[openssl-users] FIPS 140-2, a game of chance

2015-11-13 Thread Steve Marquess
If you don't know or care what FIPS 140-2 is, trash this message quickly before it harshes your mellow. The "RE" validation, an "Alternative Scenario 1A" clone of the #1747 validation, was approved today (http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm#2473). It was submitted

Re: [openssl-users] ECDHE Negotiation for Client but not Server

2015-11-13 Thread Benn Bollay
Sorted; needed to call SSL_CTX_set_tmp_ecdh with my private EC_KEY. Can someone express an opinion if using my private key is acceptable there, or if I should generate a new one from a named curve each time I create a context? Cheers, --B On Fri, Nov 13, 2015 at 11:21 AM, Benn Bollay wrote: >

Re: [openssl-users] Does openssl server always choose highest TLS version offered?

2015-11-13 Thread Salz, Rich
> Rfc5246 basically says that the server will choose the highest version but I > wanted to confirm that that's what openssl does (just to be certain). That is what openssl does. ___ openssl-users mailing list To unsubscribe: https://mta.openssl.org/mai

[openssl-users] ECDHE Negotiation for Client but not Server

2015-11-13 Thread Benn Bollay
Hi folks - Tested against OpenSSL 1.0.1f and 1.0.1p (but with modifications). I've got some code that creates an SSL_CTX (http://pastebin.com/XveDvvch) that works fine for negotiating ECDHE-* ciphers as a client when talking to an s_server, but fails as a server both when accepting connections fr

Re: [openssl-users] Protecting RSA keys

2015-11-13 Thread Sergio Magra
Hi everybody, I'm new with OpenSSL and I have some questions. The thing is that several RSA key pairs (each one for a different user) will be stored in a shared secured location (Safenet HSM). As the key pairs will be stored in the same place, we are looking

Re: [openssl-users] Removing obsolete crypto from OpenSSL 1.1 - seeking feedback

2015-11-13 Thread Jeffrey Walton
> ALL BINARY ELLIPTIC CURVES This one may be premature. I understand the TLS WG is moving against it. However, I am aware of implementations of Shoup's ECIES, and they, in turn, depend on OpenSSL. I don't know if the ECIES implementations rely solely on prime fields or not, however. > BLOWFISH -

Re: [openssl-users] (2013) : PKCS12 keystore creation failing in fips mode (RT3515)

2015-11-13 Thread Dr. Stephen Henson
On Wed, Nov 11, 2015, jonetsu wrote: > Hello, > > > There is a thread in 2013 (30 May 03:15) in which Steve writes that OpenSSL > 1.0.1 has a bug regarding the use of PKCS12 in FIPS mode since it tries to > handle a certificate using a non-FIPS component.  I think I found the commit > that fi

Re: [openssl-users] [openssl-dev] Removing obsolete crypto from OpenSSL 1.1 - seeking feedback

2015-11-13 Thread Dr. Stephen Henson
On Fri, Nov 13, 2015, Benjamin Kaduk wrote: > > As another thread calls to mind, PKCS#12 could potentially just use > triple-DES. (BTW, the CMS tests fail when openssl is configured with > no-rc2, due to this; I have a WIP patch sitting around.) > The issue is that some cuurent software (inclu

Re: [openssl-users] Removing obsolete crypto from OpenSSL 1.1 - seeking feedback

2015-11-13 Thread Jakob Bohm
On 13/11/2015 18:00, Benjamin Kaduk wrote: On 11/13/2015 09:31 AM, Jakob Bohm wrote: On 13/11/2015 14:40, Emilia Käsper wrote: Hi all, We are considering removing from OpenSSL 1.1 known broken or outdated cryptographic primitives. As you may know the forks have already done this but I'd like

Re: [openssl-users] Removing obsolete crypto from OpenSSL 1.1 - seeking feedback

2015-11-13 Thread Benjamin Kaduk
On 11/13/2015 09:31 AM, Jakob Bohm wrote: > On 13/11/2015 14:40, Emilia Käsper wrote: >> Hi all, >> >> We are considering removing from OpenSSL 1.1 known broken or outdated >> cryptographic primitives. As you may know the forks have already done >> this but I'd like to seek careful feedback for Ope

Re: [openssl-users] How to access a bug fix ?

