Re: OpenSSL PKI Tutorial updated

2014-03-27 Thread Zack Williams
On Thu, Mar 27, 2014 at 2:47 AM, Stefan H. Holek wrote: > No reason. Just for maximum compatibility. Every software can do SHA1. But > this comes up a lot and I might switch to sha256 the next time around. It appears that even what most "legacy" web browsers and servers support sha256, given the

Re: OpenSSL PKI Tutorial updated

2014-03-27 Thread Stefan H. Holek
On 27.03.2014, at 13:32, Walter H. wrote: > Does this mean, you use certificates with a complete chain of at least 4 > certificates? > > - root ca cert. no pathlen > - intermediate ca cert. also no pathlen > - signing ca cert. with pathlen > - end cert Yes, the expert example does that. > what

Re: How to swap engines / register functionality on the fly

2014-03-27 Thread Dr. Stephen Henson
On Thu, Mar 27, 2014, axisofevil wrote: > I would like to use default implementations for some ECC operations but the > OpenSC pkcs11 engine for other ECDSA operations. > > At a high level I have a Sign() & a Verify() in one app on a server - the > Sign() needs to be done via a HSM using PKCS11

How to swap engines / register functionality on the fly

2014-03-27 Thread axisofevil
I would like to use default implementations for some ECC operations but the OpenSC pkcs11 engine for other ECDSA operations. At a high level I have a Sign() & a Verify() in one app on a server - the Sign() needs to be done via a HSM using PKCS11 interface, using EVP functions. Keys for these oper

Re: ECDHE-ECDSA Support

2014-03-27 Thread Rob Stradling
Hi Thomas. I was told a while ago that Google's servers will only negotiate ECDHE-ECDSA if the client i) sends the SNI extension and ii) does _not_ offer any compression methods. IINM, s_client always offers zlib compression if zlib support is compiled in. It'd be nice if there was a comman

Re: Data race with SSL_SESSION reuse and tlsext_tick

2014-03-27 Thread Viktor Dukhovni
On Wed, Mar 26, 2014 at 05:25:49PM -0400, Devon H. O'Dell wrote: > Hi there, > > I'm working on an application that shares SSL_SESSION pointers between > SSL_CTXs in multiple threads. The logic for sharing the session is > roughly as follows: > > lock(&mtx); > sp = get_cached_session_pointer();

Re: ECDHE-ECDSA Support

2014-03-27 Thread Dr. Stephen Henson
On Thu, Mar 27, 2014, Dr. Stephen Henson wrote: > On Thu, Mar 27, 2014, Thomas Montroy wrote: > > > hi Jeff, > > > > Thanks for the response, but I'm still having trouble. > > > > As for TLSv1.2: > > > > With the OS version of openssl, my default connection looks to be TLSv1.1 > > > > However

Re: ECDHE-ECDSA Support

2014-03-27 Thread Thomas Montroy
Nice catch. Thanks for looking into it. Cheers, -Tom On Thu, Mar 27, 2014 at 9:22 AM, Dr. Stephen Henson wrote: > On Thu, Mar 27, 2014, Thomas Montroy wrote: > > > hi Jeff, > > > > Thanks for the response, but I'm still having trouble. > > > > As for TLSv1.2: > > > > With the OS version of ope

Re: ECDHE-ECDSA Support

2014-03-27 Thread Dr. Stephen Henson
On Thu, Mar 27, 2014, Thomas Montroy wrote: > hi Jeff, > > Thanks for the response, but I'm still having trouble. > > As for TLSv1.2: > > With the OS version of openssl, my default connection looks to be TLSv1.1 > > However, if I add -tls1_2 to the call, I get this: > SSL-Session: > Protoc

Re: ECDHE-ECDSA Support

2014-03-27 Thread Thomas Montroy
hi Jeff, Thanks for the response, but I'm still having trouble. As for TLSv1.2: With the OS version of openssl, my default connection looks to be TLSv1.1 However, if I add -tls1_2 to the call, I get this: SSL-Session: Protocol : TLSv1.2 Cipher: ECDHE-RSA-AES256-GCM-SHA384 Should t

Re: OpenSSL PKI Tutorial updated

2014-03-27 Thread Walter H.
Hello, On Thu, March 27, 2014 10:47, Stefan H. Holek wrote: >> 3. Is there a reason to not set a pathLen in the basicConstraints >> section of the Root CA's (to 1, to allow a maximum of one layer of >> CA's below the Root), but to do so on the Intermediate CA's? > > Pathlen is not used on root CA

Re: [openssl-users] Re: OpenSSL PKI Tutorial updated

2014-03-27 Thread Erwann Abalea
Le 27/03/2014 11:14, Jeffrey Walton a écrit : On Thu, Mar 27, 2014 at 5:47 AM, Stefan H. Holek wrote: On 25.03.2014, at 17:44, Zack Williams wrote: ... 3. Is there a reason to not set a pathLen in the basicConstraints section of the Root CA's (to 1, to allow a maximum of one layer of CA's bel

Data race with SSL_SESSION reuse and tlsext_tick

2014-03-27 Thread Devon H. O'Dell
Hi there, I'm working on an application that shares SSL_SESSION pointers between SSL_CTXs in multiple threads. The logic for sharing the session is roughly as follows: lock(&mtx); sp = get_cached_session_pointer(); if (!SSL_set_session(ctx, sp)) { SSL_set_session(ctx, NULL); } unlock(&mtx); r

Re: OpenSSL PKI Tutorial updated

2014-03-27 Thread Jeffrey Walton
On Thu, Mar 27, 2014 at 5:47 AM, Stefan H. Holek wrote: > On 25.03.2014, at 17:44, Zack Williams wrote: > >> ... >> 3. Is there a reason to not set a pathLen in the basicConstraints >> section of the Root CA's (to 1, to allow a maximum of one layer of >> CA's below the Root), but to do so on the I

Re: OpenSSL PKI Tutorial updated

2014-03-27 Thread Stefan H. Holek
On 25.03.2014, at 17:44, Zack Williams wrote: > 1. Is there a reason you're not using SHA-256 hash by default - it > appears that SHA1 is being recommended against currently: > http://www.digicert.com/sha-2-ssl-certificates.htm No reason. Just for maximum compatibility. Every software can do SHA1