Using s_client to send additional (spurious) certificates

2024-07-09 Thread Andrew Lee-Thorp
Hello, Can s_client be used to send additional certificates (i.e. certificates that are not part of the chain for the current connection) I am trying to do the following (pseudocode): s_client -key myclient.key -cert myclient.cer -verifyCAfile expectedserverCA -connect server:port

Re: Query reg. using certificates bigger than 4k for EAP-TLS

2021-10-20 Thread Jan Just Keijser
On Wed, Oct 20, 2021 at 3:26 PM Vishal Sinha <mailto:vishals1...@gmail.com>> wrote: Hi We are using openssl 1.1.1c version on our client and server. Client and Server are doing EAP-TLS authentication using certificates which are more than 4k in size (using 1

Re: Query reg. using certificates bigger than 4k for EAP-TLS

2021-10-20 Thread Benjamin Kaduk via openssl-users
I'm also a bit confused at how this became the limiting factor for the application in question. https://datatracker.ietf.org/doc/html/draft-ietf-emu-eaptlscert-08 has some discussion of how large certificates can cause issues for EAP (as well as some guidance to EAP deployments as to h

Re: Query reg. using certificates bigger than 4k for EAP-TLS

2021-10-20 Thread Matt Caswell
Hi We are using openssl 1.1.1c version on our client and server. Client and Server are doing EAP-TLS authentication using certificates which are more than 4k in size (using 1 root CA and 2 intermediate CAs). We noticed that the server is not able to handle it gracefully due

Re: Query reg. using certificates bigger than 4k for EAP-TLS

2021-10-20 Thread Vishal Sinha
t; > We are using openssl 1.1.1c version on our client and server. Client and > Server are doing EAP-TLS authentication using certificates which are more > than 4k in size (using 1 root CA and 2 intermediate CAs). We noticed that > the server is not able to handle it gracefully due to ins

Re: Query reg. using certificates bigger than 4k for EAP-TLS

2021-10-20 Thread Matt Caswell
On 20/10/2021 10:56, Vishal Sinha wrote: We are using openssl 1.1.1c version on our client and server. Client and Server are doing EAP-TLS authentication using certificates which are more than 4k in size (using 1 root CA and 2 intermediate CAs). We noticed that the server is not able to

Query reg. using certificates bigger than 4k for EAP-TLS

2021-10-20 Thread Vishal Sinha
Hi We are using openssl 1.1.1c version on our client and server. Client and Server are doing EAP-TLS authentication using certificates which are more than 4k in size (using 1 root CA and 2 intermediate CAs). We noticed that the server is not able to handle it gracefully due to insufficient buffer

Re: [openssl-users] Verifying Android hardware attestation certificates with OpenSSL

2021-07-22 Thread Philip Prindeville
Did you ever get to the root of this? -Philip > On Oct 30, 2018, at 5:52 PM, Pietu Pohjalainen wrote: > > Dear all, > > I have been trying to verify hardware attestation certificates originating > from different Android phones with the OpenSSL tool. There seems to

Re: SSL_connect with TLS 1.3 and client Certificates

2021-07-14 Thread Christian Schmidt
On 14/07/2021 13:31, Matt Caswell wrote: > > > On 13/07/2021 19:44, Christian Schmidt wrote: >> Hello all, >> >> I am currently trying to build both client and server of an application >> that uses TLS 1.3 and mutual authentication using certificates. The &g

Re: SSL_connect with TLS 1.3 and client Certificates

2021-07-14 Thread Matt Caswell
On 13/07/2021 19:44, Christian Schmidt wrote: Hello all, I am currently trying to build both client and server of an application that uses TLS 1.3 and mutual authentication using certificates. The application works so far - I can establish connections, certificates are verified, data is

SSL_connect with TLS 1.3 and client Certificates

2021-07-13 Thread Christian Schmidt
Hello all, I am currently trying to build both client and server of an application that uses TLS 1.3 and mutual authentication using certificates. The application works so far - I can establish connections, certificates are verified, data is successfully transmitted, etc. However, I have an

Re: How to dump all certificates from a file?

2021-04-06 Thread David von Oheimb
print all certs. David On 7 April 2021 04:58:38 CEST, Nan Xiao wrote: > Hi Viktor, > > > By "a file" you clearly mean a "PEM file" with one or more certificates > exclosed in "-BEGIN ...".."-END ..." delimiters. > > Ye

Re: How to dump all certificates from a file?

2021-04-06 Thread Nan Xiao
Hi Viktor, > By "a file" you clearly mean a "PEM file" with one or more certificates exclosed in "-BEGIN ...".."-END ..." delimiters. Yes, this is what I mean. > openssl crl2pkcs7 -nocrl -certfile somefile.pem | opessl pkcs7 -prin

Re: How to dump all certificates from a file?