2015-11-13 Thread Benjamin Kaduk
On 11/13/2015 10:14 AM, jonetsu wrote: > Hello, > > > I would like to see the bug fix for RT3515 'Use 3DES in pkcs12 if built with > no-rc2' although the opnssl tree I got recently does not show it: The bug fix is just the patch contained in the initial submission. > > % git status > On branch

Re: [openssl-users] Elliptic curves approved or recommended by government

2015-11-13 Thread Salz, Rich
> Is there a up to date list of elliptic curves approved or recommended for > government use in OpenSSL? You'll have to look outside OpenSSL for advice like that. I would suggest looking at the CFRG, part of the IETF basically. Do web search for curve recommendations. Good luck. It's a conte

[openssl-users] How to access a bug fix ?

2015-11-13 Thread jonetsu
Hello,  I would like to see the bug fix for RT3515 'Use 3DES in pkcs12 if built with no-rc2' although the opnssl tree I got recently does not show it: % git status On branch master Your branch is up-to-date with 'origin/master'. % git show 92830dc1ca0bb2d12bf05a12ebb798709595fa5a fatal: bad

Re: [openssl-users] Removing obsolete crypto from OpenSSL 1.1 - seeking feedback

2015-11-13 Thread Jakob Bohm
On 13/11/2015 14:40, Emilia Käsper wrote: Hi all, We are considering removing from OpenSSL 1.1 known broken or outdated cryptographic primitives. As you may know the forks have already done this but I'd like to seek careful feedback for OpenSSL first to ensure we won't be breaking any major a

Re: [openssl-users] Converting DER encoded unsigned CSR to internal OpenSSL format

2015-11-13 Thread Peter P.
Hi Wim, I'll give this a shot, thank you for the suggestion! -Peter On Wed, Nov 11, 2015 at 5:05 PM, Wim Lewis wrote: > > On Nov 9, 2015, at 3:46 PM, Peter P. wrote: > > I'm writing an application using Openssl 1.0.2d where I am trying to > take a DER encoded unsigned CSR and read it into an

[openssl-users] Removing obsolete crypto from OpenSSL 1.1 - seeking feedback

2015-11-13 Thread Emilia Käsper
Hi all, We are considering removing from OpenSSL 1.1 known broken or outdated cryptographic primitives. As you may know the forks have already done this but I'd like to seek careful feedback for OpenSSL first to ensure we won't be breaking any major applications. These algorithms are currently ca

Re: [openssl-users] Fwd: Broken ChangeCipherspec record in TLS 1.2 with OpenSSL 1.0.2d?

2015-11-13 Thread hebertpj
Thank you kindly Matt, for the pointers - these connections always end with that renegotiation and subsequent failure - I suspect there is a ciphersuite problem and am following up to see what the client *will* support.Paul H. -- View this message in context: http://openssl.6102.n7.nabble.com/B

Re: [openssl-users] How to get list of TLS protocols supported by OpenSSL?

2015-11-13 Thread Jakob Bohm
On 13/11/2015 10:34, Matt Caswell wrote: On 13/11/15 02:56, pratyush parimal wrote: Hi, I'm writing a client-server program that uses TLS for communication. I'm wondering if there's any way to programmatically find out which TLS protocol versions are supported by the OpenSSL library installed o

Re: [openssl-users] Rehandshake problem

2015-11-13 Thread Ignacio Casal
Hey, this is on fedora 23, though I built openssl 1.0.1k (since it is the version supported on rhel 6) These are the specific test cases that are failing with openssl for us: https://git.gnome.org/browse/glib-networking/tree/tls/tests/connection.c?h=wip/openssl#n1948 https://git.gnome.org/browse/g

Re: [openssl-users] Rehandshake problem

2015-11-13 Thread Matt Caswell
On 13/11/15 08:37, Ignacio Casal wrote: > Hey guys, > > I am having a specific problem that I do not seem to find a solution for. > > - I have a server and a client that handshake properly > - the server will read from the client and the client from the server a > few bytes > - the client will

Re: [openssl-users] How to get list of TLS protocols supported by OpenSSL?

2015-11-13 Thread Matt Caswell
On 13/11/15 02:56, pratyush parimal wrote: > Hi, > > I'm writing a client-server program that uses TLS for communication. > I'm wondering if there's any way to programmatically find out which TLS > protocol versions are supported by the OpenSSL library installed on my > system. > > I'm currentl

[openssl-users] Rehandshake problem

2015-11-13 Thread Ignacio Casal
Hey guys, I am having a specific problem that I do not seem to find a solution for. - I have a server and a client that handshake properly - the server will read from the client and the client from the server a few bytes - the client will try to read again - the server will try to handshake again