Will OpenSSL fallback to software mode if ENGINE using hardware fails?

2014-09-09 Thread Maciej Grzymkowski
Hi everyone, Firstly, I'm a beginner in the OpenSSL world. I apologize in advance for any basic, barbaric errors. Also not quite sure if it's OK to ask here, if not - please disregard it. I've asked this question on stackoverflow as well. Consider a flow: - Initialize OpenSSL with engine using ha

RE: cannot read PEM key file - no start line

2014-09-09 Thread Dave Thompson
I was half wrong before. The base64 read in EVP_Decode* allows 76. But the PEM parser in PEM_read_bio enforces exactly 64 >>only for input files that have PEM-encrypt headers<< which in practice is only encrypted legacy-format privatekey files. (Nonprivate things like cert, CSR, publickey

RE: Certificate pass phrase brute force...

2014-09-09 Thread Dave Thompson
(Sorry not inline, my Outlook can’t do that for HTML.) That’s actually a subvariant I forgot to describe: PKCS#8 *version 2*. It has “BEGIN ENCRYPTED PRIVATE KEY” (not specifying RSA etc.) like version 1, but instead of a single PBE algorithm-id PBE-with-$kdf-and-$cipher it has a structure

Re: Certificate pass phrase brute force...

2014-09-09 Thread Kyle Hamilton
Having a sterile VM to do all of the cert generation is a good idea. But can you guarantee, in these days of logging and versioned filesystems, that the unencrypted key file data block will in fact be overwritten by the encryption? Or will it remain intact, with a new data block allocated for th

Re: Certificate pass phrase brute force...

2014-09-09 Thread Gregory Sloop
@Kyle: I'm the admin for the OpenVPN system setup and config, and generate all the server/client certs, CA etc., and if my machine is infested with malware, then well, the CA's compromised, along with everything else. IOW, game over. It's not that I disagree with you particularly, but I doubt th

Re: Why does OpenSSL own all the prefixes in the world?

2014-09-09 Thread Ted Byers
On Tue, Sep 9, 2014 at 2:42 PM, Iñaki Baz Castillo wrote: > The (bad) idea of using C++ namespaces was just targeted for those > integrating OpenSSL into their own C++ projects. > Now, I would have said that using C++ namespaces was a good idea and perhaps it might be motivation to replace the MAC

Re: On 2K keys and SHA-256

2014-09-09 Thread Benny Baumann
Hi Rich, Am 09.09.2014 14:18, schrieb Salz, Rich: >> May I suggest 4096 bit with SHA-256. > > I think the next step after 2K-RSA is ECC, and that 4K RSA isn't going to see > much deployment because of the computational cost. At least, that's how we > see things at my employer. > >> And Chrome

Re: Verifying authenticode signature using openssl API

2014-09-09 Thread Kyle Hamilton
http://msdn.microsoft.com/en-us/windows/hardware/gg463180.aspx is the spec for the Authenticode PE signature format. http://msdn.microsoft.com/en-us/gg463119 is the Microsoft PE and COFF Specification. Better download them now before they disappear, they appear to be deprecated in favor of Win

RE: Why does OpenSSL own all the prefixes in the world?

2014-09-09 Thread Iñaki Baz Castillo
The (bad) idea of using C++ namespaces was just targered for those integrating OpenSSL into their own C++ projects. El 09/09/2014 20:39, "Larry Bugbee" escribió: > In the FWIW column > > Please don't mangle names by forcing C++ namespaces. Some us call OpenSSL > from Python (and other dynami

RE: Why does OpenSSL own all the prefixes in the world?

2014-09-09 Thread Larry Bugbee
In the FWIW column Please don't mangle names by forcing C++ namespaces.   Some us call OpenSSL from Python (and other dynamic languages) and depend on the C naming convention.  Adding a "OSSL_" prefix is fine; mangling creates huge problems. -- Sent fm iTouch via Boxer > From: owner-op

Re: Verifying authenticode signature using openssl API

2014-09-09 Thread Prasad Dabak
Thanks Jacob for your response. Very informative indeed! Thanks -Prasad Sent from my iPhone > On 09-Sep-2014, at 10:05 pm, Jakob Bohm wrote: > >> On 09/09/2014 09:01, Prasad Dabak wrote: >> Thanks Jacob for an elaborate answer. Somehow I never received your response >> to my registered email

