSAPrivateKey_fp

2013-02-18 Thread Dr. Stephen Henson
On Mon, Feb 18, 2013, Nick wrote: > On Mon, 2013-02-18 at 13:22 +0100, Dr. Stephen Henson wrote: > > Here's what's happening in detail. If you pass a non-NULL pointer for > > the > > second parameter it will attempt to reuse the structure. > > > > In the case of the RSA structure the outer (RSA *

Re: Seg fault from d2i_RSAPrivateKey_fp

2013-02-18 Thread Jeffrey Walton
On Mon, Feb 18, 2013 at 7:58 AM, Nick wrote: > On Mon, 2013-02-18 at 13:22 +0100, Dr. Stephen Henson wrote: >> Here's what's happening in detail. If you pass a non-NULL pointer for >> the >> second parameter it will attempt to reuse the structure. >> >> In the case of the RSA structure the outer (

Re: Seg fault from d2i_RSAPrivateKey_fp

2013-02-18 Thread Nick
On Mon, 2013-02-18 at 13:22 +0100, Dr. Stephen Henson wrote: > Here's what's happening in detail. If you pass a non-NULL pointer for > the > second parameter it will attempt to reuse the structure. > > In the case of the RSA structure the outer (RSA *) is allocated via > OPENSSL_malloc and so are

Re: Seg fault from d2i_RSAPrivateKey_fp

2013-02-18 Thread Dr. Stephen Henson
On Mon, Feb 18, 2013, Nick wrote: > On Mon, 2013-02-18 at 00:37 +0100, Dr. Stephen Henson wrote: > > That's because it is attempting to free up parts of a pointer that > > haven't > > been allocated with OPENSSL_malloc. See: > > > > http://www.openssl.org/docs/crypto/d2i_X509.html#WARNINGS > > >

RE: Failed SSL/HTTP connections via Apache(2.4.3)SSL when going from 1.0.1c to 1.0.1e

2013-02-18 Thread Eisenacher, Patrick
Hi Joel, > -Original Message- > From: Joel Bion > > Here is the output from running an 'openssl s_client -debug' command (as > much verbosity as I could quickly find.) The key difference between the > two seems to be in the 1.0.1e case, there is this extra text at the end. > 1.0.1c does n

Re: Seg fault from d2i_RSAPrivateKey_fp

2013-02-18 Thread Nick
On Mon, 2013-02-18 at 04:00 -0500, Jeffrey Walton wrote: > The signature is X509 *d2i_X509_fp(FILE *fp, X509 **x); > Please re-read my previous response. I'm not having a problem w/ the code involving x509. I included it in my last response to point out that while it works fine, calling d2i_RSA

Re: Seg fault from d2i_RSAPrivateKey_fp

2013-02-18 Thread Jeffrey Walton
On Mon, Feb 18, 2013 at 3:04 AM, Nick wrote: > On Mon, 2013-02-18 at 00:37 +0100, Dr. Stephen Henson wrote: >> That's because it is attempting to free up parts of a pointer that >> haven't >> been allocated with OPENSSL_malloc. See: >> >> http://www.openssl.org/docs/crypto/d2i_X509.html#WARNINGS >

Re: Difference between SSL and TLS

2013-02-18 Thread Nick
On Mon, 2013-02-18 at 08:23 +, b ganesh ganesh wrote: > All: > > What is the major difference bw SSL and TLS?Does it possible to use > this protocols independenlty? > Google seems to turn up a bunch of results for your first question: https://www.google.com/search?q=difference+between+ssl+a

Re: Seg fault from d2i_RSAPrivateKey_fp

2013-02-18 Thread Nick
On Mon, 2013-02-18 at 00:37 +0100, Dr. Stephen Henson wrote: > That's because it is attempting to free up parts of a pointer that > haven't > been allocated with OPENSSL_malloc. See: > > http://www.openssl.org/docs/crypto/d2i_X509.html#WARNINGS > Changing the code to allocate the struct via OPEN