SSL cert chain validation & timestamp issues

2010-12-20 Thread travis+ml-openssl
So a friend ran into this lately; libnss, at least on Linux, checks that the signing cert (chain) is valid at the time of signature - as opposed to present time. (It may check present time as well - not sure on that) This makes for problems if you renew the cert, since the new cert will have a c

Re: Wider fallout from Debian issue?

2008-05-30 Thread travis+ml-openssl
On Wed, May 28, 2008 at 08:01:11PM +0200, Ger Hobbelt wrote: > Anything (such as passwords) which has been used on an *actual* > 'compromized box' (be it one of 'those Debian' releases or otherwise) > to _generate_ keys plus any keys _produced_ on such a compromised box > must be eradicated and are

Re: Wider fallout from Debian issue?

2008-05-30 Thread travis+ml-openssl
On Thu, May 29, 2008 at 10:14:12AM -0400, Victor Duchovni wrote: > And then knowing that attackers never choose these keys, users start > using these keys because attakers avoid them, and then attackers start > checking these first again, ... This way lies madness. Fix your premise > and don't chan

Re: Wider fallout from Debian issue?

2008-05-30 Thread travis+ml-openssl
On Wed, May 28, 2008 at 10:55:18PM -0700, David Schwartz wrote: > Okay, I guess I give up. I now realize that I had no idea what > you meant in your past few comments. What relevance do you think > this notion of weak keys has to do with this issue, since you > were the one who brought it up? > >

problem with PEM_read_SSL_SESSION when upgrading from 0.9.7 to 0.9.8g

2008-01-16 Thread travis+ml-openssl
Hi all! I've recently been put in charge of SSL, and I'm working my way through the O'Reilly book. However, I'm a bit stumped as to this problem. I tried to upgrade our build system to use OpenSSL 0.9.8g, and thought I succeeded. However, the code is blowing up. The code is for caching sessi

pem.h type inconsistencies in 0.9.8g

2008-01-16 Thread travis+ml-openssl
So this is from 0.9.8g's pem.h: #define PEM_read_SSL_SESSION(fp,x,cb,u) (SSL_SESSION *)PEM_ASN1_read( \ (char *(*)())d2i_SSL_SESSION,PEM_STRING_SSL_SESSION,fp,(char **)x,cb,u) And so is this: void * PEM_ASN1_read(d2i_of_void *d2i, const char *name, FILE *fp, void **x, pem_password_cb *cb, voi

Re: pem.h type inconsistencies in 0.9.8g

2008-01-17 Thread travis+ml-openssl
On Wed, Jan 16, 2008 at 07:29:45PM -0500, Victor Duchovni wrote: > No actual problem, in ANSI C pointers can be freely converted between > (type *) and (void *) and back. I'd call it an actual problem when a compilation of my C++ code bombs out because the OpenSSL header files don't compile in my

Re: pem.h type inconsistencies in 0.9.8g

2008-01-17 Thread travis+ml-openssl
On Thu, Jan 17, 2008 at 04:05:07PM -0600, [EMAIL PROTECTED] wrote: > So I guess I'll define a similar acro in my code now, but it'd be nice > if OpenSSL fixed it in the distribution so that I didn't have to work > around it... Ended up doing this: #define READ_SSL_SESSION(fp,x,cb,u) (SSL_SESSIO

interop between OpenSSL PKCS#7 (v1.5) and BC (CMS)

2008-03-06 Thread travis+ml-openssl
So I've got to interchange data with a Java-based environment. I believe their choice of libraries is with Bouncy Castle, which IIUC implements a newer version of PKCS#7 called CMS. We only have OpenSSL, which uses PKCS#7 v1.5.. Does anyone have experience with these kinds of situations? It has

testing upgrade from 0.9.7e to 0.9.8g

2008-03-06 Thread travis+ml-openssl
So we're testing out an upgrade from OpenSSL 0.9.7e to 0.9.8g, and we're mostly using the SSL network connection functionality, not the crypto lib. I am supposed to help with a test plan to make sure our stuff works properly, but I'm not sure what to test. I imagine that it has to be backward com