RE: Value of DEFAULT cipher suite

2014-09-09 Thread Salz, Rich
> You really should look at the extensive research done by SSL Labsbefore > blindly deprecating stuff. Sorry you think I'm doing that. I'm raising an issue six months before it will affect people. -- Principal Security Engineer, Akamai Technologies IM: rs...@jabber.me Twitter: RichSalz __

Re: Value of DEFAULT cipher suite

2014-09-09 Thread Jakob Bohm
On 09/09/2014 19:20, Salz, Rich wrote: In addition to removing the very-weak (less than 70 bits security) ciphers from the default list,this would be a good opportunity to reorder the default I'd prefer to wait until TLS 1.3 is implemented, which has some definite (and rather strong :) feelings

RE: Certificate pass phrase brute force...

2014-09-09 Thread Michael Wojcik
Sure, if that's a better fit to your threat model. (I certainly wouldn't recommend changing "openssl req" to make -nodes the default.) I was just suggesting possibilities for Gregory. Personally, I'd probably go with generating an encrypted private key with "openssl genpkey" first, but that mig

RE: Certificate pass phrase brute force...

2014-09-09 Thread Kyle Hamilton
At least 3DES is *some* encryption. The issue is that peoples' computers are usually infested with malware; it's better to assume (for a software distribution) that the disk is compromised, and always encrypt it before writing. Perhaps there should be a cipher option for the req -newkey option?

Re: Value of DEFAULT cipher suite

2014-09-09 Thread Viktor Dukhovni
On Tue, Sep 09, 2014 at 07:04:36PM +0200, Jakob Bohm wrote: > In addition to removing the very-weak (less than 70 bits security) > ciphers from the default list,this would be a good opportunity to > reorder the default list (either via the define, or bettervia whatever > internal priorities guide

Re: On 2K keys and SHA-256

2014-09-09 Thread Jakob Bohm
On 09/09/2014 14:18, Salz, Rich wrote: May I suggest 4096 bit with SHA-256. I think the next step after 2K-RSA is ECC, and that 4K RSA isn't going to see much deployment because of the computational cost. At least, that's how we see things at my employer. There was (some years ago) a heated

RE: Value of DEFAULT cipher suite

2014-09-09 Thread Salz, Rich
> In addition to removing the very-weak (less than 70 bits security) ciphers > from the default list,this would be a good opportunity to reorder the default I'd prefer to wait until TLS 1.3 is implemented, which has some definite (and rather strong :) feelings on the subject. Doing things like p

RE: cannot read PEM key file - no start line

2014-09-09 Thread Liz Fall
Hi Jeff, Please find the certificates attached. openssl x509 -in DTCD9C3B2F42757.ent.wfb.bank.corp_mongo_wells.pembackup -inform PEM -text -noout Certificate: Data: Version: 3 (0x2) Serial Number: 1085434364 (0x40b269fc) Signature Algorithm: sha1WithRSAEncryptio

RE: Why does OpenSSL own all the prefixes in the world?

2014-09-09 Thread Michael Wojcik
> From: owner-openssl-us...@openssl.org [mailto:owner-openssl- > us...@openssl.org] On Behalf Of Iñaki Baz Castillo > Sent: Tuesday, 09 September, 2014 12:44 > To: openssl-users@openssl.org > Subject: Re: Why does OpenSSL own all the prefixes in the world? > > May be I was not clear, but what I me

Re: Value of DEFAULT cipher suite

2014-09-09 Thread Jakob Bohm
On 09/09/2014 00:42, Salz, Rich wrote: We are considering removing weak cryptography from the value of DEFAULT. That is, append ":!LOW:!EXPORT" It is currently defined as this in include/openssl/ssl.h: #define SSL_DEFAULT_CIPHER_LIST "ALL:!aNULL:!eNULL:!SSLv2" Please let us know

RE: Value of DEFAULT cipher suite

2014-09-09 Thread Salz, Rich
> Folks who want strong BCP crypto, can disable MEDIUM. Folks who want weak non-BCP crypto can enable LOW. I'm putting this on hold to see where we are 6-9 months from now. -- Principal Security Engineer Akamai Technologies, Cambridge MA IM: rs...@jabber.me Twitter: RichSalz __

