RE: What is the difference between green and yellow address bars in browser for certificate's fields?

2012-06-13 Thread Steffen DETTMER
Hi all! > Many public CAs suggest Extended Validation for certificates > of web servers. [...] I had a talk with a specialist > of technical support of Thawte [...] He also refused > to answer how browser determines what bar to display - > green or yellow? See thawte Certification Practice St

RE: Custom free routine is invoked with NULL argument in openssl 1.0.1

2012-05-28 Thread Steffen DETTMER
Hi all, > Which version of the ANSI Spec, and where did you get a copy? > > I have to rely on secondary sources and experience using > various implementations that claim conformance. Wikipedia http://en.wikipedia.org/wiki/ANSI_C is used to have a link to a recent draft (free of charge) which is

RE: Custom free routine is invoked with NULL argument in openssl 1.0.1

2012-05-25 Thread Steffen DETTMER
Hi all! > > If the library crashes on free(NULL), you're just making > > people like me do this everywhere: > > > > if (ptr != NULL) free (ptr); ok, if you have a test case "free (NULL)", agreed ;-) Seems not all platforms conform to the "free(NULL) is a no-op". I understand your example, thanks

RE: Custom free routine is invoked with NULL argument in openssl 1.0.1

2012-05-25 Thread Steffen DETTMER
Hi all! * Jeffrey Walton Sent: Friday, May 25, 2012 4:39 PM > On Fri, May 25, 2012 at 7:25 AM, Sudarshan Raghavan > wrote: > > Ok, I can fix the custom free to take care of this. > > But, why is this happening in openssl 1.0.1 and not in 1.0.0 or > > 0.9.8? > > I thin

RE: Why CVS?

2012-02-16 Thread Steffen DETTMER
> > With Git, Mercurial and other revision control systems > > available. Why is OpenSSL still suck on CVS? > > Moving a mature project off of CVS is not trivial. Also, why move at all? People can development features with let's say GIT, even in teams and concurrently, and then checking in to C

Re: Re: Verify intermediate certificate

2012-01-13 Thread Steffen DETTMER
* Johannes Bauer wrote on Fri, Jan 13, 2012 at 14:22 +0100: [...] > >>> Or, in other words: Let's assume I have a ultimate root > >>> (self-signed) "Root" and a branched CA "X". I would like to > >>> trust "X" and all it's children, but not "Root". Is this > >>> not possible? [yes, it is not poss

RE: SSL_Connect call gives SSL_ERROR_WANT_READ for non blocking sockets

2011-11-23 Thread Steffen DETTMER
> Since I wait until the SSL_connect() function succeeds I > wanted to know if there is a better approach. Yes, there is a better approach, for example the one mentioned in the manual: * http://www.openssl.org/docs/ssl/SSL_connect.html > If the underlying BIO is non-blocking, SSL_connect() will a

RE: Secure plaintext-derived filename [was: HMAC with RSA Key]

2011-10-26 Thread Steffen DETTMER
> > 4. Truncate the string to your desired file name length, but not so > > short that accidental collisions become likely (Example to > > keep up to 16000 file names likely different, use file names with 2 * > > log2(16000)=2*14=28 bits minimum). Where can I learn more about this formula? I th

RE: How to recover Self signed SSL private Key Pass Phrase

2011-10-19 Thread Steffen DETTMER
> can any one please help me regarding this, like how to > retrieve the SSL pass phrase , or assign a new pass phrase > for the same private key. Add all information you remember (possible parts, used characters, length information) to a key cracking tool, run it and wait?

RE: Revocation with a renewed/rekeyed Root CA

2011-10-18 Thread Steffen DETTMER
> > - U1, U2, U3 are end-user certificates, issued by CA1 > > - U1 is revoked, and the CRL is published (lets call it CRLg1) > > The problem here is that you can't trust a CRL when its > signature key is compromised. I think that this is not the reason. If a signature key is compromised but

RE: How to deal with new OIDs

2011-09-08 Thread Steffen DETTMER
Hi all, Hi Dominik, > in a project I maintain I have to deal with OIDs not > contained within OpenSSL. In particular, I use OpenSSL to > parse ASN1 encoded data containing OIDs (using the Macros > from asn1t.h) and do switch-case statements on the resulting > NIDs. Until now I used to patch Op

RE: SSL routines:SSL3_GET_RECORD:wrong version number:s3_pkt.c:293

2011-07-04 Thread Steffen DETTMER
> http://stackoverflow.com/questions/6520676/pop3s-implementatio > n-using-openssl-library char bf[16] = "STLS\r\n"; if (send(c->socket, bf, sizeof(bf), 0) < 1) { fprintf(stderr, "[%d] failed writing to auth server socket(ssl_coneect)", getpid()); } I don't think that

RE: RE: RE: Cannot encrypt text - need help

2011-05-03 Thread Steffen DETTMER
* derleader mail on Monday, May 02, 2011 8:14 PM > > But what exactly do you want to know? If you can use SSL and > > Blowfish? > > It does not appear in http://www.openssl.org/docs/apps/ciphers.html. > > > Yes the web site and the book about the OpenSSL is outdated. Does TLS spec nowadays define

