On 17/12/2018 22:02, Jakob Bohm via
openssl-users wrote:
A simpler way is to realize that the formats used by SMIME/CMS (specifically
Yes. I started using openssl's smime implementation, then backed out when I realised there were indeed limits - apparently in the underlying libraries. On decrypting I got the same kind of errors described in this bug report thread (and elsewhere if you search, but this is the most recent discussion I could find). "Attempting to decrypt/decode a large smime encoded file created
with openssl fails regardless of the amount of OS memory
available". The key points are: - streaming smime *encryption* has been implemented, but- smime *decryption* is done in memory, consequentially you can't decrypt anything over 1.5G - possibly this is related to the BUF_MEM structure's dependency on the size of an int There's an RT ticket but I could not log in to read this. But it appears to have been migrated to Git-hub: https://github.com/openssl/openssl/issues/2515 It's closed - I infer as "won't fix" (yet?) and this is still an
issue as my experience suggests, at least in the versions
distributed for systems I will be using.
I was using openssl 1.0.2g-1ubuntu4.14 (Xenial) and I've verified
it with openssl 1.1.0g-2ubuntu4.3 (Bionic, the latest LTS release
fro Ubuntu): $ openssl version -a
Anyway, setting up an alternative data format might be suitable if combined
I should add that I don't really care about the format, or even
the use of openssl - just the ability to tackle large files with
the benefits of public key encryption, in a self-contained way
without needing fiddly work deploying the keys (as GnuPG seems to
require for its keyring, judging from my experience deploying
Backup-Ninja / Duplicity using Ansible.) So other solutions, if
tried and tested, might work for me. Cheers,
Nick |
-- openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users