Re: which cipher was chosen?

2014-11-21 Thread Chris Bare
Thanks, that's just what I needed. By performance I mean the initial connection speed. It spends 4-5 seconds in ssl3_send_client_key_exchange () in the slow case, vs about 0.1 sec in the fast case. This is on a 200Mhz arm, so it's not a fast machine. On Fri, Nov 21, 2014 at 7:03 PM, Dr. Stephen H

Re: which cipher was chosen?

2014-11-21 Thread Dr. Stephen Henson
On Fri, Nov 21, 2014, Chris Bare wrote: > Is there a way to query the BIO or SSL object to see which cipher is being > used? > I have a case where my openssl client's performance is significantly slower > when talking to server A vs server B. AFAIK, the only difference between A > and B is the lev

which cipher was chosen?

2014-11-21 Thread Chris Bare
Is there a way to query the BIO or SSL object to see which cipher is being used? I have a case where my openssl client's performance is significantly slower when talking to server A vs server B. AFAIK, the only difference between A and B is the level of Windows updates, so I'm suspicious that Windo

RE: Small memory leak on multithreaded server

2014-11-21 Thread Barbe, Charles
I did a search through my application code and see no occurrence of the string X509_STORE so I don't believe I'm doing any operations with that type of structure. I am using SSL_CTX_use_certificate and was possibly under the incorrect assumption that my code did not have to explicitly free the

Re: Small memory leak on multithreaded server

2014-11-21 Thread Viktor Dukhovni
On Fri, Nov 21, 2014 at 04:13:58PM -0500, Jeffrey Walton wrote: > > A fixed amount of memory that is not deallocated and is independent > > of the number of operations performed, is NOT a memory leak. > > Languages like Java and C# can continuously load and unload a library. > You will see a growth

RE: SSL alert number 51

2014-11-21 Thread Charles Mills
To set the record straight, I am told that a PTF (IBMese for patch) is required for z/OS V1R13 to support TLS v1.2. Charles -Original Message- From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] On Behalf Of Charles Mills Sent: Friday, November 21, 2014 12:07 PM

Re: Small memory leak on multithreaded server

2014-11-21 Thread Jeffrey Walton
> A fixed amount of memory that is not deallocated and is independent > of the number of operations performed, is NOT a memory leak. Languages like Java and C# can continuously load and unload a library. You will see a growth in memory usage because the memory is not reclaimed. > Librariers to all

Re: CVE-0224-2014 CCS byte

2014-11-21 Thread Dr. Stephen Henson
On Sat, Nov 22, 2014, Deepak wrote: > Hi, > > Can a SSL client upgraded with patch for CVE-0224-2014 (say OpenSSL > 0.9.8zb) talk to SSL server which does not have this patch (say OpenSSL > 0.9.8u) ? > > Problem I have - > > Server -Apache 2.2.22 with mod_ssl compiled with OpenSSL 0.9.8u > > C

RE: SSL alert number 51

2014-11-21 Thread Charles Mills
Thanks guys for all of the clues! I got it working! Long story. Wow, FIPS is a moving target. I re-did my root CA with SHA 256, and my server certificate. I had to move my testing from z/OS V1R13 to z/OS V2R1 -- *apparently* V1R13 does not support TLS V1.2 which as you intimated at some point may b

CVE-0224-2014 CCS byte

2014-11-21 Thread Deepak
Hi, Can a SSL client upgraded with patch for CVE-0224-2014 (say OpenSSL 0.9.8zb) talk to SSL server which does not have this patch (say OpenSSL 0.9.8u) ? Problem I have - Server -Apache 2.2.22 with mod_ssl compiled with OpenSSL 0.9.8u Client - privately maintained PKI code based upon OpenSSL 0.

Re: SSL alert number 51

2014-11-21 Thread Dr. Stephen Henson
On Fri, Nov 21, 2014, Charles Mills wrote: > Thanks. I guess I may have to open a problem with IBM. The IBM documentation > clearly lists a number of "cipher suites" (at they call them) that use SHA1 > (including the one we (IBM+OpenSSL) default to as being FIPS 140-2 > compliant. > > GSK appears

Re: Small memory leak on multithreaded server

2014-11-21 Thread Dr. Stephen Henson
On Fri, Nov 21, 2014, Barbe, Charles wrote: > Yes... sorry, forgot to include this part of my shutdown sequence. One thing > I am noticing is that I do not call X409_free on my certs. I even have a > comment in my code saying that I am not freeing them because I think they > will be freed when the

RE: Small memory leak on multithreaded server

2014-11-21 Thread Barbe, Charles
Yes... sorry, forgot to include this part of my shutdown sequence. One thing I am noticing is that I do not call X409_free on my certs. I even have a comment in my code saying that I am not freeing them because I think they will be freed when the SSL_CTX is freed. Is that a correct assumption or

RE: SSL alert number 51

2014-11-21 Thread Charles Mills
Thanks. I guess I may have to open a problem with IBM. The IBM documentation clearly lists a number of "cipher suites" (at they call them) that use SHA1 (including the one we (IBM+OpenSSL) default to as being FIPS 140-2 compliant. GSK appears to only support SHA1 and MD5, and MD4 is pretty clearly

