Re: OpenSSL Security Advisory

2021-03-25 Thread Hubert Kario
On Thursday, 25 March 2021 15:03:24 CET, OpenSSL wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 OpenSSL Security Advisory [25 March 2021] = NULL pointer deref in signature_algorithms processing (CVE-2021-3449) =

Re: OpenSSL Security Advisory

2020-09-10 Thread Matt Caswell
On 10/09/2020 16:14, Jakob Bohm via openssl-users wrote: > On 2020-09-10 09:03, Tomas Mraz wrote: >> On Wed, 2020-09-09 at 22:26 +0200, Jakob Bohm via openssl-users wrote: >>> Wouldn't a more reasonable response for 1.0.2 users have been to >>> force on >>> SSL_OP_SINGLE_DH_USE rather than reckl

Re: OpenSSL Security Advisory

2020-09-10 Thread Jakob Bohm via openssl-users
On 2020-09-10 09:03, Tomas Mraz wrote: On Wed, 2020-09-09 at 22:26 +0200, Jakob Bohm via openssl-users wrote: Wouldn't a more reasonable response for 1.0.2 users have been to force on SSL_OP_SINGLE_DH_USE rather than recklessly deprecating affected cipher suites and telling affected people to re

Re: OpenSSL Security Advisory

2020-09-10 Thread Tomas Mraz
On Wed, 2020-09-09 at 22:26 +0200, Jakob Bohm via openssl-users wrote: > Wouldn't a more reasonable response for 1.0.2 users have been to > force on > SSL_OP_SINGLE_DH_USE rather than recklessly deprecating affected > cipher > suites > and telling affected people to recompile with the fix off? Yo

Re: OpenSSL Security Advisory

2020-09-09 Thread Jakob Bohm via openssl-users
On 2020-09-09 14:39, OpenSSL wrote: OpenSSL Security Advisory [09 September 2020] = Raccoon Attack (CVE-2020-1968) == Severity: Low The Raccoon attack exploits a flaw in the TLS specification which can lead to an attacker

Re: OpenSSL Security Advisory

2020-04-21 Thread Sam Roberts
That makes sense, thank you all.

Re: OpenSSL Security Advisory

2020-04-21 Thread Matt Caswell
On 21/04/2020 20:46, Sam Roberts wrote: > The announcement claims that this affects SSL_check_chain(). > > Is that an exhaustive list? If an application does NOT call that > function, does this mean the vulnerability is not exploitable? As Ben says - this is correct. > > I ask because the the

Re: OpenSSL Security Advisory

2020-04-21 Thread Benjamin Kaduk via openssl-users
On Tue, Apr 21, 2020 at 12:46:43PM -0700, Sam Roberts wrote: > The announcement claims that this affects SSL_check_chain(). > > Is that an exhaustive list? If an application does NOT call that > function, does this mean the vulnerability is not exploitable? That is correct (speaking only in terms

Re: OpenSSL Security Advisory

2020-04-21 Thread Sam Roberts
The announcement claims that this affects SSL_check_chain(). Is that an exhaustive list? If an application does NOT call that function, does this mean the vulnerability is not exploitable? I ask because the the fixed function tls1_check_sig_alg is called by tls1_check_chain, and that is called di

Re: OpenSSL Security Advisory

2019-07-30 Thread Jakob Bohm via openssl-users
Having reviewed the git commit for 1.1.1 I notice the following issue: The environment variables that usually point to the secure administrator directories (such as "Program Files") are not themselves secured, and not intended as a secure means of obtaining these directory locations, which are (b

RE: OpenSSL Security Advisory

2019-02-27 Thread Scott Neugroschl
Thanks. -Original Message- From: openssl-users On Behalf Of Matt Caswell Sent: Wednesday, February 27, 2019 11:18 AM To: openssl-users@openssl.org Subject: Re: OpenSSL Security Advisory On 27/02/2019 18:43, Scott Neugroschl wrote: > Is this a client-side or server-side vulnerabil

