Re: Performance related queries for SSL based client server model

2014-09-09 Thread Alok Sharma
yone share me sample SSL based client server programme which I could use to measure performance. Regards, Alok On Tue, Sep 9, 2014 at 3:54 AM, Iñaki Baz Castillo wrote: > > 2014-09-08 19:46 GMT+02:00 Alok Sharma : > > One thing I observerd by looking into scp > > code that it doe

Re: Performance related queries for SSL based client server model

2014-09-08 Thread Alok Sharma
; int client = accept(server, (struct sockaddr*)&addr, &len); /* accept connection as usual */ printf("Connection: %s:%d\n",inet_ntoa(addr.sin_addr), ntohs(addr.sin_port)); ssl = SSL_new(ctx); /* get new SSL state with context */ SSL_set

Performance related queries for SSL based client server model

2014-09-07 Thread Alok Sharma
an alternative way to use open ssl read or write to improve performance. I searched in scp code and found it does not use SSL_read/SSL_write. So if there is another set of APIs which I can use or any idea how I can meet the same performance as scp. Regards, Alok

Re: Fwd: How to tweak openSSL vulnerabilities CVE-2013-0169

2013-11-18 Thread Alok Sharma
Hi Steve, I am also seeing AES along with GCM and RC4 in my search if I disable CBC. So can it guarantee that still client and server can communicate. Also if I use both end points as having same version of openssl than also there can be any problem. Regards, Alok On Tue, Nov 12, 2013 at 8

How CBC based ciphers can be disabled from openssl

2013-11-15 Thread Alok Sharma
Hi, I am using 0.9.8.s openssl and due to some limitation I cann't upgrade to latest versions to tackle CVE-201300169. So is there any easy process to disable CBC based ciphers. Also is there a way to know which ciphers client and servers are using? Regards, Alok

Re: Fwd: How to tweak openSSL vulnerabilities CVE-2013-0169

2013-11-14 Thread Alok Sharma
Hi Steve, Thanks for reply. Do you have idea how CBC ciphers can be disabled? Regards, Alok On Tue, Nov 12, 2013 at 8:23 PM, Dr. Stephen Henson wrote: > On Tue, Nov 12, 2013, Alok Sharma wrote: > > > One of the openSSL vulnerabilities is: > > > > CVE-2013-0169: &g

Fwd: How to tweak openSSL vulnerabilities CVE-2013-0169

2013-11-11 Thread Alok Sharma
1.0.0k or 0.9.8y we use DTLS 1.0 protocol. Does anyone know of any setting in openssl configuration that can be tweaked to mitigate this vulnerability? E.g. a setting to not allow use of algorithms with CBC etc.? Regards, Alok

Re: Issue With continous PRNG test with Fips module of openssl

2011-09-26 Thread alok sharma
Hi, Thanks for the help, it resolved my problem. Regards, Alok On Fri, Sep 23, 2011 at 5:59 PM, Dr. Stephen Henson wrote: > On Fri, Sep 23, 2011, alok sharma wrote: > > > Hi, > > Ok I got your point. I think it will be helpful.Do you have any link > or > > pr

Re: Issue With continous PRNG test with Fips module of openssl

2011-09-23 Thread alok sharma
Hi, Ok I got your point. I think it will be helpful.Do you have any link or precedure to setup these call backs or these are just function pointers which needs to be initialized at ssl initialization time. Regards, Alok On Fri, Sep 23, 2011 at 5:22 PM, Dr. Stephen Henson wrote: > On

Re: Issue With continous PRNG test with Fips module of openssl

2011-09-23 Thread alok sharma
case it holds lock for around 5-6 mins. Regards, Alok On Fri, Sep 23, 2011 at 5:04 PM, Dr. Stephen Henson wrote: > On Fri, Sep 23, 2011, alok sharma wrote: > > > I am using the openssl fips version for my application.So, I have not > made > > any change in openssl or Fips cod

Re: Issue With continous PRNG test with Fips module of openssl

2011-09-23 Thread alok sharma
same { RANDerr(RAND_F_FIPS_RAND,RAND_R_PRNG_STUCK); ctx->error = 1; fips_set_selftest_fail(); return 0; } } memcpy(ctx->last, R, AES_BLOCK_LENGTH); Regards, Alok On Fri, Sep 23, 201

Re: Issue With continous PRNG test with Fips module of openssl

2011-09-23 Thread alok sharma
Hi, So is there any method on Windows to generate non-predictable randomnumbers. I think mostly FileSytem time is used to seed randomness which is failing in my case. Regards, Alok On Mon, Sep 19, 2011 at 4:52 PM, Dr. Stephen Henson wrote: > On Mon, Sep 19, 2011, alok sharma wrote: >

Re: Issue With continous PRNG test with Fips module of openssl

2011-09-18 Thread alok sharma
generated for current as well as for last request. Is there any provision inside Openssl which ensures that unique randon numbers will be generated or application need to add some delay for each new connection request. Regards, Alok On Thu, Sep 15, 2011 at 6:02 PM, Jakob Bohm wrote: > On 9/14/2

Issue With continous PRNG test with Fips module of openssl

2011-09-14 Thread alok sharma
= (unsigned char) ((ft.dwLowDateTime >> 16) & 0xff); buf[7] = (unsigned char) ((ft.dwLowDateTime >> 24) & 0xff); . . Please help in this regard. I am using openssl version 0.9.8o. Regards, Alok

Query regarding pseudo number generation error in OpenSSL

2011-08-26 Thread alok sharma
Hi, I am using openssl to one of my application. The application has support of multithreading and runs on Windows platform. This application uses openssl 0.9.8.0 version and has support of fips. The application listens on a particular port and for each new connection it creates a separate t

Query regarding pseudo number generation error in OpenSSL

2011-08-25 Thread Sharma, Alok
any known issues in openssl? Is there any way to avoid such kind of issue? Regards, Alok

RE: Ignorant of SSL: I have a dumb question

2005-12-04 Thread alok
Try saying that to a web banking manager :-) From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of lwoods (sent by Nabble.com) Sent: Saturday, December 03, 2005 10:22 AM To: openssl-users@openssl.org Subject: Ignorant of SSL: I have a dumb questio

question on ways to read encrypted stream

2005-09-13 Thread Alok
turn, I can read from the file?   -thanks Alok

Re: need function to get cube root

2005-08-07 Thread Alok
try using the log value? - Original Message - From: "Victor Duchovni" <[EMAIL PROTECTED]> To: Sent: Sunday, August 07, 2005 6:56 AM Subject: Re: need function to get cube root > On Sat, Aug 06, 2005 at 05:36:52PM -0700, Anirban Banerjee wrote: > > > Can someone please let me have a poi

Re: BIOs

2005-07-04 Thread alok
Jagannadha Bhattu wrote: Hi, I am new to SSL and want to know more about BIOs. Is there a tutorial on how to use and on their uses. Thanks JB __ OpenSSL Project http://www.openssl.org User Suppo

Re: simple question again

2005-05-23 Thread alok
Joshua Juran wrote: On May 19, 2005, at 4:03 PM, Miles Bradford wrote: So when you send the CSR including the Public Key - you would send them the (your) Private Key, also? Then they sign it with a Private Key they've created? and send it back? You don't give away your private key to anybo

Re: simple question again

2005-05-19 Thread alok
Hello :( As usual trolling.. The particular pages or components retrieved over the SSL link (the one retrieved through URLs beginning with 'https'), will be sent over encrypted links. In addition, the endpoint will be validated. So that if you retrieve 'https://www.amazon.com/anything/goes/

Re: Using Unix Domain Sockets?

2005-04-04 Thread alok
Hi, Joshua Juran wrote: On Apr 1, 2005, at 4:37 AM, alok wrote: Can someone exactly explain why one cannot typecast a bio( ) to a UNIX domain socket/IPC/fd? I'll give this a shot. Unix allows you to read() to and write() from stream-like objects such as files, pipes, character devices

Re: Using Unix Domain Sockets?

2005-04-01 Thread alok
Can someone exactly explain why one cannot typecast a bio( ) to a UNIX domain socket/IPC/fd? -thanks Richard Levitte - VMS Whacker wrote: In message <[EMAIL PROTECTED]> on Wed, 30 Mar 2005 16:51:37 -0800, David Brock <[EMAIL PROTECTED]> said: dbrock-openssl> I'm fairly new to openSSL so forgive

Re: The breaking of SHA1

2005-03-15 Thread alok
Hi Brian, Brian Hurt wrote: Lecture warning. On Mon, 14 Mar 2005, alok wrote: Yeah, you need large key sizes- 128 bits keys just aren't enough (they allow birthday attacks to be computationally feasible). But I note that all the AES finalists went to 256 bit key sizes. This would

Re: The breaking of SHA1

2005-03-14 Thread alok
Yeah, you need large key sizes- 128 bits keys just aren't enough (they allow birthday attacks to be computationally feasible). But I note that all the AES finalists went to 256 bit key sizes. This would put a birthday attack at about 128 bits of complexity- sufficient. Anything less than about

Re: The breaking of SHA1

2005-03-14 Thread alok
Personally, I'd like to see OpenSSL start using private key crypto as hashing functions. The reason that work on dedicated hashing algorithms kinda died off after MD[45]/SHA* came out was that people figured out that they were the equivelent of private key encryption. IIRC, you can turn any pr

Re: The breaking of SHA1

2005-03-14 Thread alok
I doubt many people would actually use it if they know it can be easily broken.. Like someone said on the list "hey everyone uses it, it must be secure" is the mental genere. -A Ted Mittelstaedt wrote: -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of Tho

[OT]looking for someone

2005-03-01 Thread Alok
.Who has enough time, "no patience" and is inquisitive and irritated enough to work "backwards" on symmetric encryption algorithms Please unicast your replies. -thanks Alok __

Re: Even CA's make mistakes..

