>From: owner-openssl-us...@openssl.org On Behalf Of Toland Hon
>Sent: Thursday, 30 May, 2013 22:22

>I'm on Mac running OS X 10.8.3 and have 2 versions of openssl installed:
>*      Default: OpenSSL 0.9.8r 8 Feb 2011 
>*      Homebrew: OpenSSL 1.0.1e 11 Feb 2013
>My most recent version of ruby (1.9.3-p429) is linked with Homebrew's
openssl 
>and [] I began having [timeout] to a particular website.

>I noticed there was a recent security bulletin and a fix in regards to CBC
ciphers:
>http://www.openssl.org/news/secadv_20130205.txt
>I was curious if this security fix introduced a bug that has problems 
>connecting to certain websites using CBC cipher <snip>
>or is there something incorrectly configured on this server?

The "Lucky13" issue wouldn't affect handshake at all.
It would affect performance during data phase if there is 
(underlying) data alteration accidentally or due to attack.

This is most likely another case of the frequently reported 
(and discussed) issue that 1.0.1 implements TLS1.2, which 
has more ciphersuites enabled by default and additional 
extensions, which together make the ClientHello bigger, 
and some server implementations apparently can't cope. 
It appears in at least many cases the cutoff is 256 bytes, 
suggesting these servers don't handle 2-byte length right.

It's unlikely that this would be explicitly configured on 
a server, rather it would be an implementation flaw that 
previously did not cause a problem. It might occur in an 
older version of server software fixed in a newer version.

For many details see
http://rt.openssl.org/Ticket/Display.html?id=2771&user=guest&pass=guest

Short answer is that restricting to TLS1(.0), and/or a smaller list 
of ciphersuites (but still enough to intersect with the server), 
likely works. Both do for me using 1.0.1e to your example host.
You can use -msg in s_client to see exactly how much (and what) 
is sent for different options.


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to