Re: On 2K keys and SHA-256

2014-09-09 Thread Jeroen de Neef
No, I do not have numbers to back it up, that is why my guess is that 3K-RSA is the next step after 2K-RSA. It also depends on what data you are planning to transport, and in what kind of organisation you are. 2014-09-09 18:21 GMT+02:00 Viktor Dukhovni : > On Tue, Sep 09, 2014 at 05:54:15PM +0200

Re: Value of DEFAULT cipher suite

2014-09-09 Thread Viktor Dukhovni
On Tue, Sep 09, 2014 at 06:29:51PM +0200, Jeroen de Neef wrote: > I can see RC4 going in the list of low security ciphers within a couple of > years anyways, so we can better discourage the usage right now. Note that RC4 is essentially the only widely used MEDIUM cipher, and is by default last on

Re: Why does OpenSSL own all the prefixes in the world?

2014-09-09 Thread Iñaki Baz Castillo
2014-09-09 17:58 GMT+02:00 Michael Wojcik : >> I did that, but if a openssl header file includes standard C headers >> that I don't include, then the namespace declaration would affect them >> too, am I wrong? > > It shouldn't. The C standard says that the second and subsequent inclusion of > a st

Re: Value of DEFAULT cipher suite

2014-09-09 Thread Viktor Dukhovni
On Tue, Sep 09, 2014 at 12:14:36PM -0400, Salz, Rich wrote: > We disagree. I've got two IETF WG's coming to the same conclusion > so making post-1.0.2 follow IETF practices seems pretty inarguable. > > > The IETF is sadly also prone to knee-jerk reactions. > > True. Some would put perpass in t

Re: Verifying authenticode signature using openssl API

2014-09-09 Thread Jakob Bohm
On 09/09/2014 09:01, Prasad Dabak wrote: Thanks Jacob for an elaborate answer. Somehow I never received your response to my registered email address, hence delay in responding. This time I have CC-ed you in addition to the mail list. I have a few follow-up questions on your response. 1. So,

Re: Value of DEFAULT cipher suite

2014-09-09 Thread Jeroen de Neef
I can see RC4 going in the list of low security ciphers within a couple of years anyways, so we can better discourage the usage right now. 2014-09-09 18:14 GMT+02:00 Salz, Rich : > We disagree. I've got two IETF WG's coming to the same conclusion so > making post-1.0.2 follow IETF practices seem

Re: On 2K keys and SHA-256

2014-09-09 Thread Viktor Dukhovni
On Tue, Sep 09, 2014 at 05:54:15PM +0200, Jeroen de Neef wrote: > I think that 3K-RSA is the next step after 2K-RSA, and I am sure that the > computational costs of a 4K-RSA certificate is much of an obstruction with > current hardware and I think that it isn't a problem at all a couple years > in

RE: Value of DEFAULT cipher suite

2014-09-09 Thread Salz, Rich
Yes, I'm jumping the gun claiming that the I-D are standards. They're not. They're just drafts. I'm willing to wait and see what happens for a few months. __ OpenSSL Project http://www.openssl.org

RE: Value of DEFAULT cipher suite

2014-09-09 Thread Michael Wojcik
> From: owner-openssl-us...@openssl.org [mailto:owner-openssl- > us...@openssl.org] On Behalf Of Salz, Rich > Sent: Tuesday, 09 September, 2014 11:35 > To: openssl-users@openssl.org > Subject: RE: Value of DEFAULT cipher suite > > > Far more productive than disabling RC4 would be ensuring that it

Re: Value of DEFAULT cipher suite

2014-09-09 Thread Viktor Dukhovni
On Tue, Sep 09, 2014 at 11:34:43AM -0400, Salz, Rich wrote: > > Far more productive than disabling RC4 would be ensuring that it is not the > > preferred cipher suite when better options are enabled. > > I am not disabling RC4. I am saying that applications that want > to use it will, after the

RE: Value of DEFAULT cipher suite

2014-09-09 Thread Salz, Rich
We disagree. I've got two IETF WG's coming to the same conclusion so making post-1.0.2 follow IETF practices seems pretty inarguable. > The IETF is sadly also prone to knee-jerk reactions. True. Some would put perpass in that category. -- Principal Security Engineer Akamai Technologies, Camb

Re: On 2K keys and SHA-256

2014-09-09 Thread Jeroen de Neef
I think that 3K-RSA is the next step after 2K-RSA, and I am sure that the computational costs of a 4K-RSA certificate is much of an obstruction with current hardware and I think that it isn't a problem at all a couple years in the future. 2014-09-09 14:18 GMT+02:00 Salz, Rich : > > May I suggest

RE: Why does OpenSSL own all the prefixes in the world?