Re: OpenSSL Security Advisory

2019-02-27 Thread Matt Caswell
On 27/02/2019 18:43, Scott Neugroschl wrote: > Is this a client-side or server-side vulnerability? Or does it matter? It can apply to either side. Matt > > Thanks, > > ScottN > > --- > Scott Neugroschl | XYPRO Technology Corporation > 4100 Guardian Street | Suite 100 |Simi Valley, CA 930

RE: OpenSSL Security Advisory

2019-02-27 Thread Scott Neugroschl
Is this a client-side or server-side vulnerability? Or does it matter? Thanks, ScottN --- Scott Neugroschl | XYPRO Technology Corporation 4100 Guardian Street | Suite 100 |Simi Valley, CA 93063 | Phone 805 583-2874|Fax 805 583-0124 | -Original Message- From: openssl-users On Behal

Re: OpenSSL Security Advisory

2014-06-06 Thread Jeff Wieland
In 0.9.8za, there is a missing compiler directive to include limits.h in ssl/s3_pkt.c. Without it, compiling fails on SPARC Solaris 10 with INT_MAX being undefined on line 536, which looks like: OPENSSL_assert(s->s3->wnum < INT_MAX); It appears that 1.0.0m has the same problem. I haven't l

Re: OpenSSL Security Advisory

2014-06-06 Thread Jakob Bohm
On 6/5/2014 11:31 PM, Green, Gatewood wrote: Openssl-0.9.8za will not build in FIPS mode. The openssl-fips-1.2(.4) seems to be missing the symbol BN_consttime_swap. By the way, the BN_consttime_swap implementation in 1.0.1g (still downloading 1.0.1h) doesn't seem to completely match its descr

Re: OpenSSL Security Advisory

2014-06-06 Thread Geoffrey Thorpe
The redhat podcast with Mark (Cox) probably answers this best; http://bit.ly/Th64oP On Thu, Jun 5, 2014 at 12:04 PM, Juha Saarinen wrote: > Hi Steve, > > That’s quite a few in one go - is this due to greater testing of OpenSSL > and more scrutiny of the code by the community? > > Of the flaws

RE: OpenSSL Security Advisory

2014-06-05 Thread Green, Gatewood
Openssl-0.9.8za will not build in FIPS mode. The openssl-fips-1.2(.4) seems to be missing the symbol BN_consttime_swap. Woody Gatewood C Green Jr (Woody) Principal Software Engineer, Product Security Champion SIEM Engineering McAfee. Part of Intel Security. Direct: 208.552.8269 Mobile: 208.206.7

Re: OpenSSL Security Advisory

2014-06-05 Thread Juha Saarinen
Hi Steve, That’s quite a few in one go - is this due to greater testing of OpenSSL and more scrutiny of the code by the community? Of the flaws listed, which is the one of most concern? This kind of begs the question what to do with all those embedded systems that run older versions of OpenSSL

Re: OpenSSL Security Advisory

2014-06-05 Thread Jeff Wieland
In 0.9.8za at least, there is a missing directive to include limits.h. Without it, compilation fails on SPARC Solaris 10 with INT_MAXbeing undefined on line 536, which looks like: OPENSSL_assert(s->s3->wnum < INT_MAX); It appears that 1.0.0m has the same problem. I haven't looked at 1.0.1h

Re: OpenSSL Security Advisory

2014-04-14 Thread Tim Hudson
On 11/04/2014 12:58 AM, Viktor Dukhovni wrote: > guru@hein:~/openssl-1.0.1f/apps> (sleep 3 ; echo B ; sleep 3) | ./openssl > s_client -connect www.openssl.org:443 If you are using s_client for testing then you should add the -msg option and see what is being sent. Responding to a correctly forme

Re: the nature of the heartbeat issue (was Re: OpenSSL Security Advisory)

2014-04-14 Thread Matthias Apitz
some nice pictures how the bug works: http://www.xkcd.com/1354/ HIH matthias -- Sent from my FreeBSD netbook Matthias Apitz, , http://www.unixarea.de/ f: +49-170-4527211 UNIX since V7 on PDP-11, UNIX on mainframe since ESER 1055 (IBM /370) UNIX on x86 since SVR4.2 UnixWare 2.1.2, FreeB

