Re: openssl-0.9.8za fips compliance

2014-08-07 Thread Gayathri Manoj
Hi Jeffrey, I used openssl_fips 1.2 with openssl 0.9.8l. and planning to upgrade openssl-0.9.8l to 0.9.8za with -no-ec option. Please let me know is it break my fips compliance. Thanks, Gayathri On Fri, Aug 8, 2014 at 11:09 AM, Jeffrey Walton wrote: > On Fri, Aug 8, 2014 at 1:11 AM, Gayathri

Re: openssl-0.9.8za fips compliance

2014-08-07 Thread Jeffrey Walton
On Fri, Aug 8, 2014 at 1:11 AM, Gayathri Manoj wrote: > > Please let me know openssl-0.9.8za with -no-ec option is fips compliant or > not. No. If you want FIPS validated crypto, then you need one of the openssl-fips-*-tar.gz downloads. They produce the FIPS Object Module. openssl-0.9.8xxx is FIP

openssl-0.9.8za fips compliance

2014-08-07 Thread Gayathri Manoj
Hi All, Please let me know openssl-0.9.8za with -no-ec option is fips compliant or not. Thanks, Gayathri

Re: 1.0.1i breaks SRP

2014-08-07 Thread Norm Green
Thanks for tracking it down so fast Steve. I will revert the mods in that commit and try it again tomorrow. Norm On 8/7/2014 7:21 PM, Dr. Stephen Henson wrote: On Thu, Aug 07, 2014, Norm Green wrote: Any idea where to begin debugging this? Any and all help is appreciated. The cause is in

Re: 1.0.1i breaks SRP

2014-08-07 Thread Dr. Stephen Henson
On Thu, Aug 07, 2014, Norm Green wrote: > > Any idea where to begin debugging this? Any and all help is appreciated. > The cause is incorrect handling of new SRP authentication type which was added to correct a bug where SRP authentication was incorrectly classified as NULL authhentication. A

Re: found half of it: EC key gen

2014-08-07 Thread dave paxton
Thanks, OK I got the rest of the way through the tangled mess. The question is there someone out there that can skip trace through the subroutines that can put together a tight code set on how this works? One command walk through to start from the beginning to the end which is the key feedback.

RE: found half of it: EC key gen

2014-08-07 Thread Dave Thompson
> From: owner-openssl-us...@openssl.org On Behalf Of dave > Sent: Monday, August 04, 2014 15:50 > I have it that the elliptic multiply is not standard. So I have been > skip tracing though the code. > It starts with ec_key.c, with EC_KEY_generate_key. This grabs the > group or or the particula

RE: Query on X509 certificate validation- EVP_VerifyUpdate & EVP_VerifyFinal

2014-08-07 Thread Dave Thompson
> From: owner-openssl-us...@openssl.org On Behalf Of Viktor Dukhovni > Sent: Monday, August 04, 2014 11:21 > On Mon, Aug 04, 2014 at 05:43:47AM +, Mitra, Rituparna (STSD) wrote: > > > 1. app1: sends a CGI POST request to app2 ? the POST request has the > UN (username). > > > > 2.

RE: Help diagnosing SSL connection problem needed

2014-08-07 Thread Dave Thompson
> From: owner-openssl-us...@openssl.org On Behalf Of Kyle Hamilton > Sent: Thursday, August 07, 2014 16:48 > Your client is saying that it's failing the certificate verification of > the server certificate. It's probably not using the CAfile that you > passed to openssl s_client. > > -Kyle H >

Re: 1.0.1i breaks SRP

2014-08-07 Thread Dr. Stephen Henson
On Thu, Aug 07, 2014, Norm Green wrote: > I just upgraded our product to 1.0.1i and logins via SRP are now > broken. Shown below are the SSL calls made from both the client and > server. Everything worked perfectly under 1.0.1h. > Bot sides set the cipher list to 'SRP' via calls to > SSL_CTX_set

Re: 1.0.1i breaks SRP

2014-08-07 Thread Dr. Stephen Henson
On Thu, Aug 07, 2014, Norm Green wrote: > I just upgraded our product to 1.0.1i and logins via SRP are now > broken. Shown below are the SSL calls made from both the client and > server. Everything worked perfectly under 1.0.1h. > Bot sides set the cipher list to 'SRP' via calls to > SSL_CTX_set

1.0.1i breaks SRP

2014-08-07 Thread Norm Green
I just upgraded our product to 1.0.1i and logins via SRP are now broken. Shown below are the SSL calls made from both the client and server. Everything worked perfectly under 1.0.1h. Bot sides set the cipher list to 'SRP' via calls to SSL_CTX_set_cipher_list(), so the "no shared cipher" compla

Re: s_client output for server's certificate request message?

2014-08-07 Thread Jeffrey Walton
On Thu, Aug 7, 2014 at 5:29 PM, Dr. Stephen Henson wrote: > On Thu, Aug 07, 2014, Jeffrey Walton wrote: > >> I'm trying to track down a client side issue with the use of HTTPS. I >> suspect it has something to do with a server misconfiguration and >> client side certificates. >> >> When running s_

Re: Help diagnosing SSL connection problem needed

2014-08-07 Thread Ted Byers
Hi Kyle, Thanks See below On Thu, Aug 7, 2014 at 4:47 PM, Kyle Hamilton wrote: > Your client is saying that it's failing the certificate verification of > the server certificate. It's probably not using the CAfile that you > passed to openssl s_client. > > -Kyle H > Actually, I can confirm t

Re: s_client output for server's certificate request message?

