Re: CONF_load_bio:missing equal sign

2005-02-23 Thread Charles B Cranston
lich wrote: Charles B Cranston wrote: [...] but perhaps you could name some Windows log file or something. We're way past this in Unix now because many Unix systems have the /dev/random or /dev/urandom devices - and if these are present OpenSSl doesn't need the RANDFILE. Not that I'

Re: CONF_load_bio:missing equal sign

2005-02-23 Thread Charles B Cranston
doing this on a Win2K server (not by my own choice). Jody Harvey -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Charles B Cranston Sent: Wednesday, February 23, 2005 10:11 AM To: openssl-users@openssl.org Subject: Re: CONF_load_bio:missing equal sign

Re: CONF_load_bio:missing equal sign

2005-02-23 Thread Charles B Cranston
From man req (which is available at www.openssl.org) RANDFILE This specifies a filename in which random number seed information is placed and read from, or an EGD socket (see RAND_egd(3)). It is used for private key generation. === On Unix I've used something as simple as (date; du) >randomf

Re: CONF_load_bio:missing equal sign

2005-02-23 Thread Charles B Cranston
AH, that's the problem. Those are not commands for OpenSSL, those are commands for the Apache daemon and go in your apache httpd.conf file. Harvey, Jody wrote: Here is line 28 thur 30 of my ssl.conf SSLRandomSeed startup builtin SSLRandomSeed connect builtin #SSLRandomSeed startup file:/dev/random

Re: CONF_load_bio:missing equal sign

2005-02-23 Thread Charles B Cranston
Sigh. The diagnostic is clearly pointing at line 28 of the ssl.conf file - do you think you could post (some context around) line 28 of your ssl.conf file? Harvey, Jody wrote: I am currently setting up Open SSL on a Windows 2k system. I have followed instructions as closely as possible. My problem

Re: RSA key length and size

2005-02-02 Thread Charles B Cranston
Erik Norgaard wrote: pair (n,e) and the private key can be respresented either as a pair (n,d) or in its Chinese Remainder Theorem form (CRT). The latter should be faster, but only applies for keys with more than two primefactors. Oh, I see, you use CRT to designate the key with the added speedup

Re: RSA key length and size

2005-02-01 Thread Charles B Cranston
Erik Norgaard wrote: Charles B Cranston wrote: Doing it the hard way requires roughly 1.5 times key length number of modular multiplies (assuming about half the bits are ones and half zeroes) so if the shortcutted public key operation takes 17 units of time the non-shortcutted private key

Re: RSA key length and size

2005-02-01 Thread Charles B Cranston
coding a session key for the real data this increase is minimal, but for the kind of embedded computation you're thinking of this can be a real gotcha. Erik Norgaard wrote: Charles B Cranston wrote: You should factor in the RSA speedups in your space estimates. Typically a public exponent of 2

Re: RSA key length and size

2005-02-01 Thread Charles B Cranston
Here's a crazy idea: The computer talking to the Java card rolls a random session key. In the first operation transfer a private key into the device, encrypted by the session key. In the second operation transfer the data to be encrypted and the session key. The Java card can decrypt the private k

Re: RSA key length and size

2005-02-01 Thread Charles B Cranston
You should factor in the RSA speedups in your space estimates. Typically a public exponent of 2^16+1 is used so you need not pass this separately for a public key. However, the speedup for the private key operation involves all those other fields in a private key, which expands the space requireme

Re: Setting startdate + enddate for root certificates?

2005-01-25 Thread Charles B Cranston
I've always used the -days option to set the end date, and never really needed to set the start date - if the start date is in the future you can sequester the certificate until that date arrives (modulo distribution issues). I think I use -days 400 for a one-year cert (one year, one month grace,

Re: Smart cards and private keys

2005-01-20 Thread Charles B Cranston
There are very good reasons NOT to allow extraction of a private key from a crypto device. Investigate the vendor's provisions for either backing up or cloning a device. It is possible that the device will export its private key under some kind of protection (like encryption with some "master key

Re: Certificate Intended Purpose

2005-01-18 Thread Charles B Cranston
One could read in openssl.txt (in the doc directory of the OpenSSL source distribution): === Extended Key Usage. This extensions consists of a list of usages. These can either be object short names of the dotted numerical form of OIDs. While any OID can be used only certain values make sense. In pa

Server side of RSA takes longer

2005-01-11 Thread Charles B Cranston
For example, the public key operation of RSA, which is done at the client (encoding the session key in the server's public key) is very highly optimized by using 0x10001 (1001) as the public exponent; this requires only 16 multiplies and one add. But the server must decrypt the session

Re: The time of the openssl-ciphers is constant?

2005-01-11 Thread Charles B Cranston
If I understand you correctly the time at the server only starts getting bigger proportional to the transfer size when the size of the transfer exceeds some critical value? This is indicative of a fixed portion and a variable portion of the observation, with the fixed portion dominating when the v

Re: Quantum Encryption no protection against man in the middle attack?

2005-01-06 Thread Charles B Cranston
David Schwartz wrote: 2) Streams of entangled particles can generate shared secrets where none previously existed. No, not really, since the scheme described on page 80 of the Jan 2005 Scientific American looks vulnerable to a man-in-the-middle attack. In that case, it generates two shared secret

Re: Quantum Encryption no protection against man in the middle attack?

2005-01-06 Thread Charles B Cranston
David Schwartz wrote: Do you agree that: 1) If there exists a shared secret, quantum encryption can provide protection, now and in the future, against MITM attacks or passive interception. I believe so, now that I've read your description. 2) Streams of entangled particles can gen

Re: Quantum Encryption no protection against man in the middle attack?

2005-01-06 Thread Charles B Cranston
Sorry about all the confusion Dave, the scheme described on page 80 of the January 2005 Scientific American is a key distribution scheme that, at least as far as I can tell from a quick re-read, IS vulnerable to a man-in-the-middle attack. Perhaps there is some defense that was simplified out of th

Re: Quantum Encryption no protection against man in the middle attack?

2005-01-06 Thread Charles B Cranston
David: have had another read of your message of 1/4 and realize I was talking about something different than what you were talking about, hence my confusion. Cannot put my hands on my copy of that Scientific American article, but what you describe at the end of your article seems much stronger tha

Re: Quantum Encryption no protection against man in the middle attack?

2005-01-06 Thread Charles B Cranston
Strangely enough, there actually MIGHT be a good reason to use Quantum Encryption. It's a very subtle point, which I will try to explain succinctly below, but unless you're actually interested you might want to hit the delete key now. 1. Perfect Forward Security I hate to invoke "Perfect Forward S

Re: Quantum Encryption no protection against man in the middle attack?

2005-01-04 Thread Charles B Cranston
David Schwartz wrote: I can split the second case into two parts: If there IS a key AND there are NO quantum computers then the key provides adequate protection No, it doesn't future advances in compution *will* make any given key insecure eventually. Your communications today *will* be known

Re: Quantum Encryption no protection against man in the middle attack?

2005-01-04 Thread Charles B Cranston
Well, I think I agree with everything David said, and given his assumptions I believe he is correct. However, it appears that he did NOT carefully read what I had posted. He is assuming the existance of "the key" (see his first interjection) while my argument was in two parts: If there is NO key

Re: x509 v4

2004-12-22 Thread Charles B Cranston
Having much the same results on my googling -- there is some mention of a PKIPath extension, but I did see a reference to an X509_4thEditionDraftV7.pdf which contains dates roughly simlar to the ones Richard quotes. There was a reference to RFC3281 which talks about attribute certificates, but the

Re: DER public key file structure

2004-12-14 Thread Charles B Cranston
DER is short for ASN.1 Distinguished Encoding Rules. The actual format of certificates and things are standardized by X.500 but these documents are expensive, so the Internet RFC people have reprinted the information in a series of documents. Take a look at ftp://www.ietf.org/rfc/rfc3280.txt pa

Re: CRL question

2004-12-13 Thread Charles B Cranston
CRLs are signed by the CA certificate whose subsidiary certificates are mentioned (or not) in the CRL. So a CRL is verified just like any other signed document. You need any certificates in the chain, which may or may not be supplied along with the CRL, see PKCS#7 format and/or the openssl crl2pk

Re: Certificate revocation REQUEST

2004-12-10 Thread Charles B Cranston
One suggestion is to use a signed email (S/MIME) message to a known robot at the CA that would do whatever is needed. Zerg wrote: Hi all. It is nedeed to send from client to server the request for revoking or holding the client's certificate. My chief want that this request for revocation was sig

Quantum Encryption no protection against man in the middle attack?

2004-12-08 Thread Charles B Cranston
Quantum Cryptography vs the "man-in-the-middle" attack The recent availability of commercial products for quantum cryptography has generated much press attention, however, any putative value-add for these products escapes this author. Given the traditional "man in the middle" attack where Vladimir

Re: data dependence with md5/64-bit RSA?

2004-12-07 Thread Charles B Cranston
What you may be missing is the "data padding" stuff, which makes the encrypted payload somewhat longer than just what you pass off to the encoding routine. IIRC it throws an 8-sided die and prepends to the messate either 01 02 02 03 03 03 ... 08 08 08 08 08 08 08 08 also there may be some length f

Re: Comodo not getting subject from CSR cert

2004-12-07 Thread Charles B Cranston
Suso Banderas wrote: Can anyone respond to this? At least to let me know that I am thinking along the right track? Is there any expectation that the CA should be using the subject from the CSR that the customer sends? I think the "standard model" is that the CA rejects requests until the clien

Re: data dependence with md5/64-bit RSA?

2004-12-07 Thread Charles B Cranston
Jesse Hammons wrote: So to clarify: If I generate a 65-bit key, will I be able to use that 65-bit key to sign any 64-bit value? Yes, but a 65 bit key won't be very secure AT ALL, it will be very easy to factor a modulus that small. Bottom line: asymmetrical (public-key) encryption has a fairly lar

Re: Reverse engineering program protocol under ssl

2004-11-24 Thread Charles B Cranston
different threads. Is the OpenSSL stuff thread-safe? MacDermid, Kenny wrote: From: Charles B Cranston MacDermid, Kenny wrote: I'm looking to locally reverse engineer a network protocol that's encrypted using ssl. Another method would be to use a man-in-the-middle attack on a third machi

Re: serializing certificates

2004-11-24 Thread Charles B Cranston
Seems to me I saw an option to set the serial number from the command line appear in openssl req but it might be recently added (e.g., check to see if the version you are using is too old to have it implemented!). I've been doing the write-even- number-of-hex-digits-to-file since I started, so I

Re: Issues creating Certificate Authority

2004-11-23 Thread Charles B Cranston
It's possible from what you describe that it was a hanging alias, that is, a symbolic link pointing to a file that does not actually exist. This looks like a file initially but gets a "file does not exist" when you try to actually use it... Dan O'Brien wrote: On Nov 22, 2004, at 1:41 PM, Dr. Steph

Re: Reverse engineering program protocol under ssl

2004-11-23 Thread Charles B Cranston
MacDermid, Kenny wrote: I'm looking to locally reverse engineer a network protocol > that's encrypted using ssl. The program runs under windows and > is using ssl dll's. I'm currently trying to work out the easiest solution, and am looking for suggestions. I'm considering either trying to wrap the

Re: Doubt regarding cert-chain validation (fwd)

2004-11-18 Thread Charles B Cranston
I agree -- a lot of the advanced architectures I'm studying have a "trust root" that is NOT self-signed, instead it is signed by another certificate somewhere else. In a different verification paradigm the certificate in question is NOT in fact a trust point but instead is signed by a chain that l

Re: smime certificates

2004-11-16 Thread Charles B Cranston
I'm afraid that this is "just the way it works". Starting from first principles, there's only a few ways a system COULD be coded to work: 1. decrypt all messages as they are received, so the encryption is only for when the message is actually being transmitted 2. decrypt all messages as they are

Re: examples of -extfile file -extensions section

2004-11-10 Thread Charles B Cranston
Could someone be so kind as to post examples of their extfile or extensions section? Here's an example of a shell script that generates an entire PKI: root, two intermediates, and one SSL (server) end user. This is one of about 35 of these I did trying to figure out why the IBM HTTP Server and the

Re: 2 certs on one machine

2004-11-08 Thread Charles B Cranston
AFTER enough information has been presented by the initiator for the responder to know which certificate the initiator is going to expect. Charles B Cranston wrote: I think the complication is that he's going to have to use the virtual hosts stuff so that the correct certificate can be return

Re: 2 certs on one machine

2004-11-08 Thread Charles B Cranston
I think the complication is that he's going to have to use the virtual hosts stuff so that the correct certificate can be returned to each connection, and that this means he's going to have to have two different IP addresses, since there will be no way to determine WHICH certificate to send. This i

Re: Key Encryption

2004-11-05 Thread Charles B Cranston
You are seriously lost. Private keys and public keys (certificates) are USED in performing RSA encryption, but they are not themselves encoded and/or transmitted under RSA encryption. Yes, keys for private-key encryption are sent under public key encryption, but a key for private key encryption i

Re: activity

2004-11-04 Thread Charles B Cranston
Ronan wrote: is this list just not that active or do the people on it honestly not know the answers?? Well, let's consider some OTHER hypotheses: 1. The question is so easy that everybody thinks someone else will answer it. That is, the old hands say "oh, not AGAIN!!!" and are just bone tir

Re: Some OpenSSL certificate and key questions

2004-11-03 Thread Charles B Cranston
a way out of this. What I am trying to do is mutual authentication between a 802.1X Supplicant and the FreeRADIUS Server using EAP-TLS. Most of the HOW-TOs that I have read on the internet for carrying out this task mention that ClientAuth/ServerAuth "Extended Key Usage" MUST b

Re: Some OpenSSL certificate and key questions

2004-11-02 Thread Charles B Cranston
You should probably read chapter 4 of RFC 3280 http://www.ietf.org/rfc/rfc3280 particularly 4.2.1.3 Key Usage and 4.2.1.13 Extended Key Usage Also the text file openssl.txt in the doc directory of the openssl distribution. I don't use CA (I use x509 instead) so maybe that has something to do with t

Re: what is the difference between get and post with ssl?

2004-10-28 Thread Charles B Cranston
Richard Levitte - VMS Whacker wrote: > In message <[EMAIL PROTECTED]> on Thu, 28 Oct 2004 18:10:35 +0800, > 黄志军 <[EMAIL PROTECTED]> said: > hzhijun> i execute the test.html in internet explorer and it return a > hzhijun> correct index1.html page. But if i change the method from > hzhijun> 'get'

Re: more CSR

2004-10-28 Thread Charles B Cranston
Actually you might be confused a little. A CSR is nothing more than a public key bundled with an identity (name). If you already have a CSR you should not also need a public key. If you mean the key to be the private key to a signing CA and the CSR to be for an end-user certificate to be SIGNED b

Re: AW: CSR signing

2004-10-27 Thread Charles B Cranston
The more randomness you put into the random number generator, the better keys you will get. I've been know to use something as simple as (df; date) >RANDFILE the theory being that it is hard to predict the exact amount of free file space on (random date in the past) and that the output of date is

Re: Customer request

2004-10-26 Thread Charles B Cranston
The Doctor wrote: Does anyone here know of such package that uses open source? - Forwarded message from Customer --- 1. Form Content Security. (FormmailEncoder/Decoder) As I understand it, on a secure website the content of a submitted form is protected by SSL from the submitter to the serv

Re: SSL without Key?

2004-10-22 Thread Charles B Cranston
to use to set up the anonymous SSL connection with OpenSSL or point me in the direction of some example code. Thanks, David -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Charles B Cranston Sent: Thursday, October 21, 2004 10:04 PM To: [EMAIL PROTECTED] Su

Re: SSL without Key?

2004-10-21 Thread Charles B Cranston
Peter O Sigurdson wrote: This is great information, Can you point me to a HOWTO or other resource > regarding importing SSL certs into IIS? For the standard model, where you generate the CSR on the server (so the private key stays in the server the whole time) my standard reference is "IIS Securit

Re: SSL without Key?

2004-10-21 Thread Charles B Cranston
I don't think this is correct at all. I use OpenSSL to generate certificates that are used on Microsoft IIS servers and IBM HTTP servers and Novell eDirectory LDAP servers and IBM Directory Server LDAP servers and all sorts of servers. Now, the vendors may not make it EASY to use non-proprietary

Re: Question about extension of a certificate

2004-10-20 Thread Charles B Cranston
The .0, .1 etc suffix is from the way the Apache web server (I guess its SSL module) tries to find certificates in a directory. It hashes the subject name then looks for the certificate under .0 then .1 etc so the digit is used for collisions. I've never seen a .1 and we have a BIG directory. You

Re: Certificate check

2004-10-14 Thread Charles B Cranston
NO! They are NOT the same. Look at the first few bytes: > From the public key: > Modulus (1024 bit): > 00:cb:aa:35:d5:df:19:39:84:81:36:10:02:84:c3: ^^ ^^ ^^ > From the private key: > modulus: > 00:a6:16:30:78:ca:2e:39:27:32:c9:36:c0:16:55: ^^ ^^ ^^ Nope, this key and cert do not match.

Re: OT: Books on PKI and IPsec

2004-10-12 Thread Charles B Cranston
> Can people provide recomendations and other comments on > which books to buy on PKI and IPsec Some books I thought cost-effective, from easiest to hardest: "Applied Cryptography: Protocols, Algorithms, and Souce Code in C" by Bruce Schneier 2nd ed (Wiley 1996) 758 pages of extremely readable r

A more orthodox bridge certificate configuration

2004-10-11 Thread Charles B Cranston
Well, since you didn't like my earlier bridge drawing, there's a more orthodox one below. As for notation: I tend to do a lot of diagrammatic reasoning myself, so I tend to invent notation as I go along. If there is a preferred notation [1] I'd be glad to redo these diagrams in that form. Since a

Certificate fetching for bridge CA configuration

2004-10-07 Thread Charles B Cranston
So, this is perhaps the most simple "bridge" PKI arrangement: +-+---++-+---+ |T| ||T| | +-+---++-+---+ | P Root++

An epiphany (of sorts)

2004-10-05 Thread Charles B Cranston
Just finished a cover-to-cover reading of Planning for PKI [1] and it sure cleared up some things for me. Thanks to Richard Levitte for recommending it. It seems most of the cognitive dissonance I've been having with this PKI stuff is due to the "PKI theoretics" being based upon a pair of assumpti

Re: domain components in certificate dn?

2004-09-24 Thread Charles B Cranston
Gerd Schering wrote: Richard Levitte - VMS Whacker wrote: In message <[EMAIL PROTECTED]> on Fri, 24 Sep 2004 11:29:23 +0200, Gerd Schering <[EMAIL PROTECTED]> said: Schering> is it possible to use domain name components - as in ldap - Schering> for the certificate dn, i.e. something like Scherin

Re: Question about openssl genrsa

2004-09-24 Thread Charles B Cranston
Joppe Bos wrote: Hello everyone, I am fairly new with openssl and am trying to write a function which can make a public / private key pair with GMP (an open source big number library). I am doing this to compare the running time with openssl. I have a few questions regarding the openssl genrsa c

Re: PKI - CA Cross-Cerificate with OpenSSL?

2004-09-23 Thread Charles B Cranston
At the risk of seeming even more confused than usual... There's a lot of theory out there about cross certification and bridges etc, but as far as I can tell it is really all theory, and will REMAIN theory until the various "relying parties", that is, the standard web browsers, can properly process

Re: signedandenveoped + encryption from commandline

2004-09-23 Thread Charles B Cranston
Alok wrote: David C. Partridge wrote: Once generated, it is encrypted using the public key of the recipient and included with the message. but then if i do something like DES(key=hispubkey(data=somerandom)) i can always decrypt if i know hispubkey. NO! Look, Alok, it's painfully obvious that y

Re: how do i use a CRL file to verify a certificate against?

2004-09-21 Thread Charles B Cranston
Jon Bendtsen wrote: i can verify a certificate against a root certificate, with openssl verify -CAfile root.ca rsacert.pem but how do i know that the certificate i try to verify has not been revoked? At the risk of seeming to oversimply a VERY complicated issue: 1. You have been downloading Ce

Re: Extended key usage field

2004-09-15 Thread Charles B Cranston
From RFC3280 section "4.2.1.13 Extended Key Usage" If a certificate contains both a key usage extension and an extended key usage extension, then both extensions MUST be processed independently and the certificate MUST only be used for a purpose consistent with both extensions. If ther

Re: Extended key usage field

2004-09-15 Thread Charles B Cranston
Why questions are particularly difficult to answer. I guess the real answer is: because the programmer who wrote the software in question decided to program it that way. The "critical" bit was intended to be an aid to software upgrade: Suppose you are trying to support a mix of old and new software

Re: Key generation question

2004-09-09 Thread Charles B Cranston
Perhaps one way to think of the IV is that it is part of the key. That is, the IV and key are used to encrypt, and then the (same) IV and the (same) key can decrypt. It's just that if the IV is sent in clear text ("included in the structure...") then it is not secret. One popular algorithm is to u

Re: AW: How to create a certificate silently

2004-09-07 Thread Charles B Cranston
iting C code that calls the library directly, or a Perl module to call the library directly, instead of trying to shoe-horn the existing main programs??? Webmaster wrote: Hello, I also have a little question, with this methode I can also send the passphase of the seckey of the CA?? The basic

Re: How to create a certificate silently

2004-09-03 Thread Charles B Cranston
If you're using Unix or another system that supports the Environment variables, you can write a fixed openssl conf file that references appropriate variables in appropriate places. If you don't have Environment you can still write a custom openssl conf file for each instance of signing. Lule Chen

Re: How to include multiple common names in a single SSL certificate?

2004-08-27 Thread Charles B Cranston
Ralph wrote: Hello list members, I'm trying to set up an Apache 2 based web server for multiple name based virtual hosts. As it is not possible with mod_ssl to have a seperate SSL certificate file for each virtual host... Actually, you can, but they have to have separate IP addresses. (Requiring t

Re: Scanning for Certificate Expiration

2004-08-23 Thread Charles B Cranston
The code to "understand" the notAfter output is fairly simple. You can use either Date::Parse or a kluge using Date::Calc like this: use Date::Calc( qw"Decode_Month Add_Delta_YMDHMS Date_to_Time Date_to_Text Timezone" ); print ($ed=),"\n"; # < This is the output from -enddate: if ( ($m,$d,$

Re: RE : RSA encryption - to encrypt a c structure ??

2004-08-03 Thread Charles B Cranston
One danger with casting a structure as a string is that zero bytes (which can happen due to "slack bits" in the structure) might be interpreted as an end-of-string that would prematurely terminate the data. If you're going to process binary data, look for an API where you specify both a pointer and

Re: What binary data format is used by openssl enc?

2004-08-02 Thread Charles B Cranston
Technically this is true, as DER requires the determinate length encoding options and disallows the indeterminate length ones... Alicia da Conceicao wrote: Hi Steve: Its not ASN1 because the OpenSSL ASN1 code isn't fully streaming and to do so would be a massive undertaking which has so far not at

Re: OT: problems with crypto and ASCII

2004-06-30 Thread Charles B Cranston
There might not BE a definition of getc since it returns an int and the default is to return an int. I searched in /usr/include and /usr/include/sys on one of my Unix machines and it was not explicitly defined... What exactly is the problem you are running into with doing IO on 128-255 characters?

Re: unique code

2004-06-29 Thread Charles B Cranston
om number that the machine is going to base its security on... Michal Hlavac wrote: Charles B Cranston wrote: You could split into two 16-character pieces and then XOR the two pieces against each other. hmmm... but result of substr(hmac, 0, 16) ^ substr(hmac, 16, 16) is not human readable code...

Re: Question on Converting a private key file.

2004-06-24 Thread Charles B Cranston
Well, x509 specifies the representations of crypto objects (like certificates and keys) as sequences of binary bytes [1]. DER [2] is just those binary bytes in a file, while PEM [3] is a way to encode x509 as a sequence of printable characters. So it is entirely possible for a file to be both PEM a

Re: Self-Signed server cert failing verification in Postfix

2004-06-23 Thread Charles B Cranston
I think I understand how I was wrong, most of the stuff I work with negotiates the secure connection immediately, such as web on 443 (https) and ldaps (667?). I see that if there was a reqired interaction before switching over into secure mode (which is TLS rather than SSL?) that it might not be s

Re: Please Don't Shoot....

2004-05-20 Thread Charles B Cranston
You can generate your own certificates with OpenSSL, but you need to either get your root certificate into every piece of "verifying software" (browser), or else get all your users to manually accept each certificate, which greatly reduces security (because, with no way to know any better, they wil

Re: How to log out from an SSL V3 session?