RE: RE: Cannot encrypt text - need help

2011-05-02 Thread Steffen DETTMER
> If I decide to go with openssl and blowfish what are the > potential threats? Yes, heaps of. You might consider asking more detailed. > Is there another security mechanism that I can use with blowfish? Of course... But what exactly do you want to know? If you can use SSL and Blowfish? It does

RE: Re: Cannot encrypt text - need help

2011-05-02 Thread Steffen DETTMER
* owner-openssl-us...@openssl.org > What is the purpose of the project? > > This is a open source project - I need a way to monitor a > huge number of servers - monitor CPU load, RAM load, HDD > load, installed packets and etc. Why not using http://www.nagios.org/? > The data which will gathe

RE: slow https conenctions

2011-04-27 Thread Steffen DETTMER
* Matthew Fletcher, Wednesday, April 27, 2011 12:40 PM > I guess that does not 100% rule out DNS/Network stuff, as SSL > could be doing extra network lookups. > > Are there any more SSL diagnostics i can enable to try and > pinpoint the problem ? maybe checking with strace -ttt -p ... which op

RE: Combining MD5 and SHA-1 to reduce collision probability

2011-04-26 Thread Steffen DETTMER
Hi, thank you for clarification, Dave! * Dave Thompson Friday, April 22, 2011 12:34 AM: > > so among 2^n+1 different messages, at least two of them > > must have the > > same 2^n bit hash (actually half because of birthday "attack"). > > To be exact: for an n-bit or 2^n-value hash, with 2^n + 1

RE: Combining MD5 and SHA-1 to reduce collision probability

2011-04-20 Thread Steffen DETTMER
* Luc Perthuis: > Hi all, > > I'm specially interested on finding a way to uniquely > identify rather small data chunks (less than or equal to > 128*1024 bytes in size) without using a byte per byte compare. > > Is there any theoretical proof for a "good" selection of 2 > HASH (computing the re

RE: BIO_do_accept() + fork() is leaking 64B?

2011-03-28 Thread Steffen DETTMER
> -Original Message- > > BIO_set_close(bio, 0) > No, I haven't tried it yet, but it seems this is what I've > been looking for- clean & neat. Is it? Wouldn't this mean that father process sooner or later runs out of file descriptors? Shouldn't the father process close(2) and the child -

How to handle "Expired" or "not yet valid" X.509 certificates - or simply is the system date wrong?

2011-03-22 Thread Steffen DETTMER
Hi, I though this was already discussed, but I cannot find pointers. When some entity verifies a certificate, finds a valid signature etc but the current date is not between "Valid From" to "Valid To", meaning the certificate seems "not yet valid" or "expired", what is recommended to do? I think

Re: Let's talk about HTTPS Everywhere

2011-01-21 Thread Steffen DETTMER
* S Mathias wrote on Wed, Jan 19, 2011 at 03:29 -0800: > Ok. It's a Firefox Add-on: > https://www.eff.org/https-everywhere > 3) Can someone trust this Add-on? Is it safe to install/use? It isn't 100% safe. There always is a risk. > 4) If it's so great why isn't it more prevalent? > What's youre o

Re: SSL/TLS with server names picked from DNS

2010-08-24 Thread Steffen DETTMER
Hi! * sandeep kiran p wrote on Wed, Aug 11, 2010 at 20:36 -0700: > Ours is an LDAP client application that fetches LDAP server names on > the fly using DNS SRV Resource Records. We then randomly pick one the > servers returned from DNS, establish an SSL/TLS connection with that > server and then p

end users managing trust databases (was: Re: Wildcard certs?)

2010-07-28 Thread Steffen DETTMER
* Kyle Hamilton wrote on Fri, Jul 23, 2010 at 20:06 -0700: > There's a company called StartCom (http://www.startssl.com/) who will > do 2-year validity wildcard certs, upon verification of your identity > and verification that you have control of the domain for which you are > requesting certificat

Re: RPMBuild for FIPS OpenSSL

2010-07-12 Thread Steffen DETTMER
* Mark Parr wrote on Thu, Jul 08, 2010 at 13:42 -0500: > I then loaded the openssl-fips-1.2.tar.gz file into a different > directory and attempted to create a RPM install for it as well but > have hit some issues. First off, rpmbuild complained that it could > not find the openssl-0.9.8f.tar.gz fi

Re: Doubts about certificates

2010-07-05 Thread Steffen DETTMER
* Sebastián Treu wrote on Mon, Jul 05, 2010 at 10:39 -0300: > if we can use a fake DNS that resolves a name as we want and > also we can gather that certificate to be installed in the > fake-server, This fake-server would not have the secret key belonging to the public key certified in the (publi

Re: additively computing SHA hash

2010-06-14 Thread Steffen DETTMER
* Subra Aswathanarayanan wrote on Mon, Jun 07, 2010 at 20:44 -0400: >Both of you mention that OpenSSL doesn't provide such an interface. >May be this question is not appropriate for this forum, but do you >know of any such simpler libraries that I might be able to use? If it is just S

Re: question about exponent, key length and all other RSA parameters not configurable

2010-05-25 Thread Steffen DETTMER
* Chuck Pareto wrote on Mon, May 24, 2010 at 16:12 -0700: >Hi, >When I run openssl rsa to display my public key info. I see this >below. How do I convert this output to a byte array? What is this >output? Is it ascii or base64? it's ASCII and in the Mail potentially base64... :) su

Re: Is it not possible to decrypt partial AES messages?