2014-08-07 Thread Jeffrey Walton
On Thu, Aug 7, 2014 at 4:57 PM, Kyle Hamilton wrote: > Usually you don't need to echo anything to get the "acceptable client CA > names" list. Thanks. In this case, its IIS 7.5 and its *not* using SNI (SNI is available in IIS 8). So I get a 400 "bad request" without the host header. Jeff > On 8

stunnel 5.03 released

2014-08-07 Thread Michal Trojnara
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Dear Users, I have released version 5.03 of stunnel. The ChangeLog entry: Version 5.03, 2014.08.07, urgency: HIGH: * Security bugfixes - OpenSSL DLLs updated to version 1.0.1i. See https://www.openssl.org/news/secadv_20140806.txt * New feature

Re: s_client output for server's certificate request message?

2014-08-07 Thread Dr. Stephen Henson
On Thu, Aug 07, 2014, Jeffrey Walton wrote: > I'm trying to track down a client side issue with the use of HTTPS. I > suspect it has something to do with a server misconfiguration and > client side certificates. > > When running s_client: > > $ echo -e "GET / HTTP/1.1\nHost:example.com\n" | \ >

Re: s_client output for server's certificate request message?

2014-08-07 Thread Kyle Hamilton
Usually you don't need to echo anything to get the "acceptable client CA names" list. -Kyle H On 8/7/2014 1:55 PM, Jeffrey Walton wrote: > I'm trying to track down a client side issue with the use of HTTPS. I > suspect it has something to do with a server misconfiguration and > client side certif

s_client output for server's certificate request message?

2014-08-07 Thread Jeffrey Walton
I'm trying to track down a client side issue with the use of HTTPS. I suspect it has something to do with a server misconfiguration and client side certificates. When running s_client: $ echo -e "GET / HTTP/1.1\nHost:example.com\n" | \ openssl s_client -connect example.com:443 -ssl3 -ign_eof

Re: Help diagnosing SSL connection problem needed

2014-08-07 Thread Kyle Hamilton
Your client is saying that it's failing the certificate verification of the server certificate. It's probably not using the CAfile that you passed to openssl s_client. -Kyle H On 8/5/2014 12:19 PM, Ted Byers wrote: > I have Perl code, which uses a library that in turn uses openssl for > HTTPS co

Re: openssl dgst and capi engine question

2014-08-07 Thread Dr. Stephen Henson
On Thu, Aug 07, 2014, Vladimir Simonov wrote: > > >> On Sun, Aug 03, 2014, Vladimir Simonov wrote: > >> > >>> Hi all, > >>> > >>> I'm trying to use openssl command line utility to sign data file with > >>> key located in Windows Certificates Store. > >>> I generated 1024 bit dsa private key an

openssl 0.9.8 zb and DTLS reassemble fragment

2014-08-07 Thread Jaya Nageswar
Hi All, The following vulnerability fixes in 0.9.8 zb seems to be related to the DTLS reassemble fragment functionality that is introduced from 0.9.8 o version. CVE-2014-3505 -Avoid double free when processing DTLS packets CVE-2014-3506 -Fix DTLS handshake message size checks CVE-2014-3507 -Fix m

RE: openssl dgst and capi engine question

2014-08-07 Thread Vladimir Simonov
>> On Sun, Aug 03, 2014, Vladimir Simonov wrote: >> >>> Hi all, >>> >>> I'm trying to use openssl command line utility to sign data file with >>> key located in Windows Certificates Store. >>> I generated 1024 bit dsa private key and certificate. Converted them >>> to >>> pkcs12 format and imp

RE: openssl dgst and capi engine question

2014-08-07 Thread Vladimir Simonov
-Original Message- From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] On Behalf Of Dr. Stephen Henson Sent: Thursday, August 07, 2014 3:16 PM To: openssl-users@openssl.org Subject: Re: openssl dgst and capi engine question > On Sun, Aug 03, 2014, Vladimir Simon

Re: OPENSSL 1.0.1i

2014-08-07 Thread Dr. Stephen Henson
On Thu, Aug 07, 2014, Spence, Thomas P CIV USAF (US) wrote: > Good morning... > > I am using GCC 4.8.2 and AIX 5.3. > > I downloaded the file then compile... Here what I did: > > # ./Configure aix-gcc zlib fips > (no problem) > > # make depend > (no problem) > > # make > (no problem) > > #

Re: openssl dgst and capi engine question

2014-08-07 Thread Dr. Stephen Henson
On Sun, Aug 03, 2014, Vladimir Simonov wrote: > Hi all, > > I'm trying to use openssl command line utility to sign data file > with key located in Windows Certificates Store. > I generated 1024 bit dsa private key and certificate. Converted them to > pkcs12 format and imported the certificate int

OPENSSL 1.0.1i

2014-08-07 Thread Spence, Thomas P CIV USAF (US)
Good morning... I am using GCC 4.8.2 and AIX 5.3. I downloaded the file then compile... Here what I did: # ./Configure aix-gcc zlib fips (no problem) # make depend (no problem) # make (no problem) # make test (failed, here is...) test a^b%c implementations ../util/shlib_wrap.sh ./ex