2021-04-06 Thread Viktor Dukhovni
On Wed, Apr 07, 2021 at 10:14:42AM +0800, Nan Xiao wrote: > Greetings from me! By default openssl-x509 can only dump one > certificate from the file: By "a file" you clearly mean a "PEM file" with one or more certificates exclosed in "-BEGIN ..."..&

How to dump all certificates from a file?

2021-04-06 Thread Nan Xiao
.html), and can't find a method to dump all certificates. Could anyone give some clues in dumping all certificates from a file? Thanks very much in advance! Best Regards Nan Xiao

Re: Parsing and generating CBOR certificates?

2021-01-22 Thread Hubert Kario
On Thursday, 21 January 2021 13:05:21 CET, David von Oheimb wrote: I'd welcome support for CBOR(-encoded) certificates since they can save a lot of space for both the data itself and the code handling it, which may be vital for IoT scenarios, for instance. It looks like the standardizati

Re: Parsing and generating CBOR certificates?

2021-01-21 Thread Blumenthal, Uri - 0553 - MITLL
> I'd welcome support for CBOR(-encoded) certificates since they can save a lot > of space > for both the data itself and the code handling it, which may be vital for IoT > scenarios, for instance. > It looks like the standardization of their definition got pretty far al

Re: Parsing and generating CBOR certificates?

2021-01-21 Thread Russ Housley
Uri: > > Unfortunately, there's no ASN.1 -> CBOR codec generator, AFAIK, which is why > I'm asking here. Nope, and if there were, it would not generate the same result as the compressions routines that Ben referenced. Russ

Re: Parsing and generating CBOR certificates?

2021-01-21 Thread David von Oheimb
I'd welcome support for CBOR(-encoded) certificates since they can save a lot of space for both the data itself and the code handling it, which may be vital for IoT scenarios, for instance. It looks like the standardization of their definition got pretty far already. Although it is cert

Re: Parsing and generating CBOR certificates?

2021-01-20 Thread Blumenthal, Uri - 0553 - MITLL
e: > I meant not "CBOR protocol" (which, in all likelihood, doesn't and shouldn't exist) but CBOR encoding of X.509 certificates (which, hopefully, does exists). > > At least, I'm looking for a tool that would convert between these two encodings (DE

Re: Parsing and generating CBOR certificates?

2021-01-20 Thread Benjamin Kaduk via openssl-users
" (which, in all likelihood, doesn't and shouldn't > exist) but CBOR encoding of X.509 certificates (which, hopefully, does > exists). > > At least, I'm looking for a tool that would convert between these two > encodings (DER and CBOR) for specific objects (

Re: Parsing and generating CBOR certificates?

2021-01-20 Thread Blumenthal, Uri - 0553 - MITLL
I meant not "CBOR protocol" (which, in all likelihood, doesn't and shouldn't exist) but CBOR encoding of X.509 certificates (which, hopefully, does exists). At least, I'm looking for a tool that would convert between these two encodings (DER and CBOR) for specific

Re: Parsing and generating CBOR certificates?

2021-01-20 Thread Kaduk, Ben via openssl-users
k in progress. -Ben From: Blumenthal, Uri - 0553 - MITLL Sent: Wednesday, January 20, 2021 4:22 PM To: openssl-users Subject: Parsing and generating CBOR certificates? I need to work with CBOR-encoded certificates. Is there any way to use OpenSSL to parse and/or ge

Parsing and generating CBOR certificates?

2021-01-20 Thread Blumenthal, Uri - 0553 - MITLL
I need to work with CBOR-encoded certificates. Is there any way to use OpenSSL to parse and/or generate certs in CBOR encoding? Thanks Regards, Uri smime.p7s Description: S/MIME cryptographic signature

Re: Certificates Transparency list

2021-01-10 Thread Felipe Gasper
12:21 PM, Richard Simard > wrote: > > I would like to know if among you, if anyone would have a good example in > order to integrate a Certificates Transparency list into my certificates. > > Tank You! > Richard Simard >

Certificates Transparency list

2021-01-10 Thread Richard Simard
I would like to know if among you, if anyone would have a good example in order to integrate a Certificates Transparency list into my certificates. Tank You! Richard Simard

Re: CA no longer verifying certificates

2020-11-14 Thread Samuel Williams
Oh my, I figured it out after digging through the OpenSSL source code. My CA certificate and the client certificate both had the same common name, so they were clobbering each other. Changing the name of the CA certificate solved the problem. On Sun, 15 Nov 2020 at 14:10, Samuel Williams wrote:

CA no longer verifying certificates

2020-11-14 Thread Samuel Williams
Hello I generate a CA (self signed), and then generate a certificate from that CA, which should be used by a HTTP/2 client and server during testing. This code was working as recently as 12 months ago, but it seems like something has stopped it from verifying correctly. Here is how the CA is gen

Re: SSL_ERROR_WANT_TIME: Pause SSL_connect to fetch intermediate certificates

2020-08-20 Thread Matt Caswell
but I'm not sure if that's even technically possible. A workaround might be for us to expose some API to set it - but exposing such internal details is also quite horrible. > > >> One possibility that springs to mind (which is also an ugly hack) is to >> defer the val

Re: SSL_ERROR_WANT_TIME: Pause SSL_connect to fetch intermediate certificates

2020-08-19 Thread Alex Rousskov
use something ... } Please note that replacing "if" with "while" in mycallback() would make the compiled code identical with myengine() but would not solve the problem: Instead of the failed assertion, the callback would get into an infinite loop... The callback _relies_

Re: SSL_ERROR_WANT_TIME: Pause SSL_connect to fetch intermediate certificates

2020-08-19 Thread Matt Caswell
lback execution, fetch the intermediate certificates, > and then complete validation before happily returning to the > SSL_connect() caller. Life is easy when you can use threads or block > thousands of concurrent transactions! I suspect this is the way most people do it. > Wh

SSL_ERROR_WANT_TIME: Pause SSL_connect to fetch intermediate certificates

2020-08-18 Thread Alex Rousskov
Hello, TLDR: How can we pause the SSL_connect() progress and return to its caller after the origin certificate is fetched/decrypted, but before OpenSSL starts validating it (so that we can fetch the missing intermediate certificates without threads or blocking I/O)? ASYNC_pause_job() does not

Re: [EXTERNAL] Re: Unusual certificates

2020-06-25 Thread Angus Robertson - Magenta Systems Ltd
> The second certificate seems garbaged at the 4th RDN of the > issuerName. > The Base64 edition might have added or deleted some characters. Sorry, looks like my manual word wrapping lost a character: -BEGIN CERTIFICATE- MIIHbDCCBVSgAwIBAgIIO7L2MrGOOTMwDQYJKoZIhvcNAQELBQAwgYAxCzAJBgNV

Re: Unusual certificates

2020-06-25 Thread Jakob Bohm via openssl-users
On 2020-06-25 13:25, Hubert Kario wrote: On Thursday, 25 June 2020 12:15:00 CEST, Angus Robertson - Magenta Systems Ltd wrote: A client is having problems reading Polish Centum issued personal certificates with OpenSSL 1.1.1, which read OK with 1.1.0 and earlier, mostly. Using PEM_read_bio_X509

Re: [EXTERNAL] Re: Unusual certificates

2020-06-25 Thread Erwann Abalea via openssl-users
original certificates supplied by the end user had unwrapped base64 blocks, lines 2,500 long. I wrapped them for email. If I try the asn1parse command on the wrapped certificates, they now attempt to parse, the OK is fine, the bad one now gives an error message from asn1parse

Re: Unusual certificates

2020-06-25 Thread Angus Robertson - Magenta Systems Ltd
More information, the original certificates supplied by the end user had unwrapped base64 blocks, lines 2,500 long. I wrapped them for email. If I try the asn1parse command on the wrapped certificates, they now attempt to parse, the OK is fine, the bad one now gives an error message from

Re: Unusual certificates

2020-06-25 Thread Hubert Kario
On Thursday, 25 June 2020 12:15:00 CEST, Angus Robertson - Magenta Systems Ltd wrote: A client is having problems reading Polish Centum issued personal certificates with OpenSSL 1.1.1, which read OK with 1.1.0 and earlier, mostly. Using PEM_read_bio_X509 with some of these certificates says

Unusual certificates

2020-06-25 Thread Angus Robertson - Magenta Systems Ltd
A client is having problems reading Polish Centum issued personal certificates with OpenSSL 1.1.1, which read OK with 1.1.0 and earlier, mostly. Using PEM_read_bio_X509 with some of these certificates says error::lib(0):func(0):reason(0), while the X509 command line tool says 'unab

Enabling SSL Virtual Hosts on Apache Web Server and Installing Free SSL Certificates on CentOS Web Panel Web Hosting Control Panel

2020-02-29 Thread Turritopsis Dohrnii Teo En Ming
Subject: Enabling SSL Virtual Hosts on Apache Web Server and Installing Free SSL Certificates on CentOS Web Panel Web Hosting Control Panel Author: Mr. Turritopsis Dohrnii Teo En Ming, Singapore Date: 1st Mar 2020, Sunday EXTREMELY DETAILED INSTRUCTIONS OF TEO EN MING'S