Re: OpenSSL Security Advisory

2014-04-14 Thread Steven Kneizys
Ah, of course! I was so focused on not accessing that routine and not being able to just link in the "obj" files that the obvious solution of using the library properly escaped me! Thanks. After a "Visual Studio 2012" build in directory: E:\usr_local\src\openssl-1.0.1f_32 I then was able put t

Re: the nature of the heartbeat issue (was Re: OpenSSL Security Advisory)

2014-04-12 Thread Michael Smith
On Apr 12, 2014, at 5:40 PM, Michael Tuexen wrote: >> >> "Introduced with intent" vs. "known to the NSA" -- two >> different things, right? > My statement was referring to the "Introduced with intend". Understood. I'm personally quite sure it *wasn't* introduced with intent, which is why I

Re: the nature of the heartbeat issue (was Re: OpenSSL Security Advisory)

2014-04-12 Thread Michael Tuexen
On 12 Apr 2014, at 21:43, Michael Smith wrote: > > On Apr 12, 2014, at 3:08 PM, Michael Tuexen > wrote: >>> >> I have read the rumor. It is wrong. > > "Introduced with intent" vs. "known to the NSA" -- two > different things, right? My statement was referring to the "Introduced with inten

Re: the nature of the heartbeat issue (was Re: OpenSSL Security Advisory)

2014-04-12 Thread Matthias Apitz
El día Saturday, April 12, 2014 a las 03:43:29PM -0400, Michael Smith escribió: > > On Apr 12, 2014, at 3:08 PM, Michael Tuexen > wrote: > >> > > I have read the rumor. It is wrong. > > "Introduced with intent" vs. "known to the NSA" -- two > different things, right? > > I don't have any

Re: the nature of the heartbeat issue (was Re: OpenSSL Security Advisory)

2014-04-12 Thread Matthias Apitz
El día Saturday, April 12, 2014 a las 03:43:29PM -0400, Michael Smith escribió: > > On Apr 12, 2014, at 3:08 PM, Michael Tuexen > wrote: > >> > > I have read the rumor. It is wrong. > > "Introduced with intent" vs. "known to the NSA" -- two > different things, right? > > I don't have any

Re: the nature of the heartbeat issue (was Re: OpenSSL Security Advisory)

2014-04-12 Thread Jan Danielsson
On 12/04/14 21:30, Matthias Apitz wrote: >> http://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=4817504d069b4c5082161b02a22116ad75f822b1 > > Thanks for the git diff (and the other statements). Could you please be > so kind and point to the exact place of the offending statement (or > missing b

Re: the nature of the heartbeat issue (was Re: OpenSSL Security Advisory)

2014-04-12 Thread Michael Smith
On Apr 12, 2014, at 3:08 PM, Michael Tuexen wrote: >> > I have read the rumor. It is wrong. "Introduced with intent" vs. "known to the NSA" -- two different things, right? I don't have any direct knowledge of what goes on in the NSA, but if they don't have a whole cubicle farm full of p

Re: the nature of the heartbeat issue (was Re: OpenSSL Security Advisory)

2014-04-12 Thread Matthias Apitz
El día Saturday, April 12, 2014 a las 09:30:22PM +0200, Matthias Apitz escribió: > El día Saturday, April 12, 2014 a las 09:08:15PM +0200, Michael Tuexen > escribió: > > > > What is the exact bug, can someone show a svn/git diff of the first > > > source version having the bug? > > http://git.op

Re: the nature of the heartbeat issue (was Re: OpenSSL Security Advisory)

2014-04-12 Thread Michael Tuexen
On 12 Apr 2014, at 21:30, Matthias Apitz wrote: > El día Saturday, April 12, 2014 a las 09:08:15PM +0200, Michael Tuexen > escribió: > >>> What is the exact bug, can someone show a svn/git diff of the first >>> source version having the bug? >> http://git.openssl.org/gitweb/?p=openssl.git;a=com

Re: the nature of the heartbeat issue (was Re: OpenSSL Security Advisory)

2014-04-12 Thread Matthias Apitz
El día Saturday, April 12, 2014 a las 09:08:15PM +0200, Michael Tuexen escribió: > > What is the exact bug, can someone show a svn/git diff of the first > > source version having the bug? > http://git.openssl.org/gitweb/?p=openssl.git;a=commit;h=4817504d069b4c5082161b02a22116ad75f822b1 > > Hi,