2014-09-09 Thread Michael Wojcik
> From: owner-openssl-us...@openssl.org [mailto:owner-openssl- > us...@openssl.org] On Behalf Of Iñaki Baz Castillo > Sent: Tuesday, 09 September, 2014 09:10 > To: openssl-users@openssl.org > Subject: Re: Why does OpenSSL own all the prefixes in the world? > > 2014-09-09 13:14 GMT+02:00 Michael Wo

RE: Certificate pass phrase brute force...

2014-09-09 Thread Michael Wojcik
As far as I know, openssl req doesn't let you specify the encryption cipher for the private key. You can generate the key file first, with openssl genpkey, which does let you specify the encryption cipher; and then use -key to tell openssl to use your existing key rather than creating a new one

RE: Value of DEFAULT cipher suite

2014-09-09 Thread Salz, Rich
> Far more productive than disabling RC4 would be ensuring that it is not the > preferred cipher suite when better options are enabled. I am not disabling RC4. I am saying that applications that want to use it will, after the post-1.0.2 release is adopted, need to take pro-active action. This

RE: Value of DEFAULT cipher suite

2014-09-09 Thread Salz, Rich
> For what it's worth, I'm with Victor on this. RC4 as cipher of last resort in > the > default set is better than not having it there at all. Take it up with the IETF which has two working groups advocating against it. UTA (use of TLS in applications) and the TLS group itself: https://tools.i

Re: Value of DEFAULT cipher suite

2014-09-09 Thread Viktor Dukhovni
On Tue, Sep 09, 2014 at 10:40:26AM -0400, Salz, Rich wrote: > That should probably also be done. But things like HIGH LOW, > etc are point-in-time statements and raising the bar so that existing > applications just get more secure without having to change anything > is also worth doing. This is

RE: Value of DEFAULT cipher suite

2014-09-09 Thread Michael Wojcik
> From: owner-openssl-us...@openssl.org [mailto:owner-openssl- > us...@openssl.org] On Behalf Of Viktor Dukhovni > Sent: Tuesday, 09 September, 2014 09:01 > To: openssl-users@openssl.org > Subject: Re: Value of DEFAULT cipher suite > > On Tue, Sep 09, 2014 at 08:42:36AM -0400, Salz, Rich wrote: >

RE: Value of DEFAULT cipher suite

2014-09-09 Thread Salz, Rich
> Master has "security levels", which still need some work, but are a less crude > mechanism for such tweaks. Disabling RC4 at security level 2 or some such, is > better than incompatibly reclassifying it as "LOW". We can discuss the > details > later. That should probably also be done. But th

Re: Can we have a PyOpenSSL 0.15?

2014-09-09 Thread Kyle Hamilton
I don't think this is the right place to ask on. This list is for OpenSSL itself, not the python binding to it. The PyOpenSSL folks may be watching this list, but this list is probably not the official list to discuss it. -Kyle H On September 8, 2014 8:56:35 AM PST, Eric Chazan wrote: >All,

Re: cannot read PEM key file - no start line

2014-09-09 Thread Viktor Dukhovni
On Tue, Sep 09, 2014 at 04:42:53AM -0700, Liz Fall wrote: > Thanks for the info. I will try what you suggested today. However, I am a > bit confused by what you are saying - You may need to separately specify a > CAfile, or CApath for validating the server certificate. I have the two pem > file

Re: Why does OpenSSL own all the prefixes in the world?