2010-05-05 Thread Steffen DETTMER
* Christina Penn wrote on Wed, May 05, 2010 at 07:42 -0400: >Can you show me exactly how to break up my example code to make my >example work? I tried removing the EVP_DecryptFinal_ex from my >DecryptMessage function and just seeing if the first part would just >decrypt the first 7

Re: Question regarding opening the OpenSSL source code in visual studio

2010-04-29 Thread Steffen DETTMER
* Modem Man wrote on Wed, Apr 28, 2010 at 17:49 +0200: > > Since I'm working under Windows and have Visual Studio installed, the > > easiest way to do so will be by creating a visual studio project with > > the source code > > I tried it and stopped after ~4 hours. [...] > Next, split makefile int

Re: Openssl tarball SHA1 checksum

2010-04-12 Thread Steffen DETTMER
* Kenneth Goldman wrote on Sun, Apr 11, 2010 at 15:36 -0400: > owner-openssl-us...@openssl.org wrote on 04/11/2010 01:38:14 PM: > > * Kenneth Goldman wrote on Fri, Apr 09, 2010 at 08:12 -0400: > > > I notice that the tarballs also include a SHA1 digest. > > > What's the point? > > > > To have a che

Re: Openssl tarball SHA1 checksum

2010-04-11 Thread Steffen DETTMER
* Kenneth Goldman wrote on Fri, Apr 09, 2010 at 08:12 -0400: >I notice that the tarballs also include a SHA1 digest. What's the >point? To have a check whether the FTP download was successful to avoid accidently using corrupt files, a file integrity check with a checksum is quite common.

Re: PKCS#7 extract and verify certificate?

2010-03-01 Thread Steffen DETTMER
* Eisenacher, Patrick wrote on Tue, Feb 23, 2010 at 12:30 +0100: [...] > "The selection of a trust anchor is a matter of policy: it >could be the top CA in a hierarchical PKI, the CA that >issued the verifier's own certificate(s), or any other CA in >a network PKI." > > And no, I don

Re: Thread locking functions

2010-02-15 Thread Steffen DETTMER
* Sad Clouds wrote on Mon, Feb 15, 2010 at 14:52 +: > On Mon, 15 Feb 2010 15:19:23 +0100 > "Steffen DETTMER" wrote: > > Delegating functionality via callbacks allows arbitrary > > implementations; I would not consider this lame > > - but clean, strong, ortho

Re: Thread locking functions

2010-02-15 Thread Steffen DETTMER
* Sad Clouds wrote on Mon, Feb 15, 2010 at 13:18 +: > 2. Rationale for callbacks? > > Pushing some of the responsibility for locking OpenSSL internal > structures to application developers seems a bit lame. Why not get rid > of locking callbacks and have OpenSSL handle it transparently inside

Re: Subject Alternative Name Help

2010-02-15 Thread Steffen DETTMER
Hi! * Victor Duchovni wrote on Fri, Feb 12, 2010 at 15:03 -0500: > On Fri, Feb 12, 2010 at 08:35:09PM +0100, Steffen DETTMER wrote: > > > (So DER encoding is used, and it is allowing 128 byte long > > length fields allowing 2^1024 [a number taking four and a half > >

Re: Subject Alternative Name Help

2010-02-12 Thread Steffen DETTMER
* Victor Duchovni wrote on Fri, Feb 12, 2010 at 14:20 -0500: > The limit is not (only?) an X.509 limit, rather the SSL/TLS > record layer cannot carry messages larger than 2^14 bytes (plus > some overhead for compression algorithms which provably need to > be able to make some records larger in ord

Re: Subject Alternative Name Help

2010-02-12 Thread Steffen DETTMER
* Victor Duchovni wrote: > The SSL/TLS record layer has a maximum record size, a > certificate probably needs to fit into one record, so if your > 500+ domains generate a certificate that is larger than ~16K > bytes, you may be out of luck. (I just ask for curiosity, not because I have any problem

Re: Should CSR be protected?

2010-02-09 Thread Steffen DETTMER
* Patrick Patterson wrote on Sun, Feb 07, 2010 at 10:14 -0500: > > A quick question here. Should the Certificate Signing Request message be > > protected when requesting for Certificate from CA? I think, if you want to certify that a public matches subject description, of course you should authen

Re: Why don't openssl RSA work for Word Document file?

