Re: Patch to mitigate CVE-2014-3566 ("POODLE")

2014-10-15 Thread Bodo Moeller
mancha : > Any reason for the s_client -fallback_scsv option check to be within an > #ifndef OPENSSL_NO_DTLS1 block? Thanks for catching this. No, there's no good reason for that; I should move it elsewhere. Bodo

Re: External client certificate signature function

2014-10-15 Thread Fredrik Jansson
Hi Steve! I will try to take that path, thank you! //Fredrik On Mon, Oct 13, 2014 at 6:08 PM, Dr. Stephen Henson wrote: > On Mon, Oct 13, 2014, Fredrik Jansson wrote: > >> Hi! >> >> I have a device where I cannot access the client certificate's private >> key directly, but have access to veri

Re: External client certificate signature function

2014-10-15 Thread Fredrik Jansson
I just realised I can create a RSA_METHOD object and set that in my engine. But what about ECDSA_ENGINE? There is no struct definition available in the public headers, and no public functions to change the members of the struct, e.g. set a new signing function. Is this not possible with ECDSA?

Re: External client certificate signature function

2014-10-15 Thread Dr. Stephen Henson
On Wed, Oct 15, 2014, Fredrik Jansson wrote: > I just realised I can create a RSA_METHOD object and set that in my engine. > > But what about ECDSA_ENGINE? > > There is no struct definition available in the public headers, and no > public functions to change the members of the struct, e.g. set a

OpenSSL version 0.9.8zc released

2014-10-15 Thread OpenSSL
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 OpenSSL version 0.9.8zc released === OpenSSL - The Open Source toolkit for SSL/TLS http://www.openssl.org/ The OpenSSL project team is pleased to announce the release of version 0.9.8zc of our open sourc

OpenSSL version 1.0.0o released

2014-10-15 Thread OpenSSL
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 OpenSSL version 1.0.0o released === OpenSSL - The Open Source toolkit for SSL/TLS http://www.openssl.org/ The OpenSSL project team is pleased to announce the release of version 1.0.0o of our open source

OpenSSL version 1.0.1j released

2014-10-15 Thread OpenSSL
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 OpenSSL version 1.0.1j released === OpenSSL - The Open Source toolkit for SSL/TLS http://www.openssl.org/ The OpenSSL project team is pleased to announce the release of version 1.0.1j of our open source

OpenSSL Security Advisory

2014-10-15 Thread OpenSSL
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 OpenSSL Security Advisory [15 Oct 2014] === SRTP Memory Leak (CVE-2014-3513) Severity: High A flaw in the DTLS SRTP extension parsing code allows an attacker, who sends a carefully

OpenSSL 0.9.8 End Of Life Announcement

2014-10-15 Thread OpenSSL
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 OpenSSL 0.9.8 End Of Life Announcement == The OpenSSL Project is today making the following announcement: Support for version 0.9.8 will cease on 31st December 2015. No further releases of 0.9.8 will be made after

How bulletproof is TLS Downgrade SCSV ?

2014-10-15 Thread Bogdan Harjoc
How does the newly introduced [1] support for the Downgrade SCSV stop an attacker from removing the SCSV from an outgoing ClientHello ? Am I missing something, or is there no hash to ensure that the ClientHello received by the server has not been tampered with ? [1] https://tools.ietf.org/html/dra

RE: How bulletproof is TLS Downgrade SCSV ?

2014-10-15 Thread Salz, Rich
The hello message is protected by digests at the end of the handshake. Otherwise the national scale adversary (NSA) could tweak anything. The point about fallback is the attacker doesn't have to touch the content to make the client fallback, it just has to interrupt at the TCP layer -- Princ

FIPS 1.2.4 and OpenSSL 0.9.8zc Fails 'make test'

2014-10-15 Thread Russell Selph
Apologies if this is a duplicate post. I tried first via Google Groups, but apparently it's read-only. ;-) Has anyone else built 0.9.8zc with FIPS 1.2.4? I've been unable to get a build that passes the 'make test' phase. I'm using build scripts that worked for 0.9.8.zb. (More details on th

Context options and SSL_MODE_SEND_FALLBACK_SCSV

2014-10-15 Thread Jeffrey Walton
I have a question on the intersection of Patch to mitigate CVE-2014-3566 ("POODLE") [0] and context options. If the context options are set to remove SSLv3: SSL_CTX* ctx = ... long flags = SSL_OP_NO_SSLv2 | SSL_OP_NO_SSLv3 | SSL_OP_NO_COMPRESSION; SSL_CTX_set_options(ctx, flags); The

RE: Context options and SSL_MODE_SEND_FALLBACK_SCSV

2014-10-15 Thread Salz, Rich
> If the context options are set to remove SSLv3: > Then is the following needed from [0]: > > SSL_set_mode(ssl, SSL_MODE_SEND_FALLBACK_SCSV) You might care about fallback from TLS 1.2 (which has PFS) to TLS 1.1 (which doesn't). I recommend that you always set that flag. -- Principal Sec

Is it possible to disable SSLv3 for all openssl-enabled applications via settings in openssl.cnf?

2014-10-15 Thread Todd Pfaff
I'd like to be able to disable SSLv3 for all openssl-enabled applications in a single configuration file if possible, so that this doesn't have to be done for each application. I realize that this could be done by building openssl from source but I imagine it could also be possible to configure t

RE: Is it possible to disable SSLv3 for all openssl-enabled applications via settings in openssl.cnf?

2014-10-15 Thread Salz, Rich
> I'd like to be able to disable SSLv3 for all openssl-enabled applications in a > single configuration file if possible, so that this doesn't have to be done > for > each application. No it's not possible. Not enhancement idea, tho. -- Principal Security Engineer, Akamai Technologies IM: rs..

RE: Is it possible to disable SSLv3 for all openssl-enabled applications via settings in openssl.cnf?

2014-10-15 Thread Salz, Rich
> > I'd like to be able to disable SSLv3 for all openssl-enabled > > applications in a single configuration file if possible, so that this > > doesn't have to be done for each application. > > No it's not possible. > > Not enhancement idea, tho. AARGH. "Nice" enhancement idea. -- Principal S

Building win64 static library with no-ssl3 option fails on 1.0.1j

2014-10-15 Thread Arthur Ramsey
Hello, I want to disable SSLv3 for a tomcat / tcnative deployment on Windows. Tomcat lacks the ablitity to disable SSLv3 while retaining TLSv1.1 and TLSv1.2, so I'm attempting to disable SSLv3 at build time with no-ssl3. This was successful on Linux, but not on Windows. I was able to build

Building win64 static library with no-ssl3 option fails on 1.0.1j

2014-10-15 Thread Arthur Ramsey
Hello, I want to disable SSLv3 for a tomcat / tcnative deployment on Windows. Tomcat lacks the ablitity to disable SSLv3 while retaining TLSv1.1 and TLSv1.2, so I'm attempting to disable SSLv3 at build time with no-ssl3. This was successful on Linux, but not on Windows. I was able to build

compile prob with xlc/aix 0.9.8zc

2014-10-15 Thread Kyle Chapman
Greetings folks. trying to compile 0.9.8zc on aix 7.1 (and 6.1) with various versions on xlc Aix 7.1 has xlc 11.1 Aix 6.1 has xlc 9 Both fail given these steps: ./config shared threads Compiles for aix-cc making all in crypto/rsa... gmake[2]: Entering directory `/san/dev/ssl/0.9.8/crypto/rsa' c

Re: Is it possible to disable SSLv3 for all openssl-enabled applications via settings in openssl.cnf?

2014-10-15 Thread Dmitry Belyavsky
Hello Rich, Unfortunately not all applications read the openssl config file... On Thu, Oct 16, 2014 at 2:53 AM, Salz, Rich wrote: > > > I'd like to be able to disable SSLv3 for all openssl-enabled > > > applications in a single configuration file if possible, so that this > > > doesn't have to