On Thu, May 09, 2013 at 08:13:57PM +0200, Dr. Stephen Henson wrote:

> > One of the servers is:
> > 
> >     OpenSSL 0.9.9-dev 09 May 2008
> >     built on: NetBSD 5.1_STABLE
> >     platform: NetBSD-x86_64
> >     options:  bn(64,64) md2(int) rc4(1x,char) des(idx,cisc,4,int)
> >     blowfish(idx)
> >     compiler: gcc version 4.1.3 20080704 (prerelease) (NetBSD nb3 20111107)
> >     OPENSSLDIR: "/etc/openssl"
> > 
> > does that ring any bells?  Can anyone think of a specific ticket-related
> > bug fixed between 0.9.9-dev and 1.0.0 that can account for malformed
> > handshakes with zero-length finished messages?
> > 
> > With any luck this issue is limited to a small number of older
> > NetBSD servers running 0.9.9-dev.
> > 
> 
> In case it isn't clear there never was an official 0.9.9 release so this is
> presumably based on a development version snapshot.

Yes, I know.  Some NetBSD releases in development concurrently with
what was OpenSSL 0.9.9 at the time ended up shipping some snapshot
of 0.9.9-dev when they were released ahead of OpenSSL 1.0.0,
presumably with some backported patches over time.

So perhaps they got the trouble they deserve by shipping an unstable
library in an unstable release.

If possible I would like to know which bug fix made the problem go
away, so that we can be sure it is really gone, and perhaps we can
tell users which versions are likely to have problems.

If the bug was eliminated "accidentally" as part of a rewrite or
while fixing related issues, then I may not get the answer I'm
looking for.

-- 
        Viktor.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to