2010-02-02 Thread Steffen DETTMER
> Namrata Sorte wrote: > > Ya to be more specific, I want to sign and verify Word Document > > File and using command line will be fine for now. Are you looking for something like openssl smime -sign -in ml.doc... openssl smime -encrypt -in in.doc... maybe? With RSA based certificates it uses R

Re: can TLS be used securely or it is flawed by design not allowing to use it securely

2010-01-26 Thread Steffen DETTMER
* Kyle Hamilton wrote on Tue, Jan 19, 2010 at 16:00 -0800: > On Tue, Jan 19, 2010 at 6:19 AM, Steffen wrote: > > * Kyle Hamilton wrote on Thu, Jan 14, 2010 at 15:50 -0800: > > (assuming, that a peers identity should not change within a > > session - but as discussed later in this mail this could be

Re: impact of client certificates to re-negotiation attack

2010-01-19 Thread Steffen DETTMER
* Kyle Hamilton wrote on Thu, Jan 14, 2010 at 12:03 -0800: > * Steffen asked... > > ...on this level [thanks a lot again for all the clarifications: authentication levels, authentication-agnostic, URI-dependent certificates, bugfix because missed intention, MITM tricks twitter to decrypt and disclo

Re: can TLS be used securely or it is flawed by design not allowing to use it securely

2010-01-19 Thread Steffen DETTMER
* Kyle Hamilton wrote on Thu, Jan 14, 2010 at 15:50 -0800: > On Wed, Jan 13, 2010 at 5:58 AM, Steffen DETTMER wrote: > >> There is currently no way for even an ideal TLS implementation to > >> detect this issue. > >[...] > >> Yes. Please see SSL_CTX_set_info_

Re: impact of client certificates to re-negotiation attack

2010-01-13 Thread Steffen DETTMER
* aerow...@gmail.com wrote on Tue, Jan 12, 2010 at 12:29 -0800: > On Tue, Jan 12, 2010 at 3:12 AM, Steffen DETTMER > The problem is this: > > The attacker makes a connection to a TLS-enabled server, > sending no certificate. It sends a command that, for whatever > reason

Re: can TLS be used securely or it is flawed by design not allowing to use it securely

2010-01-13 Thread Steffen DETTMER
Hi, thank you very much for all your explanation and to give me one more free training :) * Kyle Hamilton wrote on Tue, Jan 12, 2010 at 13:33 -0800: > > Isn't it a bug in the application when it does not allow me (its > > user) to configure it? As far as I know there is no way to tell > > Firefox

impact of client certificates to re-negotiation attack (was: Re: Re-negotiation handshake failed: Not accepted by client!?)

2010-01-12 Thread Steffen DETTMER
Hi, thank you too for the detailed explanation. But the impact on the client certificates (and its correct validation etc) is not clear to me (so I ask inline in the second half of this mail). * Kyle Hamilton wrote on Mon, Jan 11, 2010 at 14:28 -0800: > The most succinct answer is this: the serve

can TLS be used securely or it is flawed by design not allowing to use it securely (was: Re: Re-negotiation handshake failed: Not accepted by client!?)

2010-01-12 Thread Steffen DETTMER
Hi, thank you for your detailed explanations. The main thing I still not understood is whether TLS by design enforces the `bad behavior', meaning TLS cannot be used securely at all by anyone, - or - if TLS just does not enforce to use is securely, meaning that TLS relies on application code imple

Re: Re-negotiation handshake failed: Not accepted by client!?

2010-01-11 Thread Steffen DETTMER
Hi all! I miss something around the Re-negotiation flaw and fail to understand why it is a flaw in TLS. I hope I miss just a small piece. Could anyone please enlight me? * Kyle Hamilton wrote on Thu, Jan 07, 2010 at 16:22 -0800: > It is also, though, undeniably a flaw in the TLS specification > t

Re: Signing .p10 certificate signing requests

2010-01-08 Thread Steffen DETTMER
* Dr. Stephen Henson wrote on Tue, Jan 05, 2010 at 20:26 +0100: > Trying both types to see which (if any) worked would be one > strategy to handle this automatically or seeing if the initial > SEQUENCE header looked like it covered the whole file. There > would be exceptions to both cases though.

Re: Huh?

2009-11-25 Thread Steffen DETTMER
* Kyle Hamilton wrote on Tue, Nov 24, 2009 at 13:10 -0800: > [startssl.com] from the CA policy http://www.startssl.com/policy.pdf: > > Fully qualified domain names, typically .www.domain.com. or > > .domain.com. are validated by sending an electronic mail message > > with a verification code to o

Re: Verify fails if two certs with same subject are in the trustedCA lookup file

2009-10-19 Thread Steffen DETTMER
* Arno Garrels wrote on Sun, Oct 11, 2009 at 16:10 +0200: > > > Why are issuers looked up by subject at all? > > > > > > > Because that's what the standards (X.509, RFC3280 et al) require. > > Ah ok, but shouldn't name duplicates be taken into account when > issuers are looked up, even though th

Re: Secure Command Line MAC Computation

2009-10-02 Thread Steffen DETTMER
(OT) just kidding. * Michael S. Zick wrote on Thu, Oct 01, 2009 at 16:44 -0500: > Everbody in the same room should be sufficiently security qualified > to see anything typed within that room. cheating pupils in school exams probably won't agree, neither will people who are writing love letter SM

Re: How to get rid of "do you want to sign the cert" user request when signing a CSR?

