[prev in list] [next in list] [prev in thread] [next in thread] 

List:       openssl-dev
Subject:    [openssl.org #771] Bug report: Exportable key limit should be 1024 bits instead of 512 bits
From:       "Richard Levitte via RT" <rt () openssl ! org>
Date:       2003-11-28 22:40:36
[Download RAW message or body]


I just committed the proposed change.  It will appear in future 
snapshots and releases of OpenSSL.

Thanks for your contribution.  Ticket resolved.

[czhang2005@hotmail.com - Tue Nov 18 08:34:11 2003]:

> OpenSSL 0.9.7c 30 Sep 2003
> built on: Thu Nov 13 23:47:30 2003
> platform: VC-NT
> options:  bn(64,32) md2(int) rc4(idx,int) des(idx,cisc,4,long)
>    idea(int)
> blowfis
> h(idx)
> compiler: cl  /MDd /W3 /WX /Zi /Yd /Od /nologo -DOPENSSL_SYSNAME_WIN32
> -D_DEBUG
> -DL_ENDIAN -DWIN32_LEAN_AND_MEAN -DDEBUG -DDSO_WIN32
>    -DOPENSSL_SYSNAME_WINNT
> /Fd
> out32dll -DOPENSSL_NO_KRB5
> OPENSSLDIR: "/usr/local/ssl"
> 
> Problem description:
> With the release of OpenSSL 0.9.7c, people start to see the error "SSL
> routines:SSL3_CHECK_CERT_AND_ALGORITHM:missing
> export tmp rsa key:s3_clnt.c:1952" on the cient side, e.g.:
> http://www.mail-archive.com/openssl-users@openssl.org/msg33162.html
> 
> Analysis:
> The root of this problem is in line 109, x509type.c:
> 	if (EVP_PKEY_size(pk) <= 512/8)	/* /8 because it's 512 bits 
we look
> New export regulations allow the export of 56-bit encryption and 1024-
>    bit
> key exchange(check out #define SSL_EXPORT_PKEYLENGTH(a)
>    (SSL_IS_EXPORT40(a)
> ? 512 : 1024) in ssl_locl.h), but this line will attribute any PKEY
>    size
> bigger than 512 bit as non-exportable.  In my scenario: the server has
>    only
> export license, and chooses the cipher EXP1024-RC4-SHA. The server's
>    RSA key
> is also 1024 bit, so it opts NOT to use ephemeral key exchange. Then
>    on the
> client side, OpenSSL correctly identifies EXP1024-RC4-SHA as
>    exportable, but
> incorrectly treats the server's 1024 bit RSA key used to sign the x509
> certificate as non-exportable. Given that no ephemeral key is used to
>    work
> around the "problem", the client side reports error "missing export
>    tmp rsa
> key" and fails the handshake.
> 
> A possible solution would be to change it to:
>                   if (EVP_PKEY_size(pk) <= 1024/8)
> 
> Thanks,
> Charles Zhang
> czhang2005@hotmail.com
> 
> _________________________________________________________________
> Great deals on high-speed Internet access as low as $26.95.
> https://broadband.msn.com (Prices may vary by service area.)
> 


-- 
Richard Levitte
levitte@openssl.org
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       openssl-dev@openssl.org
Automated List Manager                           majordomo@openssl.org
[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic