Hi,

This have been already discussed in the openssl-dev mailing list. Go to the mailing list archive and take a look at the subject "openssl 1.0.1 and rumors about TLS 1.0 attacks". To be brief, this attack has been known for 7 years now and OpenSSL implemented an effective countermeasure against it since version 0.9.6d (insertion of empty fragments). So, an OpenSSL based web server is immune from this attack, unless it uses the flag SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS.

Links cited in the dev mailing list :
   - http://www.openssl.org/~bodo/tls-cbc.txt , section 2.
- http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.61.5887&rep=rep1&type=pdf : a 2006 paper discribing the attack and the OpenSSL countermeasure.

Cheers,
--
Mounir IDRASSI
IDRIX
http://www.idrix.fr


On 9/21/2011 4:48 PM, Thomas J. Hruska wrote:
The Register published an article yesterday that some people here might be interested in on TLS 1.0 being "cracked":

http://www.theregister.co.uk/2011/09/19/beast_exploits_paypal_ssl/


The Register points their Finger of Blame right at OpenSSL.

Of course, a lot of places then blew this out of proportion with headlines along the lines of, "ZOMG! HTTPS/SSL Intertubes Hacked! i can haz your internets?!?!"

Right now, no one really knows anything about the "research" that is supposedly going to be published on Friday.


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to