2009-09-25 Thread Steffen DETTMER
(OT) * Dave Thompson wrote on Thu, Sep 24, 2009 at 19:23 -0400: > But 'ca' by default, and thus it appears to me CA.pl > always, also prompt for the CA key passphrase (unless > insecurely clear), and you're not complaining about that. I think it depends where it is stored if no passphrase is i

Re: verify client certificate at a later point

2009-09-24 Thread Steffen DETTMER
* Victor Duchovni wrote on Wed, Sep 23, 2009 at 16:18 -0400: > On Wed, Sep 23, 2009 at 10:04:48PM +0200, Michael Prinzinger wrote: > > > I have a somewhat curious setting (without CAs) about [...] > > > > > //check certificate > > This only verifies the server's *trust chain*, but not its > i

Re: The need for SNI ssl apache vhosts,

2009-09-15 Thread Steffen DETTMER
* Nigel Sollars wrote on Mon, Sep 14, 2009 at 19:06 +0200: > At the company we have an online store and we need to replicate it for > different locales/languages. After reading some information on the net > it seems that the RFC spec is good but the implementation ( at the time > of the writing

No shortcuts (was: Re: Is openssl crypto library thread-safe?)

2009-09-10 Thread Steffen DETTMER
(OT) * Mark wrote on Thu, Sep 10, 2009 at 15:54 +0100: > > No offense, but that's what the mailing list is for. > > Granted, a search might have yielded the answer as well... > > but if anything, the question should make you feel good > > because it's one mess you won't be cleaning up. > > No off

Re: MAC address binding to the certificate

2009-09-09 Thread Steffen DETTMER
* Anoop C wrote on Wed, Sep 09, 2009 at 18:02 +0530: >Thanks for the quick response. > I totally agree on your point. Our associates often used to try others > certificate .So I want to remove that threat also by incorporating MAC > address also into the certificates apart from the exis

Re: Verify certificate using subordinate ca

2009-09-03 Thread Steffen DETTMER
* Dr. Stephen Henson wrote on Wed, Sep 02, 2009 at 15:08 +0200: > Including a public key certificate in no way risks the > integrity of its private key as several others have said in > this thread. I think this theoretically opens the possibility to brute-force the private key. I think that Brute

Re: Verify certificate using subordinate ca

2009-09-03 Thread Steffen DETTMER
* Serge Fonville wrote on Wed, Sep 02, 2009 at 13:00 +0200: > The chain always includes all CAs and certificates. I've done some > googling, and it shows that you can trust 'just' the intermediate CA > without trusting the root CA, altough this kinda obsoletes the purpose > of the root CA. [...]

Re: Diffie-Hellman key exchange : Preventing MITM attack

2009-08-31 Thread Steffen DETTMER
* Victor Duchovni wrote on Fri, Aug 28, 2009 at 13:39 -0400: > The OP is not using fixed DH keys. He is proposing to use ADH key > exchange. This gives confidentiality, but NOT authentication. Yes, and confidentiality without authentication usually doesn't help much. In case of MITM, the confiden

Re: WSAEWOULDBLOCK versus WSAECONNREFUSED

2009-08-24 Thread Steffen DETTMER
* David Schwartz wrote on Sun, Aug 23, 2009 at 15:40 -0700: > > My question is why _using the same code_ Windows is returning > > WSAEWOULDBLOCK instead of WSAECONNREFUSED when my server is down? > > while UNIX correctly returns ECONNREFUSED... > > Because Windows cannot tell whether your server is

Re: How to create a non exportable private key certificate using openssl

2009-07-15 Thread Steffen DETTMER
* Michael S. Zick wrote on Wed, Jul 15, 2009 at 07:38 -0500: > You can approximate that by grabbing the processor's silicon > serial number plus grab the USB stick's silicon serial number > plus a user input (partial) passphrase. I assume a good virtualisation (maybe some patched VMWare or alike)

Re: How to create a non exportable private key certificate using openssl

2009-07-15 Thread Steffen DETTMER
* tito wrote on Wed, Jul 15, 2009 at 09:19 +0530: > Now the threat is, If an agent export the certificate he > acquired in a USB or in someother way and goes to his home pc > or somewhere else and he imports the certificate to his > personal PC and started doing transactions. > > He shouldnt be abl

Re: Problem with certificate generated from request

2009-06-29 Thread Steffen DETTMER
* Konstantin Ivanov wrote on Sun, Jun 28, 2009 at 11:25 -0700: > You connection to 127.0.0.1 is encrypted with 128-bit > encryption. However, this page includes other resources which > are not secure" > > Please note that I only get this message if I've placed by CA > root certificate into Trusted

Re: Creating certificate from meta data

2009-06-18 Thread Steffen DETTMER
* Mirko Velic wrote on Wed, Jun 17, 2009 at 20:21 +1000: > I was wondering if i could convert the data outputted by this command: > openssl x509 -noout -fingerprint -text < test.cert > info.txt > > Back into a certificate after I modify it, as it would make it easier to > generate certificates.