2014-09-09 Thread Iñaki Baz Castillo
2014-09-09 13:14 GMT+02:00 Michael Wojcik : > You'd have to include the standard C headers before including the OpenSSL > ones, outside the namespace, so that their inclusion by the OpenSSL headers > has no effect. I did that, but if a openssl header file includes standard C headers that I don't

Re: OPenssl 20140909 issues

2014-09-09 Thread Viktor Dukhovni
On Mon, Sep 08, 2014 at 11:41:42PM -0600, The Doctor wrote: > ls: error initializing month strings The literal string "month" does not appear in OpenSSL 1.0.2 source code. You're probably compiling in a locale not supported by your system. "ls -l" is unable to format the date. -- Vikt

Re: Value of DEFAULT cipher suite

2014-09-09 Thread Viktor Dukhovni
On Tue, Sep 09, 2014 at 08:42:36AM -0400, Salz, Rich wrote: > > Moving RC4 to "LOW" is also premature. It is already at the bottom of the > > medium cipherlist, that should be enough. > > I am planning on doing it for master, not 1.0.2 That means it > won't be in an official release until... wh

RE: Value of DEFAULT cipher suite

2014-09-09 Thread Salz, Rich
> Moving RC4 to "LOW" is also premature. It is already at the bottom of the > medium cipherlist, that should be enough. I am planning on doing it for master, not 1.0.2 That means it won't be in an official release until... what, at least six months. ___

Re: OPenssl 20140909 issues

2014-09-09 Thread Mike Bland
n Sep 8 23:19:16 2014 > doctor.nl2k.ab.ca//usr/source/openssl-1.0.2-stable-SNAP-20140909$ make test > testing... > (cd ..; make DIRS=crypto all) > making all in crypto... > ar r ../libcrypto.a cryptlib.o mem.o mem_dbg.o cversion.o ex_data.o > cpt_err.o ebcdic.o uid.o o_time

Re: Value of DEFAULT cipher suite

2014-09-09 Thread Viktor Dukhovni
On Tue, Sep 09, 2014 at 08:13:40AM -0400, Salz, Rich wrote: > > Please consider also adding !SSLv3 and !RC4 to this list. > > My plan is to move RC4 and MD5 to LOW; see RT3518. Moving RC4 to "LOW" is also premature. It is already at the bottom of the medium cipherlist, that should be enough. O

Re: Value of DEFAULT cipher suite

2014-09-09 Thread Viktor Dukhovni
On Tue, Sep 09, 2014 at 11:02:45AM +0200, Benny Baumann wrote: > Please consider also adding !SSLv3 and !RC4 to this list. No. That would be unwise at this time. -- Viktor. __ OpenSSL Project

Problem building openssl 1.0.1h on SUSE Linux 9.3 Power PC 64

2014-09-09 Thread Vighnesh Nayak
Hi, I am trying to build openssl 1.0.1h (static) library on SUSE Linux 9.3 on PowerPC 64 bit arch using GCC version 3.3.3. I am getting following errors in "app" directory.. Can somebody tell me what is going on wrong and how can I fix this? This is my first post, so excuse/direct-me to the ri

RE: On 2K keys and SHA-256

2014-09-09 Thread Salz, Rich
> May I suggest 4096 bit with SHA-256. I think the next step after 2K-RSA is ECC, and that 4K RSA isn't going to see much deployment because of the computational cost. At least, that's how we see things at my employer. > And Chrome+Firefox still happily uses MD5 to sign SPKAC after offering yo

RE: Value of DEFAULT cipher suite

2014-09-09 Thread Salz, Rich
> Please consider also adding !SSLv3 and !RC4 to this list. My plan is to move RC4 and MD5 to LOW; see RT3518. As for SSLv3, the issue is that you really mean the protocol, not the ciphers (there's overlap with SSL and TLS), which is configured separately, and only via code. So I think I have

Re: cannot read PEM key file - no start line

2014-09-09 Thread Jeffrey Walton
On Sun, Sep 7, 2014 at 10:26 PM, Liz Fall wrote: > All, > > > > I am getting the following with my client cert when trying to connect to > an SSL-enabled MongoDB: > > > > 2014-09-03T13:37:56.881-0500 ERROR: cannot read PEM key file: > /users/apps/tstlrn/u019807/DTCD9C3B2F42757.ent.wfb.bank.corp_m

RE: cannot read PEM key file - no start line

2014-09-09 Thread Liz Fall
Hi Viktor, Thanks for the info. I will try what you suggested today. However, I am a bit confused by what you are saying - You may need to separately specify a CAfile, or CApath for validating the server certificate. I have the two pem files below. I thought the DTCD9C3B2F42757.ent.wfb.bank.co

RE: Why does OpenSSL own all the prefixes in the world?