Re: the nature of the heartbeat issue (was Re: OpenSSL Security Advisory)

2014-04-12 Thread Michael Tuexen
On 12 Apr 2014, at 17:43, Matthias Apitz wrote: > El día Wednesday, April 09, 2014 a las 01:05:22AM -0700, monloi perez > escribió: > >> True. Thanks for the quick reply. >> >> >> On Wednesday, April 9, 2014 3:33 PM, Alan Buxey >> wrote: >> >> https://www.openssl.org/news/changelog.html

the nature of the heartbeat issue (was Re: OpenSSL Security Advisory)

2014-04-12 Thread Matthias Apitz
El día Wednesday, April 09, 2014 a las 01:05:22AM -0700, monloi perez escribió: > True. Thanks for the quick reply. > > > On Wednesday, April 9, 2014 3:33 PM, Alan Buxey > wrote: > > https://www.openssl.org/news/changelog.html > > 1.0.1 introduced the heartbeat support. > > 1.0.0 and ea

Re: OpenSSL Security Advisory

2014-04-11 Thread Tim Hudson
On 11/04/2014 10:38 PM, Steven Kneizys wrote: > The same issue when I tried to port over to windows, > the ssl3_write_bytes is not exposed in the library. There doesn't > seem to be an easy workaround that I can see. The work around is trivial if you wanted to do that. Change to use the SSL_get_

Re: OpenSSL Security Advisory

2014-04-11 Thread Rob Stradling
Thanks Leonardo! On 11/04/14 13:54, Leonardo Secci wrote: In debian I solved linking directly static library. gcc -ansi -pedantic -o heartbleed heartbleed.c -lcrypto \ /usr/lib/x86_64-linux-gnu/libssl.a Regards In data venerdì 11 aprile 2014 08:38:07, Steven Kneizys ha scritto: The s

Re: OpenSSL Security Advisory

2014-04-11 Thread Leonardo Secci
In debian I solved linking directly static library. gcc -ansi -pedantic -o heartbleed heartbleed.c -lcrypto \ /usr/lib/x86_64-linux-gnu/libssl.a Regards In data venerdì 11 aprile 2014 08:38:07, Steven Kneizys ha scritto: > The same issue when I tried to port over to windows, the ssl3_wri

RE: OpenSSL Security Advisory

2014-04-11 Thread JAaron Anderson
@openssl.org Subject: Re: OpenSSL Security Advisory On 10.04.2014 13:16, Rob Stradling wrote: On 09/04/14 20:43, Salz, Rich wrote: Can you please post a "good" and a "bad" server example. I have tested a lot of servers, including 'akama

Re: OpenSSL Security Advisory

2014-04-11 Thread Steven Kneizys
The same issue when I tried to port over to windows, the ssl3_write_bytes is not exposed in the library. There doesn't seem to be an easy workaround that I can see. Steve... On Fri, Apr 11, 2014 at 7:40 AM, Walter H. wrote: > On 10.04.2014 13:16, Rob Stradling wrote: > > On 09/04/14 20:43, Sal

Re: OpenSSL Security Advisory

2014-04-11 Thread Walter H.
On 10.04.2014 13:16, Rob Stradling wrote: On 09/04/14 20:43, Salz, Rich wrote: Can you please post a "good" and a "bad" server example. I have tested a lot of servers, including 'akamai.com', and they all show HEARTBEATING at the end: Look at Victor's recent post about how to patch openssl/s_

Re: OpenSSL Security Advisory

2014-04-10 Thread Viktor Dukhovni
On Thu, Apr 10, 2014 at 10:57:35AM +0200, Matthias Apitz wrote: > I have instrumented an openssl 1.0.1f as posted by Victor: > > guru@hein:~/openssl-1.0.1f> diff ssl/t1_lib.c.unpatched > ssl/t1_lib.c > 2671c2671 > < s2n(payload, p); > --- > > s2n(0x4000, p); > > but I still see HEART