2004-05-17 Thread Charles B Cranston
The web does not use continuous connections. Typically for a web app you do a POST request, passing in data items and getting back the next in the process, but the SSL connection is closed at that point, and another, different, connection is opened the next time you push a button or otherwise int

Re: Securing a CA

2004-04-23 Thread Charles B Cranston
Mark H. Wood wrote: Um, feel free to point me elsewhere, but I'm having trouble visualizing what's being discussed. I keep reading "branched certificate chain", but what I understood from the description is like this: Before:OurRoot ---> Level1 ---> EndUsers After: IdenT

Re: Securing a CA

2004-04-21 Thread Charles B Cranston
Rich Salz wrote: I was envisioning something much simpler. Existing applications that know about the "root" CA work without configuration changes. New applications that need to know about the new "larger" PKI just add the new root to their list of trust anchors. I suppose that's really a bri

Re: Securing a CA

2004-04-21 Thread Charles B Cranston
Actually, it might be as easy as changing the "name" of the root and issuing a new L1 certificate. The branch happens when an unmodified client (which still has the local root installed) needs to decide who has signed the L1 certificate. Its two choices are 1. the local root 2. the "missing link

Re: Securing a CA

2004-04-21 Thread Charles B Cranston
Follow up to previous posting: I did try to do some experimentation in the context of trying to design a clean transition from the root we made in 1998 to the root I made in 2003. I did not have a great deal of success because the browsers I was working with at the time (Netscape 4.7x and IE 4 or

Re: Securing a CA

2004-04-21 Thread Charles B Cranston
Rich Salz wrote: At the risk of being immodest, you might find this column useful: http://webservices.xml.com/pub/a/ws/2003/12/09/salz.html This is a verbatim quote from the text at that URL: > The root will sign the Level 1 CA and then be taken offline. > Anyone who wants to validate any iden

Re: Interoperability with Microsoft CA

2004-04-07 Thread Charles B Cranston
Ron Croonenberg wrote: I tried to get a certificate to work on Windows200 with IIS too. I don't know if this is off topic, but how can I sign a certificate request, created on a windows2000 server. I want to sign the request and create a certificate on a linux machine running openssl then take th

Re: Changing the pass phrase on a CA root key

2004-04-07 Thread Charles B Cranston
Doing it via: openssl rsa -in inca.key.pem -des3 -out outca.key.pem would be preferable since the -des3 would trigger output encryption, and you would be ASKED for the new pass phrase, while using stdin it just gapes at you with no prompt. I was (unsuccessfully) trying to remember the trigger for

Re: default encryption exponent in RSA

2004-04-01 Thread Charles B Cranston
What is the default encryption exponent used in RSA encryption by OpenSSL? Is it e = 2^16 + 1 = 65537? Anybody knows where can I find this default value in the source files? It's actually the Public Exponent field in the certificate, so you would find it in the code that makes new certificates. Ce

Re: compile problem in latest snap shot

2004-04-01 Thread Charles B Cranston
OOPS, sorry, it is a C++ reserved word even though it is not a C reserved word, and I guess it would be a Good Idea for OpenSSL to be callable from C++ as it used to be... Charles B Cranston wrote: We cannot find "explicit" as a reserved word in a (fairly old) ANSI C book. Is th

Re: compile problem in latest snap shot

2004-04-01 Thread Charles B Cranston
We cannot find "explicit" as a reserved word in a (fairly old) ANSI C book. Is this the GNU compiler or a vendor compiler? Could this be a vendor-specific extension? Is there a compiler command line switch to remove vendor-specific extensions? Would the GNU compiler work better anyway? Just grab

Re: Recommended x509v3 Extensions

2004-03-31 Thread Charles B Cranston
With reference to Charles' comments, I still have the > luxury of time before having to issue certs in anger. With us it was not time, per se, if you notice the postings for our CA we had our first signing party in February of the year that our 5-year 1998 previous root expired in August. So that'

Re: Hashed Directory format

2004-03-30 Thread Charles B Cranston
I hadn't come across a hashed directory before and, having read the relevant sections in the OpenSSL documentation (openssl -verify and x509 -hash), I must admit it still doesn't make an awful lot of sense to me. I am working on Windows so perhaps that is the cause of the problem (amongst many othe

Re: Montgomery constants

2004-03-10 Thread Charles B Cranston
Dr. Stephen Henson wrote: The [sic] look like the standard CRT components. So: a = iqmp c = dmp1 f = dmq1 And, in fact, if you look at the PNG's in the posting, "iqmp"Inverse of Q mod P a = Q^-1 mod P "dmp1"D mod prime 1 c = Ks mod (P-1) "dmp2"D mod prime 2

Re: Montgomery constants

2004-03-10 Thread Charles B Cranston
Pardon my ignorance, but I don't know the "canonical" variable name assignments, so "a, c, and f" mean nothing to me. I did a simple google and found this paper which describes Montgomery's method, including a version in MIPS 64 assembly language. Perhaps this will help you get better oriented: h

Re: How to convert internal ASN1_INTEGER into little endian content octets

2004-02-11 Thread Charles B Cranston
However, still I don't see any reason why this function increments its second argument ? And why to the first byte after the DER-encoded INTEGER (it's out of preallocated memory) ? The usual reason for building library routines that bump an output pointer is to be able to use them in a chained fa

Re: variable command line options

2004-02-04 Thread Charles B Cranston
prefab wrote: I had the same question for subjectAltName=otherName:1.3.6.1.4.1.311.20.2.3;UTF8:(copy emailAddress) In Windows the environment variable replacement only works if you set the variable before calling openssl for signing the request: set [EMAIL PROTECTED] openssl x509 -req ... Does any

Re: Sign PIX certificate using OpenSSL CA

2003-12-16 Thread Charles B Cranston
I dunno, I'm only about halfway through the Vesperman CVS book, but when I used google to find openca and tried to find the openca/openscep stuff I found that the HEAD version had been removed from the archive, and that the versions in .attic (:-) were merely half-page stubs. Maybe I was at the wro

Re: Sign PIX certificate using OpenSSL CA

2003-12-16 Thread Charles B Cranston
:-) If somebody else is actively working on this, please warn me off... Jon Barber wrote: Charles B Cranston wrote: Sorry for my ignorance, could you post a reference to SCEP? What would it take to manhandle a standard certificate into this format? Or is it a lot more difficult than that? SCEP is

Re: Sign PIX certificate using OpenSSL CA

2003-12-16 Thread Charles B Cranston
Sorry for my ignorance, could you post a reference to SCEP? What would it take to manhandle a standard certificate into this format? Or is it a lot more difficult than that? Jon Barber wrote: [EMAIL PROTECTED] wrote: I'm assuming you mean a Pix Firewall version 6.3.x. I don't think there is a w

Re: Zero length certificates

2003-12-04 Thread Charles B Cranston
stigate in my copious free time... Charles B Cranston wrote: I don't recall why this code uses a temp file for the serial number instead of using another pipe. # Make serial number as even-number-of-digits hex string and write file my $hex = sprintf("%lX",$serial);# Co

Re: Zero length certificates

2003-12-04 Thread Charles B Cranston
Dr. Stephen Henson wrote: > You should where possible use the command line switches > rather than "expect" because the prompts of the various > commands may change. > You can generate requests via template configuration > files and there are various ways to supply passphrases. While I agree 100% w

Re: Zero length certificates

2003-12-04 Thread Charles B Cranston
Best I can tell from looking at the code, the failure is somewhere in this block (which I have edited a bit for readability): # Convert the signed cert to a pkcs12 certificate # so Netscape and IE can import. (and clean up some files) `rm -f "./temp/$input{'email'}.pem"`; `cat ./temp/$in

Re: Installing the cert

2003-11-26 Thread Charles B Cranston
Well, it might be easier to answer this question if we knew what you were trying to install the certificate into. For the Apache server the certificate and private key are placed into filesystem files which are then named in the configuration files. The installation instructions vary for other pr

Re: Certificate and key pair generation for SSL applications

2003-11-10 Thread Charles B Cranston
Sreedhara M. Reddy wrote: Hi, Can someone guide me how to generate certificate and key > pairs for client authentification in SSL applications. First, are you really sure that this is what you want to do? The problem with client certificates is that they tie the client down to a specific workstat

  1   2   >