Re: Problems adding specific extensions to signed certificates

2020-02-10 Thread Michael Leone
On Fri, Feb 7, 2020 at 4:02 PM Michael Wojcik wrote: > > > From: Michael Leone [mailto:tur...@mike-leone.com] > > Sent: Friday, February 07, 2020 13:13 > > > > I've got it almost all figured out, except how to get a subjectAltName > > automatically populated by the CN of the requestor. My requests

RE: Problems adding specific extensions to signed certificates

2020-02-07 Thread Michael Wojcik
> From: Michael Leone [mailto:tur...@mike-leone.com] > Sent: Friday, February 07, 2020 13:13 > > I've got it almost all figured out, except how to get a subjectAltName > automatically populated by the CN of the requestor. My requests aren't > asking for a SAN, but Chrome isn't happy without one, so

Re: Problems adding specific extensions to signed certificates

2020-02-07 Thread Michael Leone
On Fri, Feb 7, 2020 at 3:08 PM Michael Wojcik wrote: > > > From: Michael Leone [mailto:tur...@mike-leone.com] > > Sent: Friday, February 07, 2020 11:55 > > > > How is that this works for everyone else, and not me? :-) > > It doesn't. > > I just reviewed this whole note stream, and realized you're

RE: Problems adding specific extensions to signed certificates

2020-02-07 Thread Michael Wojcik
> From: Michael Leone [mailto:tur...@mike-leone.com] > Sent: Friday, February 07, 2020 11:55 > > How is that this works for everyone else, and not me? :-) It doesn't. I just reviewed this whole note stream, and realized you're using "openssl req" to create the certificate, rather than "openssl c

Re: Problems adding specific extensions to signed certificates

2020-02-07 Thread Michael Leone
On Fri, Feb 7, 2020 at 1:46 PM Michael Leone wrote: > > On Fri, Feb 7, 2020 at 12:35 PM Michael Wojcik > wrote: > > Or copied using the copy_extensions option, as noted in the discussion of > > that issue. > > > > In the OpenSSL configuration file used by "openssl ca", in the CA section > > (th

Re: Problems adding specific extensions to signed certificates

2020-02-07 Thread Michael Leone
On Fri, Feb 7, 2020 at 12:35 PM Michael Wojcik wrote: > Or copied using the copy_extensions option, as noted in the discussion of > that issue. > > In the OpenSSL configuration file used by "openssl ca", in the CA section > (that is, the section named by the default_ca option, or in the section

RE: Problems adding specific extensions to signed certificates

2020-02-07 Thread Michael Wojcik
onably recent version of OpenSSL. So: 1. Make sure your threat model allows copying extensions from CSRs to certificates. 2. Make sure your CA configuration has "copy_extensions=copy" (or possibly copyall, though use cases justifying that are less common). 3. Make sure the CSRs you're

Re: Problems adding specific extensions to signed certificates

2020-02-07 Thread Salz, Rich via openssl-users
I think the mismatch is that CSR extensions are not carried over; they have to be added at signing time. See https://github.com/openssl/openssl/issues/10458

Re: Problems adding specific extensions to signed certificates

2020-02-07 Thread Michael Leone
On Fri, Feb 7, 2020 at 11:02 AM Sergio NNX wrote: > > This is the basics of OpenSSL! > > You would like to add extensions to a CSR or the problem arises when signing > it? Yes, when I sign, I get no extensions that are requested in the CSR. Nor are any added, when I sign (requested or not). > >

Re: Problems adding specific extensions to signed certificates

2020-02-07 Thread Michael Leone
]" or perhaps "[ server_cert ]". > > > Nope, no key extensions in the generated cert, even when passing > > "-extensions user_cert" on the CLI. > > > I'll keep plugging away, I guess. > > What's in the [user_cert] stanza? This:

Re: Problems adding specific extensions to signed certificates

2020-02-07 Thread Sergio NNX
From: openssl-users on behalf of Michael Leone Sent: Saturday, 8 February 2020 2:01 AM To: openssl-users@openssl.org Subject: Re: Problems adding specific extensions to signed certificates On Thu, Feb 6, 2020 at 5:45 PM Viktor Dukhovni wrote: > > On Thu, F

Re: Problems adding specific extensions to signed certificates

2020-02-07 Thread Michael Leone
t; certificate. But I don't want to have to use an addon file, I want to > > add parameters to all signed certificates. > > The documentation of x509(1) which you're using with "-req" as a > mini-CA, states explicitly: > >-extfile filename >

Re: Problems adding specific extensions to signed certificates

2020-02-07 Thread Michael Leone
On Fri, Feb 7, 2020 at 8:54 AM Michael Leone wrote: > Thanks, tho, I did learn a thing or two. I see from this example > > openssl req -config $cfgdir/openssl-root.cnf $passin \ > -set_serial 0x$(openssl rand -hex $sn)\ > -keyform $format -outform $format\ > -key $rootca/private/ca.