2014-09-09 Thread Michael Wojcik
> From: owner-openssl-us...@openssl.org [mailto:owner-openssl- > us...@openssl.org] On Behalf Of Iñaki Baz Castillo > Sent: Monday, 08 September, 2014 18:14 > To: openssl-users@openssl.org > Subject: Re: Why does OpenSSL own all the prefixes in the world? > > 2014-09-08 16:29 GMT+02:00 Salz, Rich

certificate

2014-09-09 Thread Amir Reda
dear all i have just made a code to make a certificate request from a node and my certificate authority reply with the certificate the node has attributes as below X509_REQ *x; EVP_PKEY *prk; EVP_PKEY *puk; X509m_myCert; //RSA structure contain both private and public k

Re: How to empty a BIO buffer?

2014-09-09 Thread Iñaki Baz Castillo
2014-09-09 10:46 GMT+02:00 Richard Levitte : > And of course, I noticed this email after sending my own... sorry. :) Thanks a lot. -- Iñaki Baz Castillo __ OpenSSL Project http://www.openssl.o

Re: How to empty a BIO buffer?

2014-09-09 Thread Richard Levitte
And of course, I noticed this email after sending my own... sorry. In message on Mon, 8 Sep 2014 18:41:40 +0200, Iñaki Baz Castillo said: ibc> 2014-09-08 18:35 GMT+02:00 Kyle Hamilton : ibc> > The allocated buffer needs to be sizeof(char *). What's happening is the ibc> > address of the buffe

Re: Value of DEFAULT cipher suite

2014-09-09 Thread Benny Baumann
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Hi Rich, Am 09.09.2014 00:42, schrieb Salz, Rich: > We are considering removing weak cryptography from the value of > DEFAULT. That is, append ":!LOW:!EXPORT" > > It is currently defined as this in include/openssl/ssl.h: #define > SSL_DEFAULT_CI

Re: How to empty a BIO buffer?

2014-09-09 Thread Richard Levitte
In message on Mon, 8 Sep 2014 18:19:09 +0200, Iñaki Baz Castillo said: ibc> Why do I need to provide BIO_get_mem_data() with an already allocated ibc> buffer? I've checked the function and I do not understand what it ibc> does). The only I want is to get the pointer to the BIO's buffer in ibc>

Re: Performance related queries for SSL based client server model

2014-09-09 Thread Alok Sharma
Hi,    Thanks all for your update. But functionality wise it is working fine. I can remove the inner loop but that will require packet size to be of 1K. I tried with that also but did not find any improvement in performance. In my setup there are 8 routers between source & destination. Can anyone s

Re: On 2K keys and SHA-256

2014-09-09 Thread Benny Baumann
Hi Rich, Am 08.09.2014 23:59, schrieb Salz, Rich: > We are considering changing the default keysize (RSA, DSA, DH) from 1K > to 2K, and changing the default signing digest from SHA-1 to SHA-256. May I suggest 4096 bit with SHA-256. That way you have a security level of >= 128 bit for both primiti

Re: Why does OpenSSL own all the prefixes in the world?

2014-09-09 Thread Benny Baumann
What about introducing a openssl_deprecated.h which sole purpose is to throw in a bunch of defines that map ERR_old_style_name OPENSSL_ERR_new_style_name. To make an old-style codebase compatiblae the only thing to add would be either including openssl_deprecated.h or set a macro on the command li

Can we have a PyOpenSSL 0.15?

2014-09-09 Thread Eric Chazan
All, My team is considering a port to Python 3 from Python 2.7. One issue we see is that we cant run a flask server with ssl. I am seeing that the fix is in this pull request: https://github.com/pyca/pyopenssl/pull/78/commits Which has already been merged. Is a new version of PyOpenSSL comin

Re: Verifying authenticode signature using openssl API

2014-09-09 Thread Prasad Dabak
Thanks Jacob for an elaborate answer. Somehow I never received your response to my registered email address, hence delay in responding. I have a few follow-up questions on your response. 1. So, "encryptedDigest" has no relation to the stored "messageDigest"? I thought it's a encrypted version