Re: about the integer decomposition

2009-06-08 Thread Steffen DETTMER
* Stephan V Bechtolsheim wrote on Fri, Jun 05, 2009 at 18:20 -0700: > > This is hardly anything remotely resembling a formal proof, > > of course. But it should give you the basic idea -- it's a > > difficult problem because the numbers are big. > Your argument only applies to "your algorithm". The

Re: TLS w/LDAP - SOLVED

2009-06-02 Thread Steffen DETTMER
(OT) * Michael S. Zick wrote on Sun, May 31, 2009 at 08:05 -0500: > A more general solution would be: > > # Am I running as user 0 (root)? > uid=$(/usr/bin/id -u) 2>/dev/null > if [ $uid == 0 ] ; then BTW, shouldn't it be just one "=" (to be compliant with POSIX and /usr/bin/test)?

Re: Question about x509

2009-05-25 Thread Steffen DETTMER
* loody wrote on Fri, May 22, 2009 at 21:51 +0800: > 2009/5/22 David Schwartz : > > > >> Dear all: > >> at the end of letter, I append the the public key I excerpted from my > >> certificate by openssl x509. > >> Since the key is 2048 bits, 256 bytes, I find the length of > >> 00:af:..14:f7 > >

Re: On the fly certificate generation to send to the client

2009-05-25 Thread Steffen DETTMER
* AngelWarrior wrote on Wed, May 20, 2009 at 15:18 -0500: > "I dont need to know with whom I am contacting but after > contact my messages should be private." If you sent your message to just anybody, how can it be private? oki, Steffen --[ End of message ]--

Re: On the fly certificate generation to send to the client

2009-05-25 Thread Steffen DETTMER
* Scott Gifford wrote on Wed, May 20, 2009 at 21:52 -0400: > AngelWarrior writes: > > > but this still requires a CA kind of certificate right.I dont > > know if the client will be have a CA certificate to > > authenticate it.If I am wrong please explain me how it can be > > done. > > Regular SS

Re: Reverse ssl

2009-05-18 Thread Steffen DETTMER
* Victor Duchovni wrote on Mon, May 18, 2009 at 13:53 -0400: > On Mon, May 18, 2009 at 10:24:55AM -0700, Kyle Hamilton wrote: > > 'reverse SSL'? > > > In other words, the TCP initiator and passive listener are not > necessarily also the SSL client and server respectively. I think stunnel already

Re: SSL attack scenario

2009-05-18 Thread Steffen DETTMER
* Nikos Balkanas wrote on Mon, May 18, 2009 at 15:29 +0300: > Wikipedia is right in principle, but doesn't cover the case of TCP > hijacking. I think this is out of scope, TCP is said to be reliable, not neccesarily secure. oki, Steffen --[ end of message ]-

Re: I want you to do my homework for me.

2009-05-06 Thread Steffen DETTMER
* David Loman wrote on Wed, May 06, 2009 at 11:21 +0200: > Mods: Any way there can be some banning happening soon? Don't feed the trolls. oki, Steffen ---[ end of message ]->8===

Re: Basic functions, again...

2009-04-27 Thread Steffen DETTMER
* Sever P A wrote on Mon, Apr 27, 2009 at 10:49 +0200: > > (Steffen said:) I think stunnel could be suited well here. > > Maybe... but my idea was to implentent this functions in the > C/C++ programm while the users has no computer expertise > skills. > > I suddenly thought to integrate this in a

Re: Basic functions, again...

2009-04-27 Thread Steffen DETTMER
* Sever P A wrote on Sat, Apr 25, 2009 at 13:35 +0200: > I don't reach to understand how to implement all this steps. So: I think stunnel could be suited well here. oki, Steffen About Ingenico: Ingenico is the world’s leading provider of payment solutions, with

Re: Open SSL via dyndns.org

2009-04-15 Thread Steffen DETTMER
* tobias.sem...@diemer-ing.de wrote on Tue, Apr 14, 2009 at 15:04 +0200: > Is there a chance to create a certification on the intern server called by > the extern https://name.dyndns.org adress ? It depends on the software you are using and on the setup... If you use some non-routable IP for your