Re: OpenSSL Security Advisory

2014-04-10 Thread Rob Stradling
On 09/04/14 20:43, Salz, Rich wrote: Can you please post a "good" and a "bad" server example. I have tested a lot of servers, including 'akamai.com', and they all show HEARTBEATING at the end: Look at Victor's recent post about how to patch openssl/s_client to make your own test. That's the

Re: OpenSSL Security Advisory

2014-04-10 Thread Matthias Apitz
> > -Original Message- > > From: Matthias Apitz [mailto:g...@unixarea.de] > > Sent: Thursday, April 10, 2014 6:41 AM > > To: Apitz,Matthias > > Subject: Fwd: RE: OpenSSL Security Advisory > > > > - Forwarded message from "Salz, Rich&

RE: OpenSSL Security Advisory

2014-04-09 Thread Salz, Rich
> Can you please post a "good" and a "bad" server example. I have tested a lot > of servers, including 'akamai.com', and they all show HEARTBEATING at the end: Look at Victor's recent post about how to patch openssl/s_client to make your own test. That's the simplest. My example tests only for

Re: OpenSSL Security Advisory

2014-04-09 Thread Matthias Apitz
> - Forwarded message from "Salz, Rich" - > > Date: Wed, 9 Apr 2014 09:54:25 -0400 > From: "Salz, Rich" > To: "openssl-users@openssl.org" > Subject: RE: OpenSSL Security Advisory > > Ø How do I determine whether or not the we

RE: OpenSSL Security Advisory

2014-04-09 Thread Salz, Rich
Ø I get the heartbeating message on both unpatched and patched servers. Should that make me worry about the patched machines? Not necessarily. If they updated to the 'g' release, then they are doing buffer-overrun checking and you're safe. You can probably find out by connecting to your serv

Re: OpenSSL Security Advisory

2014-04-09 Thread Viktor Dukhovni
On Wed, Apr 09, 2014 at 10:55:23AM -0400, Ted Byers wrote: > I get the heartbeating message on both unpatched and patched servers. > Should that make me worry about the patched machines? No, unfortunately both patched and unpatched systems respond the same way to valid heartbeat requests as send

Re: OpenSSL Security Advisory

2014-04-09 Thread Ted Byers
Thanks Patrick. Apache lounge already has a patched release released. So, once I deploy that, and get my certificates reissued, I ought to be OK. Thanks Ted -- R.E.(Ted) Byers, Ph.D.,Ed.D. On Wed, Apr 9, 2014 at 8:37 AM, Eisenacher, Patrick < patrick.eisenac...@bdr.de> wrote: > Hi Ted, >

Re: OpenSSL Security Advisory

2014-04-09 Thread Ted Byers
Thanks Rich, I have obtained the new, patched, release of Apache from Apache lounge, and applied the patch to one server, which the online services say fix the problem on it, but your simple way of checking still says heartbeating at the end. Does that mean that the patch didn't truly work? I ge

RE: OpenSSL Security Advisory

2014-04-09 Thread Salz, Rich
Ø How do I determine whether or not the web servers I run are affected? Here's a simple way: echo B | openssl s_client -connect $HOST:$PORT if you see "heartbeating" at the end, then $HOST is vulnerable. How can you tell if private keys have been taken? You can't, really. You ca

RE: OpenSSL Security Advisory

2014-04-09 Thread Eisenacher, Patrick
Hi Ted, > -Original Message- > From: owner-openssl-us...@openssl.org [mailto:owner-openssl- > > How do I determine whether or not the web servers I run are affected? > They are Apache 2.4, built for 64 bit Windows and downloaded from > Apachelounge. I have no idea what version of openssl

Re: OpenSSL Security Advisory

2014-04-09 Thread Ali Jawad
http://filippo.io/Heartbleed/#www.unlocator.com On Wed, Apr 9, 2014 at 2:05 PM, Ted Byers wrote: > How do I determine whether or not the web servers I run are affected? > They are Apache 2.4, built for 64 bit Windows and downloaded from > Apachelounge. I have no idea what version of openssl it

Re: OpenSSL Security Advisory

2014-04-09 Thread Ted Byers
How do I determine whether or not the web servers I run are affected? They are Apache 2.4, built for 64 bit Windows and downloaded from Apachelounge. I have no idea what version of openssl it was built with. Does anyone here know if the feature that introduces the risk can be turned off, without

Re: OpenSSL Security Advisory

2014-04-09 Thread monloi perez
True. Thanks for the quick reply. On Wednesday, April 9, 2014 3:33 PM, Alan Buxey wrote: https://www.openssl.org/news/changelog.html 1.0.1 introduced the heartbeat support. 1.0.0 and earlier are fortunate in that they didnt have it.but then they didnt have things to stop you from being

Re: OpenSSL Security Advisory

2014-04-08 Thread Alan Buxey
https://www.openssl.org/news/changelog.html 1.0.1 introduced the heartbeat support. 1.0.0 and earlier are fortunate in that they didnt have it.but then they didnt have things to stop you from being BEASTed so some you win, some you lose. ;) alan

Re: OpenSSL Security Advisory

2014-04-08 Thread monloi perez
Hi, Is OpenSSL 0.9.7d  vulnerable? Can seem to confirm based on the list of affected services from this site http://heartbleed.com/. Regards, Mon On Tuesday, April 8, 2014 3:01 AM, OpenSSL wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA256 OpenSSL Security Advisory [07 Apr 2014] ==

Re: OpenSSL security advisory

2012-03-12 Thread carlyoung
On Mon 12/03/12 4:02 PM , open...@master.openssl.org (OpenSSL) sent: >-BEGIN PGP SIGNED MESSAGE- >Hash: SHA1 > >OpenSSL Security Advisory [12 Mar 2012] FTAO Dr Steve Henson, Not that it's important, but the FAQ in 0.9.8u archive says: * Which is the current version of OpenSSL? T

Re: OpenSSL Security Advisory

2012-01-19 Thread Thomas J. Hruska
On 1/19/2012 10:59 AM, John A. Wallace wrote: The windows binaries do not appear to have been upgraded yet. It is possible that some of them are affected, I should think. Thanks. They are up now. -Original Message- From: owner-openssl-annou...@openssl.org [mailto:owner-openssl- OpenS

RE: OpenSSL Security Advisory

2012-01-19 Thread John A. Wallace
The windows binaries do not appear to have been upgraded yet. It is possible that some of them are affected, I should think. Thanks. > -Original Message- > From: owner-openssl-annou...@openssl.org [mailto:owner-openssl- > annou...@openssl.org] On Behalf Of OpenSSL > Sent: Wednesday, Januar

Auto Reply: Re: OpenSSL Security Advisory

2011-09-06 Thread huieying . lee
I will be on vacation from Sep/05/2011 thru Sep/16/2011 (back in the office on Sep 19). Have a great day ! Huie-Ying __ OpenSSL Project http://www.openssl.org User Support Mailing List

Re: OpenSSL Security Advisory

2011-09-06 Thread The Doctor
On Tue, Sep 06, 2011 at 03:40:30PM +0200, OpenSSL wrote: > -BEGIN PGP SIGNED MESSAGE- > Hash: SHA1 > > OpenSSL Security Advisory [6 September 2011] > > Two security flaws have been fixed in OpenSSL 1.0.0e > > CRL verification vulnerability in OpenSSL > ===

RE: OpenSSL Security Advisory

2009-01-14 Thread Takurou Saitou
> -Original Message- > From: owner-openssl-us...@openssl.org > > > ssl/s2_srvr.c ssl/s3_srvr.c : The error in those two file seems to mean > > that server verification of DSA signed clients certificates is also > > affected. > > > > DSA cannot be used with SSLv2 so it is not . Is it

Re: OpenSSL Security Advisory

2009-01-09 Thread Dr. Stephen Henson
On Fri, Jan 09, 2009, Jean-Marc Desperrier wrote: > > Stephen, can you elaborate on that response because from the patch it seems > that more than only client validation of the server signature in SSL > sessions is affected. > > cms/cms_sd.c is affected, but the consequence is only a missing err

Re: OpenSSL Security Advisory

2009-01-09 Thread Jean-Marc Desperrier
Dr. Stephen Henson wrote: On Wed, Jan 07, 2009, Victor Duchovni wrote: This is not very clear to me. Which signatures are poorly verified: 1. The server's signature on SSL/TLS protocol messages that must be signed under the server's private key (corresponding to the private k

Re: OpenSSL Security Advisory

2009-01-08 Thread Kyle Hamilton
This vulnerability only comes into play during active TLS sessions. Certificate chain validation is not affected. S/MIME is not affected. Quoting Dr Henson (a later message, Message-ID <20090107184137.ga99...@openssl.org>): > Certificate chain validation is not affected nor other forms of DSA/ECD

Re: OpenSSL Security Advisory

2009-01-08 Thread Harakiri
--- On Wed, 1/7/09, Dr. Stephen Henson wrote: > Incorrect checks for malformed signatures > - --- It is not perfectly clear to me if regular certificate validiations and smime signature validiation is also affected by this. Could you please elaborate if

Re: OpenSSL Security Advisory

2009-01-07 Thread Brad House
> Does the release of 0.9.8j also include the FIPS module support? > (i.e., is this a bug-fix only release, or does this include what you > have been working on for the past few months as well?) The actual 0.9.8j release announcement stated: "This is the first full release of OpenSSL that can lin

Re: OpenSSL Security Advisory

2009-01-07 Thread Victor Duchovni
On Wed, Jan 07, 2009 at 07:46:59PM -0700, Thomas J. Hruska wrote: > I forgot to ask earlier today, but does the security vulnerability > affect 0.9.7m? Yes, but only in the unlikely case that you operate clients that establish authenticated sessions with servers that use DSA certificates. This s

Re: OpenSSL Security Advisory

2009-01-07 Thread Thomas J. Hruska
Kyle Hamilton wrote: I got the notice of the release several hours after the security advisory. Not sure what happened, but I've since received it. Thank you, Dr Henson and everyone who works on OpenSSL! -Kyle H On Wed, Jan 7, 2009 at 5:23 PM, Giang Nguyen wrote: Does the release of 0.9.8j

Re: OpenSSL Security Advisory

2009-01-07 Thread Kyle Hamilton
I got the notice of the release several hours after the security advisory. Not sure what happened, but I've since received it. Thank you, Dr Henson and everyone who works on OpenSSL! -Kyle H On Wed, Jan 7, 2009 at 5:23 PM, Giang Nguyen wrote: > >> Does the release of 0.9.8j also include the FI

RE: OpenSSL Security Advisory

2009-01-07 Thread Giang Nguyen
> Does the release of 0.9.8j also include the FIPS module support? do you mean anything other than this? http://www.mail-archive.com/openssl-users@openssl.org/msg55535.html This is the first full release of OpenSSL that can link against the validated FIPS module version 1.2

Re: OpenSSL Security Advisory

2009-01-07 Thread Kyle Hamilton
Does the release of 0.9.8j also include the FIPS module support? (i.e., is this a bug-fix only release, or does this include what you have been working on for the past few months as well?) -Kyle H On Wed, Jan 7, 2009 at 4:10 AM, Dr. Stephen Henson wrote: > -BEGIN PGP SIGNED MESSAGE- > Ha

Re: OpenSSL Security Advisory

2009-01-07 Thread Dr. Stephen Henson
On Wed, Jan 07, 2009, Victor Duchovni wrote: > > This is not very clear to me. Which signatures are poorly verified: > >1. The server's signature on SSL/TLS protocol messages that must > be signed under the server's private key (corresponding to the > private key in its certifica

Re: OpenSSL Security Advisory

2009-01-07 Thread Victor Duchovni
On Wed, Jan 07, 2009 at 02:17:09PM +0100, Dr. Stephen Henson wrote: > Several functions inside OpenSSL incorrectly checked the result after > calling the EVP_VerifyFinal function, allowing a malformed signature > to be treated as a good signature rather than as an error. This issue > affected the

Re: OpenSSL Security Advisory: PRNG weakness in versions up to 0.9.6a

2001-07-15 Thread Kris Kennaway
Is it just me, or is this advisory not linked to on the main webpage? Kris PGP signature