Re: Small memory leak on multithreaded server

2014-11-21 Thread Dr. Stephen Henson
On Fri, Nov 21, 2014, Barbe, Charles wrote: > Thanks for the response... here is the code that runs when my connection > closes: > > void OpensslConnection::cleanup() > { > if(ssl != NULL) > { > if(isConnected) > { > while(SSL_shutdown(ssl) == 0) >

Re: SSL alert number 51

2014-11-21 Thread Dr. Stephen Henson
On Fri, Nov 21, 2014, Matt Caswell wrote: > > > On 21/11/14 14:43, Charles Mills wrote: > > I posted the certificates. What's next? > > > > Charles > > The key sizes look ok to me. As I said I'm no FIPS expert, but this page > http://wiki.openssl.org/index.php/FIPS_mode_and_TLS > > says the f

Re: Differences between openssl-fips-2.0.7 and 2.0.8

2014-11-21 Thread Steve Marquess
On 11/19/2014 10:03 AM, Philip Bellino wrote: > Hello, > I am currently using openssl-fips-2.0.7 and I noticed that 2.0.8 is available > on the website. > Neither distribution contain a changelog, so I was wondering what changes > were made to 2.0.8. > Thanks, > Phil The relevant differences cam

Re: Where to download OpenSSL FIPS v2.0.9

2014-11-21 Thread Steve Marquess
On 11/18/2014 06:57 PM, Rob Jerdonek wrote: > I see on the NIST website that OpenSSL FIPS module v2.0.9 is in the process > of FIPS validation. > > Where can I download the latest v2.0.9 source code and the updated FIPS user > guide. > > I would like to test with this new version. Sorry about

Re: Small memory leak on multithreaded server

2014-11-21 Thread Viktor Dukhovni
On Fri, Nov 21, 2014 at 03:21:47PM +, Barbe, Charles wrote: > What looks suspicious to me is the calls to "x509v3_cache_extensions" > that are in the traces below. This implies to me that openssl is > caching something. How do I ask it to clear that cache? If i need > to augment the library to

RE: Small memory leak on multithreaded server

2014-11-21 Thread Barbe, Charles
It sort of makes sense that this is a stack of certs that is left over but what confuses me is that this memory is allocated by calls executed as a result of my calling SSL_accept(ssl). Also, we're talking 253 bytes... i would imagine that stack of certs would be larger than that, wouldn't it? A

Re: SSL alert number 51

2014-11-21 Thread Matt Caswell
On 21/11/14 14:43, Charles Mills wrote: > I posted the certificates. What's next? > > Charles The key sizes look ok to me. As I said I'm no FIPS expert, but this page http://wiki.openssl.org/index.php/FIPS_mode_and_TLS says the following: "The RSA key in the certificate has to be of suitable s

Re: Small memory leak on multithreaded server

2014-11-21 Thread Jakob Bohm
On 21/11/2014 15:26, Barbe, Charles wrote: Thanks for the response... here is the code that runs when my connection closes: void OpensslConnection::cleanup() { if(ssl != NULL) { if(isConnected) { while(SSL_shutdown(ssl) == 0) ;

Re: Small memory leak on multithreaded server

2014-11-21 Thread Viktor Dukhovni
On Fri, Nov 21, 2014 at 02:26:45PM +, Barbe, Charles wrote: > static void > openSslShutdown () > { You could try adding: ENGINE_cleanup(); if that helps. > CONF_modules_free(); > ERR_remove_state(0); > CONF_modules_unload(1); > ERR_free_strings(); > EVP_cl

RE: SSL alert number 51

2014-11-21 Thread Charles Mills
I posted the certificates. What's next? Charles -Original Message- From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] On Behalf Of Matt Caswell Sent: Wednesday, November 19, 2014 3:35 PM To: openssl-users@openssl.org Subject: Re: SSL alert number 51 On 19/11

RE: What version(s) of SSL/TLS are supported in openssl 1.0.1g

2014-11-21 Thread Hasan, Rezaul (NSN - US/Arlington Heights)
Thank You for the prompt and insightful response Jeffrey :-) -Original Message- From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] On Behalf Of ext Jeffrey Walton Sent: Thursday, November 20, 2014 1:09 PM To: OpenSSL Users List Subject: Re: What version(s) of

RE: Small memory leak on multithreaded server

2014-11-21 Thread Barbe, Charles
Thanks for the response... here is the code that runs when my connection closes: void OpensslConnection::cleanup() { if(ssl != NULL) { if(isConnected) { while(SSL_shutdown(ssl) == 0) ; } SSL_free(ssl); ERR_remove_s

RE: Small memory leak on multithreaded server

2014-11-21 Thread Barbe, Charles
I see your point but I cannot have memory allocated when my application shuts down. This constraint is related to the fact that this is an embedded VoIP system. Thanks for the response! Charles A. Barbe Senior Software Engineer Allworx, a Windstream company 245 East Main St | Rochester NY | 146