Re: Certificate pass phrase brute force...

2014-09-16 Thread Gregory Sloop
[SNIP] >> However this looks like the key is encrypted with 3DES, but I "exported" it >> from the Cert+Key with "-aes256" - so I'm puzzled why I'd have a 3DES >> encrypted p12. DT> You thought you did but you didn't. DT> The doc is a bit subtle, but the -$cipher option is listed under "PARSING"

RE: Certificate pass phrase brute force...

2014-09-16 Thread Dave Thompson
> From: owner-openssl-us...@openssl.org On Behalf Of Gregory Sloop > Sent: Monday, September 15, 2014 22:50 > And, one more question: > How can I tell what format/encryption my pkcs12 files are in? > [I believe for Android platform use, I need p12 certs/keys - so I'm working > on the export/con

RE: Certificate pass phrase brute force...

2014-09-16 Thread Dave Thompson
> From: owner-openssl-us...@openssl.org On Behalf Of Gregory Sloop > Sent: Monday, September 15, 2014 17:14 > I've gone back and re-encrypted the private keys [thanks Dave, again!] > and this is the result from an asn1parse > Is that the new format? [It looks like it, but I'm such a "babe in the

Re: Certificate pass phrase brute force...

2014-09-15 Thread Gregory Sloop
And, one more question: How can I tell what format/encryption my pkcs12 files are in? [I believe for Android platform use, I need p12 certs/keys - so I'm working on the export/conversion part too.] I export my cert+key like so: [openssl pkcs12 -export -aes256 -in somecert.crt -inkey somekey.ke

Re: Certificate pass phrase brute force...

2014-09-15 Thread Gregory Sloop
So, hopefully this will be the last post in the thread. [fat chance, eh!?] I've gone back and re-encrypted the private keys [thanks Dave, again!] and this is the result from an asn1parse openssl asn1parse http://www.sloop.net ---

RE: Certificate pass phrase brute force...

2014-09-09 Thread Dave Thompson
On Behalf Of Gregory Sloop Sent: Tuesday, September 09, 2014 01:19 To: <mailto:openssl-users@openssl.org> openssl-users@openssl.org Subject: Re: Certificate pass phrase brute force... I used the asn1parse command [thanks Dave!] and while the key looks "old style" it parses as f

Re: Certificate pass phrase brute force...

2014-09-09 Thread Kyle Hamilton
xpect it to happen anytime >soon unless someone wants to submit a patch. > >Michael Wojcik >Technology Specialist, Micro Focus > > >From: Kyle Hamilton [mailto:aerow...@gmail.com] >Sent: Tuesday, 09 September, 2014 13:43 >To: openssl-users@openssl.org; Michael Wojcik >

Re: Certificate pass phrase brute force...

2014-09-09 Thread Gregory Sloop
n't be a bad idea, but it's not a high priority, so I wouldn't expect it to happen anytime soon unless someone wants to submit a patch. Michael Wojcik Technology Specialist, Micro Focus From: Kyle Hamilton [mailto:aerow...@gmail.com] Sent: Tuesday, 09 September, 2014 13:43

RE: Certificate pass phrase brute force...

2014-09-09 Thread Michael Wojcik
o I wouldn't expect it to happen anytime soon unless someone wants to submit a patch. Michael Wojcik Technology Specialist, Micro Focus From: Kyle Hamilton [mailto:aerow...@gmail.com] Sent: Tuesday, 09 September, 2014 13:43 To: openssl-users@openssl.org; Michael Wojcik Subject: RE: Certifica

RE: Certificate pass phrase brute force...

2014-09-09 Thread Kyle Hamilton
fore encrypting it with your preferred cipher. > > >Michael Wojcik >Technology Specialist, Micro Focus > > >From: owner-openssl-us...@openssl.org >[mailto:owner-openssl-us...@openssl.org] On Behalf Of Gregory Sloop >Sent: Tuesday, 09 September, 2014 01:19 >To: openssl-users@ope

RE: Certificate pass phrase brute force...

2014-09-09 Thread Michael Wojcik
sl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] On Behalf Of Gregory Sloop Sent: Tuesday, 09 September, 2014 01:19 To: openssl-users@openssl.org Subject: Re: Certificate pass phrase brute force... I used the asn1parse command [thanks Dave!] and while the key looks "old style" it pa

Re: Certificate pass phrase brute force...

2014-09-08 Thread Gregory Sloop
I used the asn1parse command [thanks Dave!] and while the key looks "old style" it parses as follows: 50:d=4 hl=2 l= 8 prim: OBJECT:des-ede3-cbc Which appears to equate to: des-ede3-cbc Three key triple DES EDE in CBC mode The full asn parse is: --- 0:d=0 hl=4 l=2446 c

RE: Certificate pass phrase brute force...

2014-09-08 Thread Dave Thompson
For the legacy formats (dashes-BEGIN PRIVATE RSA KEY or PRIVATE EC KEY) just look on the DEK-Info: header line. For PKCS#8 format (dashes-BEGIN ENCRYPTED PRIVATE KEY) do openssl asn1parse and. From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] On Behalf O

Re: Certificate pass phrase brute force...