2005-01-20 Thread Alok
> >> > > > >ok per block, it is still "a function (on a set) = output" > > > > > Sorry, I don't understand your analogy with rubik's cube (most possibly > because that's just not the way my brain's working... ;)) :o) > > A block cypher has a defined output for a defined input, so if you > encode

Re: Even CA's make mistakes..

2005-01-20 Thread Alok
computing power. > The only variables are how much sample data and computing power you need. > hmm..thanks, will look into it. -Alok > > Andrew > > > Alok wrote: > > Maybe am a bit off my head > > > > but given a rubik cube, and a fixed axes of orientation def

Re: Even CA's make mistakes..

2005-01-20 Thread Alok
sounds stupid though.. -thanks Alok - Original Message - From: "Bernhard Froehlich" <[EMAIL PROTECTED]> To: Sent: Wednesday, January 19, 2005 6:10 AM Subject: Re: Even CA's make mistakes.. > Alok wrote: > > > [...] > > > >lets take PKI out

Re: Even CA's make mistakes..

2005-01-19 Thread Alok
> * Alok wrote: > > > A bit off the thread... > > Ever wondered if one can break PKI given that the 1st request to a server is > > mostly GET / in https? > > The "GET /HTTP/1.0" is done using a symetric cipher like RC2 or RC4 etc. > The PKI is onl

Re: Even CA's make mistakes..

2005-01-19 Thread Alok
A bit off the thread... Ever wondered if one can break PKI given that the 1st request to a server is mostly GET / in https? Any ideas? - Original Message - From: "Shaun Lipscombe" <[EMAIL PROTECTED]> To: Sent: Wednesday, January 19, 2005 4:57 AM Subject: Even CA's make mistakes.. > In

Re: Does a root CA need two certificates?

2005-01-19 Thread Alok
SA is used/needed to sign the certificates. One of the keys is probably what the browser has and the other is the key used to sign the webserver's digital cert generated from the csr. -hth Alok - Original Message - From: "R. Markham" <[EMAIL PROTECTED]> To: Sent: Wedn

Re: Does a root CA need two certificates?

2005-01-19 Thread Alok
But how do you guarantee that the web server is "who he says he is"? Iin theory, an ISP could, hack up a DNS to point to my local server. What verifies that the machine I am connecting to is indeed that machine which it claims to be? - Original Message - From: "R. Markham" <[EMAIL PROTECT

Re: signedandenveoped + encryption from commandline

2004-09-23 Thread Alok
Painter, Philip wrote: I don't think you're wrong there Alok. The E(KDE)PUBK is A random Des key taken as _data_ and encrypted asymmetrically With the recipient's public key. Only the recipient will be Able to decrypt it, with her private key. what do you mean by encrypted assy

Re: signedandenveoped + encryption from commandline

2004-09-23 Thread Alok
Not at all, there's no man in the middle issue at all because the certificates which are issued by a trusted TP g'tee the ownership of the public key. The logic goes like this: You generate a random DES key known only to you. Let's call this KDE You use this to encrypt the data. Lets call this E

Re: signedandenveoped + encryption from commandline

2004-09-23 Thread Alok
David C. Partridge wrote: The "one shot" symmetric key is purely random. how? No it's not a function of anyone's private or public key. then it is open to man in the middle Once generated, it is encrypted using the public key of the recipient and included with the message. but then if i do s

Re: signedandenveoped + encryption from commandline

2004-09-23 Thread Alok
Thanks, something I would appreciate if you could clarify: David C. Partridge wrote: Not correct. You sign the message with YOUR private key. The signature is verified by the recipient using your certificate which is issued by a CA. agreed, If you are also enveloping, then the data is encrypte

Re: signedandenveoped + encryption from commandline

2004-09-23 Thread Alok
El hallabi-Kettani Abderrahmane wrote: --- Alok <[EMAIL PROTECTED]> a écrit : I think there is a reason why you cant encrypt a message without 1st signing it using smime By your logic, any preshared "key" would do the trick , why bother with the cert ? (in other words, hisce

Re: signedandenveoped + encryption from commandline

2004-09-23 Thread Alok
with certs)?? El hallabi-Kettani Abderrahmane wrote: --- Alok <[EMAIL PROTECTED]> a écrit : But when you sing with your public key, and encrypt with your public key, how will he decrypt it if he does not have your private key? you sign with the private key existed in mycert.pem or in

Re: signedandenveoped + encryption from commandline

2004-09-22 Thread Alok
Abderrahmane wrote: --- Alok <[EMAIL PROTECTED]> a écrit : sorry, i meant the key corresponding to mycert.pem you sign with the private key wich corresponds to mycert.pem, but you can also encrypt the data with the public key wich corresponds to the same private key in mycert.pem b

SSL API to decode dumped data

2004-08-23 Thread Alok
into which I can feed this data and get something out. Will just the sever side APIs and feeding the data into the ctx for the same suffice? Alok __ OpenSSL Project http://www.openssl.org User Support