Re: OpenSSL 1.0.0 beta 1 released

2009-04-02 Thread Steffen DETTMER
* Dr. Stephen Henson wrote on Thu, Apr 02, 2009 at 13:01 +0200: [...] > Under this scheme > > 1. Bug fix releases will change the letter. >E.g. 1.0.0 -> 1.0.0a > > 2. Feature releases will change the last (minor) number. >E.g. 1.0.0 -> 1.0.1 > > 3. Major development will change the

Re: Bad Decrypt message when using -pass pass:

2009-02-13 Thread Steffen DETTMER
Hi all! * Nickfx wrote on Wed, Feb 11, 2009 at 08:54 -0800: > Crazy I know. Having removed split, Openssl is now working as > it should. It would seem that there is something screwy with > Cygwins Split or Cat command. I rember that I had trouble because DOS/UNIX line feed translation was perform

Re: [OT] PermitRootLogin is Missing in /etc/ssh_config

2009-02-09 Thread Steffen DETTMER
Hi all, * Charles Darwin wrote on Sun, Feb 08, 2009 at 09:27 -0500: > Any idea? (This is off topic here) Shouldn't it be in /etc/sshd_config (or /etc/ssh/sshd_config)? And if missing there, why not simply add it?! oki, Steffen ps.: is this your real name or is it because of the `Darwin Year 20

Re: OpenSSL command line HMAC

2009-02-09 Thread Steffen DETTMER
Hi all! * Dave Thompson wrote on Fri, Feb 06, 2009 at 20:59 -0500: > > Adding the quotes didn't work because, if I understand things > > correctly, the notion of quotes (or escaping characters with \) > > is a shell concept - hence my attempt to force the command to run > > under a shell. > > > Th

Re: OpenSSL command line HMAC

2009-02-06 Thread Steffen DETTMER
Hi all, Hi Alistair! * Young, Alistair wrote on Fri, Feb 06, 2009 at 10:16 +: > Ultimately I settled on the use of a shell script to act as an > intermediary: > > #!/bin/bash If you can use bash you could pass the key in \xNN form for $'\xNN' to avoid special characters like blanks and contr

Re: unexpected SSL_ERROR_ZERO_RETURN

2009-01-08 Thread Steffen DETTMER
* Md Lazreg wrote on Thu, Jan 08, 2009 at 15:11 +0100: > The problem in my case was a server one. I use a non-blocking socket for the > server to receive information from the clients, so the server performs a > select with a timeout of 1 second to read information. It turns out that > when they are

Re: Which version of 0.9.9 is stable enough to use?

2008-11-17 Thread Steffen DETTMER
* Vishnu Param wrote on Mon, Nov 17, 2008 at 16:12 +0800: > > > s3_enc.c:(.text+0xaeb): undefined reference to `COMP_CTX_new' > > I am sure I am pointing to the 0.9.9 libraries/headers, because I > wouldn't get these errors if I wasn't. I think what you were supposed to ensure is that you have the

Re: how to run gdb in openssl

2008-10-08 Thread Steffen DETTMER
* prashanth s joshi wrote on Tue, Oct 07, 2008 at 21:13 +0530: > Could anyone please tell me how to run the gdb in openssl? > In gdb I am running the command as path_of_bin/bin/openssl s_client -connect > ipaddress:4433. > But i get the error as: Undefined command: "". Try "help". > why is it so

Re: How to use a hardware RNG with openssl?

2008-09-19 Thread Steffen DETTMER
Hi, thanks a lot for your detailed explanation. * Lutz Jaenicke wrote on Fri, Sep 19, 2008 at 16:46 +0200: > OpenSSL's internal PRNG uses a 1024 byte pool mixing entropy with > SHA-1 so the more bytes a mixed in, the better. At least it cannot hurt > to add any input to it as the entropy in the p

Re: How to use a hardware RNG with openssl?

2008-09-19 Thread Steffen DETTMER
* Lutz Jaenicke wrote on Fri, Sep 19, 2008 at 14:22 +0200: > > we purchased a hrng for the generation of RSA keys for instance. > > It is an USB device an shows up as /dev/qrandom. > > > Note: if /dev/urandom is available, OpenSSL will read an additional amount > of random bytes from it whether an

Re: [FWD] Re: Convert a DER certificate to PEM certificate

2008-08-12 Thread Steffen DETTMER
* Lutz Jaenicke wrote on Tue, Aug 12, 2008 at 08:47 +0200: > Please help me with the command line to convert a DER > Certificate to PEM Certificate. $ openssl x509 -inform der -outform pem < certificate.der or $ openssl x509 -inform der -text < certificate.der (which includes a human readable

Re: [openssl-users] Re: Which datatype for passphrase?

2008-06-16 Thread Steffen DETTMER
* Konrad Kleine wrote on Fri, Jun 13, 2008 at 17:32 +0200: > One of our principles is to have only one exit point in > functions, so in this point we would agree with you. On the > other hand, it is also possible to do it without "goto"s. Yes, it is possible to `goto' without `gotos', sometimes th

Re: Wider fallout from Debian issue?

