RE: normal vs openssl sockets

2004-01-26 Thread Fred Crable
, you still need WinSock and socket()/accept() calls. See the BIO_new_socket man page. Regards, Fred Crable > -Original Message- > From: Darren McDonald [mailto:[EMAIL PROTECTED] > Sent: Thursday, January 22, 2004 9:38 AM > To: [EMAIL PROTECTED] > Subject: Re: normal vs

RE: SOME BACIS INFORMATION ABOUT OPENSSL (PLZ SEND IT) -Rushi

2004-01-12 Thread Fred Crable
I've found these examples very helpful in getting started & doing the basics. http://www.rtfm.com/openssl-examples/ Regards, Fred > -Original Message- > From: rushikesh joshi [mailto:[EMAIL PROTECTED] > Sent: Monday, January 12, 2004 7:15 AM > To: [EMAIL PROTECTED] > Subject: Re: SOME BAC

RE: Kerberos support?

2004-01-08 Thread Fred Crable
just for kicks and it compiled w/o any complaints and w/o defining the NO_KRB5!? Perhaps I'll recompile openssl on the target RedHat Enterprise 2.4. Thanks again for the help. Regards, Fred Crable > -Original Message- > From: Jeff Fulmer [mailto:[EMAIL PROTECTED] > Sent

RE: Kerberos support?

2004-01-08 Thread Fred Crable
#x27;t compile unless /usr/kerberos/include > is added to > -I. I got around this by compiling without kerkeros support: > > -DOPENSSL_NO_KRB5 > > Cheers, > Jeff > > On Thu, Jan 08, 2004 at 12:19:45PM -0600, Fred Crable wrote: > > I may be a little off-topic, but

RE: Kerberos support?

2004-01-08 Thread Fred Crable
Actually I've got it down to one final symbol using -lkrb5 -lk5crypto and -lkdb5. /usr/kerberos/lib/libkrb5.a(kdb5_err.o)(.text+0x1b): In function `initialize_kdb5_error_table': : undefined reference to `_et_list' > -Original Message- > From: Fred Crable > Se

RE: Kerberos support?

2004-01-08 Thread Fred Crable
m_seed' /usr/kerberos/lib/libkrb5.a(init_ctx.o)(.text+0x3d4): In function `krb5_set_default_in_tkt_ktypes': : undefined reference to `valid_enctype' Thank You, Fred Crable > -Original Message- > From: Jeff Fulmer [mailto:[EMAIL PROTECTED] > Sent: Thursday, January

RE: 0.9.7c Vulnerability??

2003-12-29 Thread Fred Crable
It may seem like a long shot, but do you have any "CGI" scripts which allow a binary file transfer. It looks like you may have a CGI script running as root and getting exploited that way. Verify all the "script" entries in your Apache configuration. Regards, Fred Crable -

RE: OpenSSL 0.9.7a - Small (585 byte) memory leak

2003-12-12 Thread Fred Crable
elp. If you think of anything else, let me know. :) -Anthony Fred Crable wrote: > FYI - Here's my shutdown w/o any leaks... Hope this helps... make sure to check the > SSL_shutdown completes, free the context & ssl pointers ;) > > void http::disco(){ > int shu

RE: OpenSSL 0.9.7a - Small (585 byte) memory leak

2003-12-12 Thread Fred Crable
ose(m_fd); m_fd= -1; ERR_free_strings(); ERR_remove_state(0); EVP_cleanup(); CRYPTO_cleanup_all_ex_data(); } -Original Message- From: Fred Crable Sent: Friday, December 12, 2003 10:55 AM To: '[EMAIL PROTECTED]' Subject: RE: OpenSSL 0.9.7a - Small (585 byte) memo

RE: OpenSSL 0.9.7a - Small (585 byte) memory leak

2003-12-12 Thread Fred Crable
n shutdown(): ERR_free_strings(); for_each(_threadIdCache.begin(), _threadIdCache.end(), ERR_remove_state); We actually maintain a cache of all threads that access the plugin and remove the error state for them. Unless we have to do an ERR_remove_state(0) as well? -Anthony Fred Cr

RE: OpenSSL 0.9.7a - Small (585 byte) memory leak

2003-12-12 Thread Fred Crable
You are missing calls to: ERR_free_strings(); ERR_remove_state(0); -Original Message- From: Anthony Neal [mailto:[EMAIL PROTECTED] Sent: Friday, December 12, 2003 9:32 AM To: [EMAIL PROTECTED] Subject: OpenSSL 0.9.7a - Small (585 byte) memory leak Hi there, One of our proje