Re: Problems adding specific extensions to signed certificates

2020-02-06 Thread Michael Leone
ficate. But I don't want to have to use an addon file, I want to > > add parameters to all signed certificates. > > The documentation of x509(1) which you're using with "-req" as a > mini-CA, states explicitly: > >-extfile filename >

Re: Problems adding specific extensions to signed certificates

2020-02-06 Thread Viktor Dukhovni
parameters to all signed certificates. The documentation of x509(1) which you're using with "-req" as a mini-CA, states explicitly: -extfile filename File containing certificate extensions to use. If not specified then no extensions are added to the

Problems adding specific extensions to signed certificates

2020-02-06 Thread Michael Leone
. Oh, I can add extensions by signing and using the -extfile option, and specifying a file with the specific options I want to give the certificate. But I don't want to have to use an addon file, I want to add parameters to all signed certificates. keyUsage=digitalSignature,keyEn

Re: ECDSA curves and certificates in 1.0.2X vs 1.1.x

2019-06-27 Thread Michael Richardson
Viktor Dukhovni wrote: > On Tue, Jun 25, 2019 at 10:38:50AM -0400, Michael Richardson wrote: >> openssl req -new -newkey ec -pkeyopt ec_paramgen_curve:prime256v1 \ >> -nodes -subj "/CN=${ULA_HOSTNAME}" \ >> -keyout ${KEY_NAME}.key -out ${KEY_NAME}.csr -outform DER \ >> -reqex

Re: ECDSA curves and certificates in 1.0.2X vs 1.1.x

2019-06-26 Thread Viktor Dukhovni
; affected this? Made it work before. My impression is that 1.0.x did *not* > support ECDSA certificates, yet it seemed to generate CSRs, just does not > put in the > right OIDs in the public parts such that it is recognized by others. > *** OpenSSL 1.0.2 has reasonably complete ECDS

ECDSA curves and certificates in 1.0.2X vs 1.1.x

2019-06-26 Thread Michael Richardson
t think about the version that there) *** My question is: is there some build options that I can't see that might have affected this? Made it work before. My impression is that 1.0.x did *not* support ECDSA certificates, yet it seemed to generate CSRs, just does not put in the right

Re: [openssl-users] File permissions on keys, csr, and certificates

2018-11-14 Thread Peter Magnusson
root:root, chmod 400. And ideally your Root CA files should not be hosted on your web server, otherwise a server compromise also compromises your root authority. https://redmine.lighttpd.net/projects/1/wiki/docs_ssl Permissions Be careful to keep your .pem file private! Lighttpd reads all pemfiles

[openssl-users] File permissions on keys, csr, and certificates

2018-11-09 Thread Ikwyl6 via openssl-users
Hi - I created a question on Super User about questions on file permissions and what the file permissions should be on created files. See link here: https://superuser.com/questions/1368747/file-permissions-for-openssl-created-files-for-https-web-server-lighttpd Could someone comment on what file

[openssl-users] Verifying Android hardware attestation certificates with OpenSSL

2018-10-30 Thread Pietu Pohjalainen
Dear all, I have been trying to verify hardware attestation certificates originating from different Android phones with the OpenSSL tool. There seems to be not too much information about how are these supposed to work. With OpenSSL I'm getting mixed results. Android developer spe

Re: [openssl-users] [openssl]: Subject alternative names not recognized when signing certificates

2018-09-23 Thread Viktor Dukhovni
> On Sep 22, 2018, at 8:28 AM, Carsten wrote: > > I can sign certificate requests successfully, BUT > if the request contains SAN attributs (subjectalternatenames) they are > ignored -not visible in the signed certificate. > > I found many exambles how to create a SAN-Certificate using t

[openssl-users] [openssl]: Subject alternative names not recognized when signing certificates

2018-09-22 Thread Carsten
Hi list, this is about setting up a certificate authority to sign incoming (forgeign) certificate requests. I have installed /var/caintermed # openssl version -a OpenSSL 1.1.2-dev xx XXX built on: Fri Sep 21 10:19:51 2018 UTC platform: linux-armv4 opti

Re: [openssl-users] Preventing Handshake Termination Because of Unverifiable Client Certificates

2018-09-11 Thread Viktor Dukhovni
nything you want to pass to SSL_CTX_set_client_CA_list(3) See the docs. Some clients (IIRC Java's TLS stack) don't send any client certificates unless the server solicits a certificate from a matching CA, and leaving the list empty may not work for such clients. -- Viktor. -- openssl-use

Re: [openssl-users] Preventing Handshake Termination Because of Unverifiable Client Certificates