2008-06-02 Thread Steffen DETTMER
* John Parker wrote on Sat, May 31, 2008 at 15:35 -0500: > > Probability that a "proper" key falls in the space of the > > "bad debian" keys: 2^15 / 2^2048 = 1 / 2^2033. > > > > That's a lot of zeros before the first non-zero digit. > > Put differently, if you were to start generating keys now at

Re: Wider fallout from Debian issue?

2008-06-02 Thread Steffen DETTMER
* [EMAIL PROTECTED] wrote on Fri, May 30, 2008 at 06:51 -0500: > Back in the day, DES was the de facto encryption algorithm. [...] > In an ideal world, I think the system should throw an exception > then and let the calling application feed it another key. > However, I think the general consensus

Re: Wider fallout from Debian issue?

2008-05-29 Thread Steffen DETTMER
* Victor Duchovni wrote on Wed, May 28, 2008 at 21:10 -0400: > > > Only against random attacks of course, if all attackers > > > first check these keys, then removing them strengthens the > > > algorithm against (non-random) brute-force attack. This > > > said, the effort of explicitly avoiding the

Re: Wider fallout from Debian issue?

2008-05-28 Thread Steffen DETTMER
* Deane Sloan wrote on Thu, May 29, 2008 at 04:47 +1200: > stated, the overall risk of generating such a key on an unaffected > system is (extremely?) small for the security that a 2048bit RSA private > key is intended for? The risk to generate one specific key of 2^16 (or how small was the key sp

Re: The rules of SSL-Certificate validation?

2008-04-22 Thread Steffen DETTMER
* Lutz Jaenicke wrote on Tue, Apr 22, 2008 at 09:59 +0200: > > This rule is independent of current time. e.g. If the validity dates > > of the parent certificate is 2008/04/18~2009/04/18 and the ones of > > child certificate is 2008/06/18~2009/06/18 or 2008/03/18~2009/03/18, > > the certificate cha

Re: Openssl loading

2008-04-21 Thread Steffen DETTMER
* Li, Yvonne wrote on Fri, Apr 18, 2008 at 23:46 -0400: > You have lots of good points. Thank you again. > > I work for AOL, developing cross platform SDK for instant messaging that > supports plugins. Plugins can be malicious. And AOL is responsible for > protecting users' identity and privacy. C

Re: Convert binary to hexadecimal, and string storing hexadecimal to hexadecimal

2008-04-21 Thread Steffen DETTMER
(OT) * Badra wrote on Fri, Apr 18, 2008 at 17:03 +0200: > I have also unsigned char B that stores a binary value. I need to > convert it to hexadecimal, I do: > > char *table = "0123456789abcdef"; > int i; > for (i=0; i { > B[2*i+1] = table[B[i] & 0xf]; > B[2*i] = table[(B[i] & 0

Re: SSL overhead

2008-04-17 Thread Steffen DETTMER
* Tomas Neme wrote on Wed, Apr 16, 2008 at 17:44 -0300: > The problem is that SSL_pending might return 0 if there's > stuff on the socket, but isn't enough to decode a full record. If you want SSL to be transparent, why are you interested in intermediate protocol-specific data which would not be

Re: authentication then authorization

2008-04-10 Thread Steffen DETTMER
* Kyle Hamilton wrote on Thu, Apr 10, 2008 at 02:34 -0700: > > (That means the CA remotely signs online submitted CSRs and sends > > back a Cert immediately? Maybe such a CA would not be that > > trustworthy...) > > First: it is as trustworthy as the application seems to > require. It's not

authentication then authorization

2008-04-10 Thread Steffen DETTMER
* Kyle Hamilton wrote on Wed, Apr 09, 2008 at 14:22 -0700: > Each peer goes through this process: > 1) peer creates a keypair > 2) peer generates a CSR (certificate signing request) for its public key. > 3) peer connects to server, submits CSR along with whatever > information necessary to determin

Re: Problem after removing memory leak

2008-04-02 Thread Steffen DETTMER
* Wockenfuß, Frank wrote on Wed, Apr 02, 2008 at 09:07 +0200: > Thank you for that hint. > I will try to rebuild the class as singleton. This could help, > but isn't really nice. I think you'd need multiple classes. For things done once a program life time, a C++ class (singleton) may not be suite

Re: CAFile

2008-03-27 Thread Steffen DETTMER
* [EMAIL PROTECTED] wrote on Wed, Mar 26, 2008 at 18:26 +0100: > For some hours now I try to find out how to create CAfile (a > file with multiple CAs inside, the one file counterpart of > -CApath). > > Could anybody please give me an example Not sure if I understand you right, but if you want t

Re: own Certificate Authority: Renewal of CA cert

2008-03-25 Thread Steffen DETTMER
Hi, in short I think in your -signkey command you need to add -enddate. * Andreas Grimmel wrote on Mon, Mar 24, 2008 at 17:28 +0100: > > That depends on what you need to do by policy for renewal. > > There is no such thing as "technical renewal" - there is only > > policy based. Since this sounds

  1   2   >