From jgh at wizmail.org Thu Jan 7 17:40:03 2016
From: jgh at wizmail.org (Jeremy Harris)
Date: Thu, 7 Jan 2016 16:40:03 +0000
Subject: [gnutls-help] hashing in older versions
Message-ID: <568E94E3.5010501@wizmail.org>
I want a sha256/sha1 hash, which can be built
incrementally (we don't want to slurp an entire
mail body, which might be tens of MB) so can't use gnutls_fingerprint().
gnutls_hash() &c were only
introduced as supported routines in 2.10.0 and
RHEL6.5 - age systems are back with 2.8.5,
but the Exim project still wishes to support them.
What should I use?
--
Thanks,
Jeremy
From dkg at fifthhorseman.net Fri Jan 8 05:25:06 2016
From: dkg at fifthhorseman.net (Daniel Kahn Gillmor)
Date: Thu, 07 Jan 2016 20:25:06 -0800
Subject: [gnutls-help] hashing in older versions
In-Reply-To: <568E94E3.5010501@wizmail.org>
References: <568E94E3.5010501@wizmail.org>
Message-ID: <87twmo66l9.fsf@alice.fifthhorseman.net>
On Thu 2016-01-07 08:40:03 -0800, Jeremy Harris wrote:
> I want a sha256/sha1 hash, which can be built
> incrementally (we don't want to slurp an entire
> mail body, which might be tens of MB) so can't use gnutls_fingerprint().
> gnutls_hash() &c were only
> introduced as supported routines in 2.10.0 and
> RHEL6.5 - age systems are back with 2.8.5,
> but the Exim project still wishes to support them.
You're looking for a crypto primitive -- gnutls is a TLS implementation.
Modern versions of GnuTLS rely on the nettle library for crypto
primitives.
nettle contains an entirely reasonable Initialize/Update/Finish (IUF)
framework for hash functions.
Earlier versions of GnuTLS relied on the gcrypt library for crypto
primitives, so libgcrypt is another option. If you don't want to add
new dependencies to a project that already relies on GnuTLS, you should
probably choose the lower-level crypto library that your version of
GnuTLS uses.
hth,
--dkg
From nmav at gnutls.org Fri Jan 8 10:03:20 2016
From: nmav at gnutls.org (Nikos Mavrogiannopoulos)
Date: Fri, 08 Jan 2016 10:03:20 +0100
Subject: [gnutls-help] gnutls 3.3.20
Message-ID: <1452243800.8569.2.camel@gnutls.org>
Hello,
I've just released gnutls 3.3.20. This is a bug-fix release on
the previous stable branch.
* Version 3.3.20 (released 2016-01-08)
** libgnutls: Corrected memory leak in gnutls_pubkey_import_privkey()
when used with PKCS #11 keys.
** libgnutls: For DSA and ECDSA keys in PKCS #11 objects, import
their public keys from either a public key object or a certificate.
That is, because private keys do not contain all the required
parameters for a direct import. Reported by Jan Vcelak.
** libgnutls: Fixed issue when writing ECDSA private keys in PKCS #11
tokens.
** libgnutls: Fixed out-of-bounds read in
gnutls_x509_ext_export_key_usage(), report and patch by Tim Kosse.
** libgnutls: Handle DNS name constraints with a leading dot.
Backported from 3.4.x branch.
** libgnutls: The max-record extension is no longer negotiated on DTLS.
This resolves issue with the max-record being negotiated but
ignored.
** API and ABI modifications:
No changes since last version.
Getting the Software
====================
GnuTLS may be downloaded directly from
.??A list of GnuTLS mirrors can be
found at .
Here are the XZ compressed sources:
ftp://ftp.gnutls.org/gcrypt/gnutls/v3.3/gnutls-3.3.20.tar.xz
Here are OpenPGP detached signatures signed using key 0x96865171:
ftp://ftp.gnutls.org/gcrypt/gnutls/v3.3/gnutls-3.3.20.tar.xz.sig
Note that it has been signed with my openpgp key:
pub 3104R/96865171 2008-05-04 [expires: 2028-04-29]
uid Nikos Mavrogiannopoulos gnutls.org>
uid Nikos Mavrogiannopoulos
gmail.com>
sub 2048R/9013B842 2008-05-04 [expires: 2018-05-02]
sub 2048R/1404A91D 2008-05-04 [expires: 2018-05-02]
regards,
Nikos
From nmav at gnutls.org Fri Jan 8 10:43:03 2016
From: nmav at gnutls.org (Nikos Mavrogiannopoulos)
Date: Fri, 08 Jan 2016 10:43:03 +0100
Subject: [gnutls-help] gnutls 3.4.8
Message-ID: <1452246183.8569.5.camel@gnutls.org>
Hello,
I've just released gnutls 3.4.8. This version fixes bugs and adds
minor features to the current stable branch.
* Version 3.4.8 (released 2016-01-08)
** libgnutls: Corrected memory leak in gnutls_pubkey_import_privkey()
when used with PKCS #11 keys.
** libgnutls: For DSA and ECDSA keys in PKCS #11 objects, import
their public keys from either a public key object or a certificate.
That is, because private keys do not contain all the required
parameters for a direct import. Reported by Jan Vcelak.
** libgnutls: Fixed issue when writing ECDSA private keys in PKCS #11
tokens.
** libgnutls: Fixed out-of-bounds read in
gnutls_x509_ext_export_key_usage(), report and patch by Tim Kosse.
** libgnutls: The CHACHA20-POLY1305 ciphersuites were updated to
conform to draft-ietf-tls-chacha20-poly1305-02.
** libgnutls: Several fixes in PKCS #7 signing which improve
compatibility with the MacOSX tools. Reported by sskaje (#59).
** libgnutls: The max-record extension not negotiated on DTLS. This
resolves issue with the max-record being negotiated but ignored.
** certtool: Added the --p7-include-cert and --p7-show-data options.
** API and ABI modifications:
gnutls_pkcs7_get_embedded_data: Added
Getting the Software
====================
GnuTLS may be downloaded directly from
.??A list of GnuTLS mirrors can be
found at .
Here are the XZ compressed sources:
ftp://ftp.gnutls.org/gcrypt/gnutls/v3.4/gnutls-3.4.8.tar.xz
Here are OpenPGP detached signatures signed using key 0x96865171:
ftp://ftp.gnutls.org/gcrypt/gnutls/v3.4/gnutls-3.4.8.tar.xz.sig
Note that it has been signed with my openpgp key:
pub 3104R/96865171 2008-05-04 [expires: 2028-04-29]
uid Nikos Mavrogiannopoulos gnutls.org>
uid Nikos Mavrogiannopoulos
gmail.com>
sub 2048R/9013B842 2008-05-04 [expires: 2018-05-02]
sub 2048R/1404A91D 2008-05-04 [expires: 2018-05-02]
regards,
Nikos
From cheako+gnutls at mikemestnik.net Sat Jan 23 16:53:56 2016
From: cheako+gnutls at mikemestnik.net (Mike Mestnik)
Date: Sat, 23 Jan 2016 09:53:56 -0600
Subject: [gnutls-help] No supported cipher suites have been found.
In-Reply-To:
References:
<1450024887.31642.3.camel@gnutls.org>
Message-ID:
I went to test this again and I'm getting different results now.
cheako at debian:~$ ech=rsa
cheako at debian:~$ gnutls-serv --pgpkeyfile ${ech}_key.txt --pgpcertfile
${ech}_cert.txt --dhparams params.pem --priority
"NORMAL:+DHE-DSS:+SIGN-DSA-SHA256:+SIGN-DSA-SHA1:+CTYPE-OPENPGP"
Read Diffie-Hellman parameters.
Error[-59] while reading the OpenPGP key pair ('rsa_cert.txt', 'rsa_key.txt')
Error: GnuTLS internal error.
Warning: no private key and certificate pairs were set.
HTTP Server listening on IPv4 0.0.0.0 port 5556...done
HTTP Server listening on IPv6 :: port 5556...done
* Accepted connection from IPv6 ::1 port 33508 on Sat Jan 23 09:41:06 2016
Error in handshake
Error: No supported cipher suites have been found.
^CExiting via signal 2
cheako at debian:~$ ech=dsa
cheako at debian:~$ gnutls-serv --pgpkeyfile ${ech}_key.txt --pgpcertfile
${ech}_cert.txt --dhparams params.pem --priority
"NORMAL:+DHE-DSS:+SIGN-DSA-SHA256:+SIGN-DSA-SHA1:+CTYPE-OPENPGP"
Read Diffie-Hellman parameters.
Error[-59] while reading the OpenPGP key pair ('dsa_cert.txt', 'dsa_key.txt')
Error: GnuTLS internal error.
Warning: no private key and certificate pairs were set.
HTTP Server listening on IPv4 0.0.0.0 port 5556...done
HTTP Server listening on IPv6 :: port 5556...done
* Accepted connection from IPv6 ::1 port 33512 on Sat Jan 23 09:41:27 2016
Error in handshake
Error: No supported cipher suites have been found.
^CExiting via signal 2
cheako at debian:~$ ech=ed
cheako at debian:~$ gnutls-serv --pgpkeyfile ${ech}_key.txt --pgpcertfile
${ech}_cert.txt --dhparams params.pem --priority
"NORMAL:+DHE-DSS:+SIGN-DSA-SHA256:+SIGN-DSA-SHA1:+CTYPE-OPENPGP"
Read Diffie-Hellman parameters.
Error[-59] while reading the OpenPGP key pair ('ed_cert.txt', 'ed_key.txt')
Error: GnuTLS internal error.
Warning: no private key and certificate pairs were set.
HTTP Server listening on IPv4 0.0.0.0 port 5556...done
HTTP Server listening on IPv6 :: port 5556...done
* Accepted connection from IPv6 ::1 port 33514 on Sat Jan 23 09:41:57 2016
Error in handshake
Error: No supported cipher suites have been found.
^CExiting via signal 2
cheako at debian:~$ gnutls-cli localhost -p 5556 --insecure --priority
"NORMAL:+DHE-DSS:+SIGN-DSA-SHA256:+SIGN-DSA-SHA1:+CTYPE-OPENPGP"
Processed 0 CA certificate(s).
Resolving 'localhost'...
Connecting to '::1:5556'...
*** Fatal error: A TLS fatal alert has been received.
*** Received alert [40]: Handshake failed
*** Handshake has failed
GnuTLS error: A TLS fatal alert has been received.
cheako at debian:~$ gnutls-cli localhost -p 5556 --insecure --priority
"NORMAL:+DHE-DSS:+SIGN-DSA-SHA256:+SIGN-DSA-SHA1:+CTYPE-OPENPGP"
Processed 0 CA certificate(s).
Resolving 'localhost'...
Connecting to '::1:5556'...
*** Fatal error: A TLS fatal alert has been received.
*** Received alert [40]: Handshake failed
*** Handshake has failed
GnuTLS error: A TLS fatal alert has been received.
cheako at debian:~$ gnutls-cli localhost -p 5556 --insecure --priority
"NORMAL:+DHE-DSS:+SIGN-DSA-SHA256:+SIGN-DSA-SHA1:+CTYPE-OPENPGP"
Processed 0 CA certificate(s).
Resolving 'localhost'...
Connecting to '::1:5556'...
*** Fatal error: A TLS fatal alert has been received.
*** Received alert [40]: Handshake failed
*** Handshake has failed
GnuTLS error: A TLS fatal alert has been received.
This should be a valid archive file.
!
params.pem/ 0 0 0 644 245 `
-----BEGIN DH PARAMETERS-----
MIGGAoGA7q8Kua2zjdacM/gK+o/F6GByYYd1/zwLnqIxTJwlZXbWdN90luqB0zg7
SBPWksbg4NXY4lC5i+SOSVwdYIna0V3H17RhVNa2zo70rWmxXUmCVZspe88YhcUp
9WZmDlfsaO28PAVybMAv1Mv0l26qmv1ROP6DdkNbn8YdL8DrBuMCAQI=
-----END DH PARAMETERS-----
dsa_cert.txt/ 0 0 0 644 1385 `
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v2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=hU3l
-----END PGP PUBLIC KEY BLOCK-----
dsa_key.txt/ 0 0 0 644 1501 `
-----BEGIN PGP PRIVATE KEY BLOCK-----
Version: GnuPG v2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=jk6e
-----END PGP PRIVATE KEY BLOCK-----
ed_cert.txt/ 0 0 0 644 353 `
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v2
mDMEVnNURxYJKwYBBAHaRw8BAQdADB0lJ8rbV1Q/lQzu2u0O8DJcyMYr3Hc0Gg74
TwpYpoe0CWxvY2FsaG9zdIh5BBMWCAAhBQJWc1RHAhsjBQsJCAcCBhUICQoLAgQW
AgMBAh4BAheAAAoJEIJT8qnxF9dJpHIA/iVR5JXctqTCicQfX/8COs5bR76LB6+s
BchEHIOjogzaAPwIHMumz01pNYLxva2c497/KYjR5NwZQD9ZaOhQnx3SDQ==
=nz/w
-----END PGP PUBLIC KEY BLOCK-----
ed_key.txt/ 0 0 0 644 465 `
-----BEGIN PGP PRIVATE KEY BLOCK-----
Version: GnuPG v2
lIYEVnNURxYJKwYBBAHaRw8BAQdADB0lJ8rbV1Q/lQzu2u0O8DJcyMYr3Hc0Gg74
TwpYpof+BwMCMUMFq2tRbT3b4Dp338Vwm1Ao4+LhMKGlV6nW6X00Kjwp/0SrFjfo
QJ3kTwsPpwrfmrU5wYudhbISsmnScqSQGRJJw+/EFJmkcgRrmIf4yrQJbG9jYWxo
b3N0iHkEExYIACEFAlZzVEcCGyMFCwkIBwIGFQgJCgsCBBYCAwECHgECF4AACgkQ
glPyqfEX10mkcgD+JVHkldy2pMKJxB9f/wI6zltHvosHr6wFyEQcg6OiDNoA/Agc
y6bPTWk1gvG9rZzj3v8piNHk3BlAP1lo6FCfHdIN
=mYbZ
-----END PGP PRIVATE KEY BLOCK-----
rsa_cert.txt/ 0 0 0 644 906 `
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v2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=0twV
-----END PGP PUBLIC KEY BLOCK-----
rsa_key.txt/ 0 0 0 644 1854 `
-----BEGIN PGP PRIVATE KEY BLOCK-----
Version: GnuPG v2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==
=oZP5
-----END PGP PRIVATE KEY BLOCK-----
From jonetsu at teksavvy.com Tue Jan 26 17:21:29 2016
From: jonetsu at teksavvy.com (jonetsu)
Date: Tue, 26 Jan 2016 11:21:29 -0500
Subject: [gnutls-help] Restricting 224 and 192 curves
Message-ID:
Hello,
Is it possible to disable the use of CURVE-SECP224R1 and CURVE-SECP192R1 at runtime (by a parameter or programmatically) ?
Thanks.
From jonetsu at teksavvy.com Tue Jan 26 17:35:21 2016
From: jonetsu at teksavvy.com (jonetsu)
Date: Tue, 26 Jan 2016 11:35:21 -0500
Subject: [gnutls-help] Key sizes available for DSA
Message-ID:
Hello,
Which key sizes are available for DSA signature generation and verification ?
Thanks.
From dkg at fifthhorseman.net Tue Jan 26 18:55:47 2016
From: dkg at fifthhorseman.net (Daniel Kahn Gillmor)
Date: Tue, 26 Jan 2016 12:55:47 -0500
Subject: [gnutls-help] Restricting 224 and 192 curves
In-Reply-To:
References:
Message-ID: <87zivs6x98.fsf@alice.fifthhorseman.net>
On Tue 2016-01-26 11:21:29 -0500, jonetsu wrote:
> Is it possible to disable the use of CURVE-SECP224R1 and
> CURVE-SECP192R1 at runtime (by a parameter or programmatically) ?
yes, you can set a priority string like
"NORMAL:-CURVE-SECP224R1:-CURVE-SECP192R1"
See http://gnutls.org/manual/gnutls.html#Priority-Strings for more
details.
--dkg