2018-09-10 Thread Armen Babikyan
gt; > On Sep 11, 2018, at 2:09 AM, Armen Babikyan > wrote: > > > > I have a question regarding openssl and verification of client > certificates. Is there a way to have an openssl-enabled server ask for a > client certificate, and when it receives one it can't veri

Re: [openssl-users] Preventing Handshake Termination Because of Unverifiable Client Certificates

2018-09-10 Thread Viktor Dukhovni
> On Sep 11, 2018, at 2:09 AM, Armen Babikyan wrote: > > I have a question regarding openssl and verification of client certificates. > Is there a way to have an openssl-enabled server ask for a client > certificate, and when it receives one it can't verify, rather

[openssl-users] Preventing Handshake Termination Because of Unverifiable Client Certificates

2018-09-10 Thread Armen Babikyan
Hello, I have a question regarding openssl and verification of client certificates. Is there a way to have an openssl-enabled server ask for a client certificate, and when it receives one it can't verify, rather than immediately terminating the handshake, it would allow the connection, but

Re: [openssl-users] openssl.cnf asking Subject Alternative Names certificates.

2017-10-13 Thread Jorge Novo
Hi, On 13 October 2017 at 12:03, lists wrote: > On 10/10/2017 05:40 PM, Jorge Novo wrote: > > As most of us know, the Google Chrome Navigator ask about Subject > Alternative Name instead the Common Name. > > I want to distribute a little *openssl.cnf* file for creation the CSR > files with my

Re: [openssl-users] openssl.cnf asking Subject Alternative Names certificates.

2017-10-13 Thread lists
On 10/10/2017 05:40 PM, Jorge Novo wrote: Hi everyone,   As most of us know, the Google Chrome Navigator ask about Subject Alternative Name instead the Common Name. I want to distribute a little /openssl.cnf/ file for creation the CSR files with my specific values and establish the Subject A

[openssl-users] openssl.cnf asking Subject Alternative Names certificates.

2017-10-10 Thread Jorge Novo
Hi everyone, As most of us know, the Google Chrome Navigator ask about Subject Alternative Name instead the Common Name. I want to distribute a little *openssl.cnf* file for creation the CSR files with my specific values and establish the Subject Alternative Name = Common Name. I want yo ask ab

Re: [openssl-users] Hardware client certificates moving to Centos 7

2017-09-28 Thread Robert Moskowitz
/legacy-settings allows the reading of Md5 Client certificates (which are still being installed in "not released yet" phones) I am almost concerned this is being done intentionally to meet some security downgrade requirement. I the more reason to only use this cert to bootstrap yo

Re: [openssl-users] Hardware client certificates moving to Centos 7

2017-09-28 Thread Stuart Marsden
Hi thanks for all the comments and suggestions, especially the ones I could understand centos 7 yum upgrade openssl version gives: OpenSSL 1.0.2k-fips 26 Jan 2017 it looks like echo 'LegacySigningMDs md5' >> /etc/pki/tls/legacy-settings allows the reading of Md5 Cli

Re: [openssl-users] Hardware client certificates moving to Centos 7

2017-09-27 Thread Michael Wojcik
> From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf > Of Jeffrey Walton > Sent: Wednesday, September 27, 2017 13:15 > To: OpenSSL Users > Subject: Re: [openssl-users] Hardware client certificates moving to Centos 7 > > > > > Heck, MD4 and MDC

Re: [openssl-users] Hardware client certificates moving to Centos 7

2017-09-27 Thread Jochen Bern
On 09/27/2017 10:10 PM, Michael Wojcik wrote: > On Behalf Of Jochen Bern > Sent: Wednesday, September 27, 2017 06:51 >> I don't know offhand which OpenSSL versions did away with MD5, but you >> *can* install an 0.9.8e (+ RHEL/CentOS backported security patches) >> straight off CentOS 7 repos > > U

Re: [openssl-users] Hardware client certificates moving to Centos 7

2017-09-27 Thread Freemon Johnson
has GOST, MD4, > MD5, MDC2, RIPEMD-60, SHA, SHA1, SHA-2 (all standard lengths), and > Whirlpool. > > Some of those algorithms may still needed for some use cases. For > example, Apple still ships (or used to ship until recently) some > certificates that use MD2. They were present

Re: [openssl-users] Hardware client certificates moving to Centos 7

2017-09-27 Thread Jeffrey Walton
iguration, I believe. I'm looking at 1.0.2j here and it has GOST, MD4, > MD5, MDC2, RIPEMD-60, SHA, SHA1, SHA-2 (all standard lengths), and Whirlpool. Some of those algorithms may still needed for some use cases. For example, Apple still ships (or used to ship until recently) some certifica

Re: [openssl-users] Hardware client certificates moving to Centos 7

2017-09-27 Thread Freemon Johnson
rs@openssl.org > > Subject: Re: [openssl-users] Hardware client certificates moving to > Centos 7 > > > > I don't know offhand which OpenSSL versions did away with MD5, but you > > *can* install an 0.9.8e (+ RHEL/CentOS backported security patches) > > straight o

Re: [openssl-users] Hardware client certificates moving to Centos 7

2017-09-27 Thread Michael Wojcik
> From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf > Of Jochen Bern > Sent: Wednesday, September 27, 2017 06:51 > To: openssl-users@openssl.org > Subject: Re: [openssl-users] Hardware client certificates moving to Centos 7 > > I don't know offh

Re: [openssl-users] Hardware client certificates moving to Centos 7

2017-09-27 Thread Jochen Bern
On 09/27/2017 02:07 PM, Stuart Marsden wrote: > Is there a way a can install a version of openssl on a dedicated standalone > Centos 7 server which will support these phones? > That would be preferable to me than having to leave Centos 6 servers just > for this I don't know offhand which OpenSSL

Re: [openssl-users] Hardware client certificates moving to Centos 7

2017-09-27 Thread Robert Moskowitz
On 09/27/2017 08:07 AM, Stuart Marsden wrote: Hi I think I know what you are going to say - MD5? Lots of problems with that cert. If you have some connection with the vendor, have them read IEEE 802.1AR-2009 standard for Device Identity credentials. You will be supporting this phone diff

Re: [openssl-users] Hardware client certificates moving to Centos 7

2017-09-27 Thread Stuart Marsden
Hi I think I know what you are going to say - MD5? I ran openssl s_server -verify , then ran the x509 command as you suggested using the captured client certificate This phone model has only just gone into production, and I am using a "preview version" of the hardware Is there a way a can in

Re: [openssl-users] Hardware client certificates moving to Centos 7

2017-09-26 Thread Robert Moskowitz
On 09/26/2017 08:04 PM, Kyle Hamilton wrote: openssl x509 -noout -text -in clientcertificate.pem You may need to extract the client certificate from wireshark, but you could also get it from openssl s_server. Specifically, that error message is suggesting that there's a message digest encoded

Re: [openssl-users] Hardware client certificates moving to Centos 7

2017-09-26 Thread Kyle Hamilton
openssl x509 -noout -text -in clientcertificate.pem You may need to extract the client certificate from wireshark, but you could also get it from openssl s_server. Specifically, that error message is suggesting that there's a message digest encoded into the certificate which is unknown to the tru

Re: [openssl-users] Hardware client certificates moving to Centos 7

2017-09-26 Thread Robert Moskowitz
On 09/26/2017 11:26 AM, Stuart Marsden wrote: Hi I have Centos/Apache servers for securely provisioning IP phones using hardware client certificates embedded in the phones. for this test I have allowed all protocols and ciphers on Centos 6 this works fine, the rpms are: openssl098e-0.9.8e

Re: [openssl-users] Hardware client certificates moving to Centos 7

2017-09-26 Thread Stuart Marsden
Sorry how can I tell ? I can run a wireshark if necessary thanks > On 26 Sep 2017, at 16:36, Wouter Verhelst wrote: > > On 26-09-17 17:26, Stuart Marsden wrote: >> [ssl:info] [pid 1611] SSL Library Error: error:0D0C50A1:asn1 encoding >> routines:ASN1_item_verify:unknown message digest algori

Re: [openssl-users] Hardware client certificates moving to Centos 7

2017-09-26 Thread Wouter Verhelst
On 26-09-17 17:26, Stuart Marsden wrote: > [ssl:info] [pid 1611] SSL Library Error: error:0D0C50A1:asn1 encoding > routines:ASN1_item_verify:unknown message digest algorithm So which message digest algorithm is the client trying to use? -- Wouter Verhelst -- openssl-users mailing list To unsub

[openssl-users] Hardware client certificates moving to Centos 7

2017-09-26 Thread Stuart Marsden
Hi I have Centos/Apache servers for securely provisioning IP phones using hardware client certificates embedded in the phones. for this test I have allowed all protocols and ciphers on Centos 6 this works fine, the rpms are: openssl098e-0.9.8e-20.el6.centos.1.x86_64 openssl-1.0.1e-57.el6

[openssl-users] Creating requests and certificates with Subject Alternative Names

2017-09-21 Thread Angus Robertson - Magenta Systems Ltd
I'm creating X509 certificate requests and certificates in code, trying to add X509v3 Subject Alternative Name, with 1.1.0f. But if I add a list of four domains, ie: www1.mydomain www2.mydomain www3.mydomain www4.mydomain The certificate seems to ignore some and repeat others: X

