On Tue, Jan 18, 2011 at 12:20:16PM -0800, Steve Jenkins wrote:

> I just built and installed Postfix 2.8-RC2 using "make upgrade"
> (upgraded from 2.3.3) and I'm getting the following warning in my
> maillog:
> 
> postfix/smtpd[27208]: warning: unknown tls_disable_workarounds value
> "CVE-2010-4180" in "CVE-2005-2969 CVE-2010-4180"

Sorry, my mistake, when the OpenSSL team removes a work-around from
SSL_OP_ALL, we should not remove its name from the list of names Postfix
recognizes. It will do no harm.

Please apply the following patch to 2.8.0-RC[12] or 2.9-2011011[67]

Index: src/tls/tls_misc.c
--- src/tls/tls_misc.c  13 Jan 2011 06:42:09 -0000      1.1.1.6.28.1
+++ src/tls/tls_misc.c  18 Jan 2011 20:33:19 -0000
@@ -219,76 +219,62 @@
 };
 
  /*
-  * SSL_OP_MUMBLE bug work-around name <=> mask conversion. We expect the C
-  * preprocessor to be able to handle "long" #if operands
+  * SSL_OP_MUMBLE bug work-around name <=> mask conversion.
   */
 #define NAMEBUG(x)     #x, SSL_OP_##x
 static const LONG_NAME_MASK ssl_bug_tweaks[] = {
 
-#if defined(SSL_OP_MICROSOFT_SESS_ID_BUG) && \
-           ((SSL_OP_MICROSOFT_SESS_ID_BUG & SSL_OP_ALL) != 0L)
+#if defined(SSL_OP_MICROSOFT_SESS_ID_BUG)
     NAMEBUG(MICROSOFT_SESS_ID_BUG),    /* 0x00000001L */
 #endif
 
-#if defined(SSL_OP_NETSCAPE_CHALLENGE_BUG) && \
-           ((SSL_OP_NETSCAPE_CHALLENGE_BUG & SSL_OP_ALL) != 0L)
+#if defined(SSL_OP_NETSCAPE_CHALLENGE_BUG)
     NAMEBUG(NETSCAPE_CHALLENGE_BUG),   /* 0x00000002L */
 #endif
 
-#if defined(SSL_OP_LEGACY_SERVER_CONNECT) && \
-           ((SSL_OP_LEGACY_SERVER_CONNECT & SSL_OP_ALL) != 0L)
+#if defined(SSL_OP_LEGACY_SERVER_CONNECT)
     NAMEBUG(LEGACY_SERVER_CONNECT),    /* 0x00000004L */
 #endif
 
-#if defined(SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG) && \
-           ((SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG & SSL_OP_ALL) != 0L)
+#if defined(SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG)
     NAMEBUG(NETSCAPE_REUSE_CIPHER_CHANGE_BUG), /* 0x00000008L */
     "CVE-2010-4180", SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG,
 #endif
 
-#if defined(SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG) && \
-           ((SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG & SSL_OP_ALL) != 0L)
+#if defined(SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG)
     NAMEBUG(SSLREF2_REUSE_CERT_TYPE_BUG),      /* 0x00000010L */
 #endif
 
-#if defined(SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER) && \
-           ((SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER & SSL_OP_ALL) != 0L)
+#if defined(SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER)
     NAMEBUG(MICROSOFT_BIG_SSLV3_BUFFER),/* 0x00000020L  */
 #endif
 
-#if defined(SSL_OP_MSIE_SSLV2_RSA_PADDING) && \
-           ((SSL_OP_MSIE_SSLV2_RSA_PADDING & SSL_OP_ALL) != 0L)
+#if defined(SSL_OP_MSIE_SSLV2_RSA_PADDING)
     NAMEBUG(MSIE_SSLV2_RSA_PADDING),   /* 0x00000040L */
     "CVE-2005-2969", SSL_OP_MSIE_SSLV2_RSA_PADDING,
 #endif
 
-#if defined(SSL_OP_SSLEAY_080_CLIENT_DH_BUG) && \
-           ((SSL_OP_SSLEAY_080_CLIENT_DH_BUG & SSL_OP_ALL) != 0L)
+#if defined(SSL_OP_SSLEAY_080_CLIENT_DH_BUG)
     NAMEBUG(SSLEAY_080_CLIENT_DH_BUG), /* 0x00000080L */
 #endif
 
-#if defined(SSL_OP_TLS_D5_BUG) && \
-           ((SSL_OP_TLS_D5_BUG & SSL_OP_ALL) != 0L)
+#if defined(SSL_OP_TLS_D5_BUG)
     NAMEBUG(TLS_D5_BUG),               /* 0x00000100L   */
 #endif
 
-#if defined(SSL_OP_TLS_BLOCK_PADDING_BUG) && \
-           ((SSL_OP_TLS_BLOCK_PADDING_BUG & SSL_OP_ALL) != 0L)
+#if defined(SSL_OP_TLS_BLOCK_PADDING_BUG)
     NAMEBUG(TLS_BLOCK_PADDING_BUG),    /* 0x00000200L */
 #endif
 
-#if defined(SSL_OP_TLS_ROLLBACK_BUG) && \
-           ((SSL_OP_TLS_ROLLBACK_BUG & SSL_OP_ALL) != 0L)
+#if defined(SSL_OP_TLS_ROLLBACK_BUG)
     NAMEBUG(TLS_ROLLBACK_BUG),         /* 0x00000400L */
 #endif
 
-#if defined(SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS) && \
-           ((SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS & SSL_OP_ALL) != 0L)
+#if defined(SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS)
     NAMEBUG(DONT_INSERT_EMPTY_FRAGMENTS),      /* 0x00000800L */
 #endif
 
-#if defined(SSL_OP_CRYPTOPRO_TLSEXT_BUG) && \
-           ((SSL_OP_CRYPTOPRO_TLSEXT_BUG & SSL_OP_ALL) != 0L)
+#if defined(SSL_OP_CRYPTOPRO_TLSEXT_BUG)
     NAMEBUG(CRYPTOPRO_TLSEXT_BUG),     /* 0x80000000L */
 #endif
     0, 0,

-- 
        Viktor.

Reply via email to