RE: Cert Dates & GMT Not Before Date Invalidating Cert

2003-12-12 Thread Fred Crable
I figured it out... The times on the two boxes were a little out-a-wack by 10 minutes... FYI to everybody doing their own Certs, make sure the Time is the same across the board clients/servers. Also, it appears that all cert time comparisions are in GMT, is this correct? Thanks, Fred Crable

Cert Dates & GMT Not Before Date Invalidating Cert

2003-12-12 Thread Fred Crable
ng w/ case X509_V_ERR_CERT_NOT_YET_VALID: msg="certificate is not yet valid the certificate is not yet valid: the notBefore" " date is after the current time."; Thanks, Fred Crable

RE: SSL Setting session is leaking memory

2003-11-17 Thread Fred Crable
thing works! W/O a leak! Thanks, Fred Crable -Original Message- From: Fred Crable Sent: Monday, November 17, 2003 1:08 PM To: '[EMAIL PROTECTED]' Subject: SSL Setting session is leaking memory I'm trying to follow all the examples & cache my client session. If I unc

SSL Setting session is leaking memory

2003-11-17 Thread Fred Crable
ot;re-storing" the sslSession (because it's not zero) then what else could be leaking? Thanks in advance, Fred Crable static SSL_SESSION *sslSession=0; connectFunction(){ /* bio stuff etc */ /* Comment leaky code --- Section 1 of 2 * * if(sslSession){ // Re-Connect

RE: Using SSL formed session

2003-07-08 Thread Fred Crable
t remember where I pulled the code from originally:() http://www.rtfm.com/openssl-examples/ Check out the setup done to verify the certs and create the context. Fred Crable Voyence -Original Message----- From: Fred Crable Sent: Tuesday, July 08, 2003 12:20 PM To: [EMAIL PROTECTED] Subject:

RE: Using SSL formed session

2003-07-08 Thread Fred Crable
du.au/~ftp/Crypto/ssl.html Fred Crable -Original Message- From: pankaj Goel [mailto:[EMAIL PROTECTED] Sent: Tuesday, July 08, 2003 11:31 AM To: [EMAIL PROTECTED] Subject: Using SSL formed session Hello, I am trying to implement PEAP into freeradius. I have formed a SSL tunnel using opens

RE: Estimating the packet overhead imposed by SSL.

2003-07-07 Thread Fred Crable
thing goes for read. It shouldn't be too hard to find the std::read/write calls if you compile w/the -g flag. You could even set a breakpoint in a simple program to try it (break write ;) Fred Crable -Original Message- From: Shashank Khanvilkar [mailto:[EMAIL PROTECTED] Sent: Monday,

RE: about libcrypto.o and libssl.o

2003-06-30 Thread Fred Crable
FYI -- You can also use "nm" to dump out all the symbols defined in a library. Fred Crable Voyence -Original Message- From: Dr. Stephen Henson [mailto:[EMAIL PROTECTED] Sent: Monday, June 30, 2003 6:34 AM To: [EMAIL PROTECTED] Subject: Re: about libcrypto.o and libssl.o On M

RE: Modifying Certificate Requests.

2003-06-27 Thread Fred Crable
Bah, doesn't sound like fun and you did say simple :).. Check out the i2d_X509_REQ and other der to internal functions. You can read in a request in der format & use it as a "base" to play around with. After that, you're on your own w/the request internals ;) > > Sorry Fred, but you did not

RE: Modifying Certificate Requests.

2003-06-27 Thread Fred Crable
You could script it as below:: #!/bin/bash openssl genrsa -out server.key 2048 HOST=`hostname` openssl req -new -key server.key -out server.crs << EORQ > /dev/null 2> /dev/null US Texas Richardson Voyence Product ${HOST} [EMAIL PROTECTED] EORQ cat server.key server.crs > newreq.pem CA.sh -sign

RE: Problem with X509_set_verify()

2003-06-26 Thread Fred Crable
Thanks for the clarification. I read that and said to myself, "well how the h*%l is that supposed to work, LOL." Regards, Fred Crable -Original Message- From: Lutz Jaenicke [mailto:[EMAIL PROTECTED] Sent: Thursday, June 26, 2003 9:00 AM To: [EMAIL PROTECTED] Subject: Re: Pr

RE: Problem with X509_set_verify()

2003-06-26 Thread Fred Crable
It looks like a verification failure, whatever that means! Sounds like an infinite loop from the man pages. Try fflush() on your stdio to catch those printf()'s :) Quote from: http://www.hmug.org/man/3/SSL_CTX_set_verify.html The return value of verify_callback controls the strategy