Re: [openssl-users] Trusting certificates with the same subject name and overlapping validity periods

2017-09-20 Thread Jeffrey Walton
DN, but does not place matching distinct subject key identifiers > in the certificates it issues, then OpenSSL will not correctly handle > multiple candidate issuers that differ in the public key, but provide > no hints in the issued certificates which issuer to use. > > I'm not fami

Re: [openssl-users] Trusting certificates with the same subject name and overlapping validity periods

2017-09-20 Thread Jordan Brown
On 9/20/2017 2:25 PM, Viktor Dukhovni wrote: >> On Sep 20, 2017, at 12:33 PM, Jordan Brown >> wrote: >> >> Q: Does OpenSSL's trust-list verification support trusting multiple >> certificates with the same subject name and overlapping validity periods?

Re: [openssl-users] Trusting certificates with the same subject name and overlapping validity periods

2017-09-20 Thread Viktor Dukhovni
> On Sep 20, 2017, at 12:33 PM, Jordan Brown > wrote: > > Q: Does OpenSSL's trust-list verification support trusting multiple > certificates with the same subject name and overlapping validity periods? > > In more detail: > > We have customers who issue r

Re: [openssl-users] Trusting certificates with the same subject name and overlapping validity periods

2017-09-20 Thread Jordan Brown
On 9/20/2017 10:28 AM, Walter H. via openssl-users wrote: > On 20.09.2017 18:33, Jordan Brown wrote: >> >> Q:  Does OpenSSL's trust-list verification support trusting multiple >> certificates with the same subject name and overlapping validity periods? >> > do

Re: [openssl-users] Trusting certificates with the same subject name and overlapping validity periods

2017-09-20 Thread Walter H. via openssl-users
On 20.09.2017 18:33, Jordan Brown wrote: Q: Does OpenSSL's trust-list verification support trusting multiple certificates with the same subject name and overlapping validity periods? do these replacement certificates have the same serial number and the same private key? smim

[openssl-users] Trusting certificates with the same subject name and overlapping validity periods

2017-09-20 Thread Jordan Brown
Q:  Does OpenSSL's trust-list verification support trusting multiple certificates with the same subject name and overlapping validity periods? In more detail: We have customers who issue replacement certificates with the same subject name and different validity periods.  We'd like to

Re: [openssl-users] Doubt regarding O-SSL and setting the duration of certificates

2017-09-13 Thread Robert Moskowitz
On 09/13/2017 09:31 AM, Michael Richardson wrote: Robert Moskowitz wrote: > The devices never test out the lifetime of their certs. That is up to Exactly... (Do you think about the MacGyver/StarTrek/A-Team/Leverage/MissionImpossible plot line that goes along with each engineering decisio

Re: [openssl-users] Doubt regarding O-SSL and setting the duration of certificates

2017-09-13 Thread Erwann Abalea via openssl-users
> Le 13 sept. 2017 à 17:08, Michael Wojcik a > écrit : > >> From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf >> Of Michael Richardson >> Sent: Wednesday, September 13, 2017 09:32 >> >> I suspect that the value: literal value 1231235959Z will simply come to >> mean "

Re: [openssl-users] Doubt regarding O-SSL and setting the duration of certificates

2017-09-13 Thread Robert Moskowitz
certificates, the best you can do it put a very large value in the notAfter field. Some software may have issues around 32bit representation of classic Unix time_t and therefore have problems with times greater than 2038; OpenSSL does not have those problems. The OpenSSL command-line tools do not

Re: [openssl-users] Doubt regarding O-SSL and setting the duration of certificates

2017-09-13 Thread Michael Wojcik
> From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf > Of Michael Richardson > Sent: Wednesday, September 13, 2017 09:32 > > I suspect that the value: literal value 1231235959Z will simply come to > mean "the end of time", even after the year 10,000.  It has a well known >

Re: [openssl-users] Doubt regarding O-SSL and setting the duration of certificates

2017-09-13 Thread Salz, Rich via openssl-users
An X509v3 certificate has “notBefore” and “notAfter” fields. If either of those is not present, then it is not an X509v3 certificate. The time marked by those fields is the validity period. If you want “never expires” X509v3 certificates, the best you can do it put a very large value in the

Re: [openssl-users] Doubt regarding O-SSL and setting the duration of certificates

2017-09-13 Thread Michael Richardson
Robert Moskowitz wrote: > The devices never test out the lifetime of their certs. That is up to Exactly... (Do you think about the MacGyver/StarTrek/A-Team/Leverage/MissionImpossible plot line that goes along with each engineering decision?...) > validating servers. And the iDevID is no

  1   2   3   4   5   6   7   8   9   10   >