2014-09-08 Thread Gregory Sloop
Well, as I said, given my reading of the code, the newest version of EasyRSA [line 861] shows the following: local crypto="-des3" It's in the set_pass function. [On further review of the code, this appears to only be used by the "set-rsa-pass" or "set-ec-pass" functions, and I can't determine w

Re: Certificate pass phrase brute force...

2014-09-08 Thread Jeffrey Walton
I think it's safe to assume that 3DES is almost certainly a lousier choice than AES or Camellia on multiple fronts. Two key triple DES provides about 80-bits of security, and three key triple DES provides 112-bits of security. Do you know which they are using? AES-128 provides about 128-bits of se

Re: Certificate pass phrase brute force...

2014-09-08 Thread Gregory Sloop
el Wojcik Technology Specialist, Micro Focus From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] On Behalf Of Gregory Sloop Sent: Friday, 05 September, 2014 16:32 To: Salz, Rich Subject: Re: Certificate pass phrase brute force... There is nothing special about crac

RE: Certificate pass phrase brute force...

2014-09-08 Thread Michael Wojcik
n't look like a plausible threat to me, unless you're protecting something really valuable. Disclaimer - I haven't double-checked any of those figures. Does that help? Michael Wojcik Technology Specialist, Micro Focus From: owner-openssl-us...@openssl.org [mailto:owner-opens

Re: Certificate pass phrase brute force...

2014-09-05 Thread Kyle Hamilton
05/2014 3:33 PM (GMT-05:00) >To: openssl-users@openssl.org >Cc: >Subject: Re: Certificate pass phrase brute force... > >That is easy. Just restrict the number of different passwords per day. >Any account. Thus the old school brute force idea passes out the >wind

Re: Certificate pass phrase brute force...

2014-09-05 Thread Gregory Sloop
There is nothing special about cracking a certificate password versus any other password. There is a lot of literature out there; a web search will easily give you enough information to be depressed. I think your biggest faulty assumption is that your users will pick truly random 10char passw

RE: Certificate pass phrase brute force...

2014-09-05 Thread Michael Wojcik
an AT&T 4G LTE smartphone Original message From: Gregory Sloop <mailto:gr...@sloop.net> Date:09/05/2014 1:36 PM (GMT-05:00) To: openssl-users@openssl.org<mailto:openssl-users@openssl.org> Cc: Subject: Certificate pass phrase brute force... General question: I've done a

Re: Certificate pass phrase brute force...

2014-09-05 Thread netout net
message > From: dave paxton > Date:09/05/2014 3:33 PM (GMT-05:00) > To: openssl-users@openssl.org > Cc: > Subject: Re: Certificate pass phrase brute force... > > That is easy. Just restrict the number of different passwords per day. > Any account. Thus the old

Re: Certificate pass phrase brute force...

2014-09-05 Thread dave paxton
sponse, but deplore your rudeness > > > Sent via the Samsung GALAXY S® 5, an AT&T 4G LTE smartphone > > > Original message > From: dave paxton > Date:09/05/2014 3:33 PM (GMT-05:00) > To: openssl-users@openssl.org > Cc: > Subject: Re: Certificate

Re: Certificate pass phrase brute force...

2014-09-05 Thread flgirl799901
.org Cc: Subject: Re: Certificate pass phrase brute force... That is easy. Just restrict the number of different passwords per day. Any account. Thus the old school brute force idea passes out the window. Most of what you are looking at it a signing issue. Basically one person do

RE: Certificate pass phrase brute force...

2014-09-05 Thread Michael Wojcik
#x27;m afraid. Michael Wojcik Technology Specialist, Micro Focus From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] On Behalf Of Gregory Sloop Sent: Friday, 05 September, 2014 13:37 To: openssl-users@openssl.org Subject: Certificate pass phrase brute force... General question:

Re: Certificate pass phrase brute force...

2014-09-05 Thread dave paxton
Original message > From: Gregory Sloop > Date:09/05/2014 1:36 PM (GMT-05:00) > To: openssl-users@openssl.org > Cc: > Subject: Certificate pass phrase brute force... > > General question: > > I've done a number of searches and can't find a lot

RE: Certificate pass phrase brute force...

2014-09-05 Thread Salz, Rich
There is nothing special about cracking a certificate password versus any other password. There is a lot of literature out there; a web search will easily give you enough information to be depressed. I think your biggest faulty assumption is that your users will pick truly random 10char passwor

RE: Certificate pass phrase brute force...

2014-09-05 Thread flgirl799901
How do I unsubscribe from all of this? Sent via the Samsung GALAXY S® 5, an AT&T 4G LTE smartphone Original message From: Gregory Sloop Date:09/05/2014 1:36 PM (GMT-05:00) To: openssl-users@openssl.org Cc: Subject: Certificate pass phrase brute force... Gen

Certificate pass phrase brute force...

2014-09-05 Thread Gregory Sloop
General question: I've done a number of searches and can't find a lot about the subject. [I've searched the list archives too...at least as best I could.] In several cases, the most obvious being OpenVPN, I use client certificates generated by openssl, with a pass-phrase [password]. This means