Hi ALL,

I did some studies on this patch. Gone through the  OpenSSL CVS  and find
that
http://cvs.openssl.org/chngview?cn=18791
http://cvs.openssl.org/chngview?cn=18794   patch went into OpenSSL 0.9.8l
release and this patch is making renegotiation state to be in hang state.

Where as http://cvs.openssl.org/chngview?cn=18790  atleast disconnect the
connection if renegotiation and which was suppose to be done to deal with
this problem.

Please correct me if i am wrong? and also please guide me which patch need
to be used .

Thanks in Advance
Samuel

Samuel123smith wrote:
> 
> Hi ALL,
> 
> I am newbie to openssl and i have recently joined in openssl activities.As
> we all know , we have come across the security vulnerability issue
> CVE-2009-3555 and i need to patch the OpenSSL 0.9.8k version. I was going
> from some of query already in this forum . 
> 
> From this link
> http://www.derkeiler.com/Mailing-Lists/FreeBSD-Security/2009-11/msg00000.html,
> I came to know the patch for this problem .
> Obtained-From: http://cvs.openssl.org/chngview?cn=18791
> Obtained-From: http://cvs.openssl.org/chngview?cn=18794
> 
> which i applied to openssl 0.9.8k 
> but when i ran the openssl s_server and s_client .
> 
> I can see the output as 
> At the client side , I can see
> 
> openssl s_client
> 
> R
> RENEGOTIATING
> 
> It stays in this stage and when ever i type any thing in the server or
> client , the data is passed to the other side
> 
> Server Side:
> The server is sending the data to client
> 
> Client Side:
> R
> RENEGOTIATING
> The server is sending the data to client.(----> Data from sever)
> 
> I was thinking the connection should be dropped if the client tries for
> renegotiation .
> 
> But if i have this  patch http://cvs.openssl.org/chngview?cn=18790 . 
> The server drops the connection
> 
> Server Side:
> SSL3 alert write:fatal:handshake failure
> SSL_accept:error in SSLv3 read client hello A
> ERROR
> 487572:error:1408A13F:SSL routines:SSL3_GET_CLIENT_HELLO:no
> renegotiation:s3_srvr.c:725:
> shutting down SSL
> CONNECTION CLOSED
> ACCEPT
> 
> Client Side:
> R
> RENEGOTIATING
> SSL_connect:SSL renegotiate ciphers
>>>> TLS 1.0 Handshake [length 0057], ClientHello
>     01 00 00 53 03 01 4b 06 60 60 24 71 1f db 0d fe
>     c8 39 83 1f c4 b1 fb af 64 5e 66 f4 5a 24 cb 7a
>     73 98 32 f9 1d cf 00 00 26 00 39 00 38 00 35 00
>     16 00 13 00 0a 00 33 00 32 00 2f 00 05 00 04 00
>     15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 01
>     00 00 04 00 23 00 00
> SSL_connect:SSLv3 write client hello A
> <<< TLS 1.0 Alert [length 0002], fatal handshake_failure
>     02 28
> SSL3 alert read:fatal:handshake failure
> SSL_connect:failed in SSLv3 read server hello A
> 499818:error:14094410:SSL routines:SSL3_READ_BYTES:sslv3 alert handshake
> failure:s3_pkt.c:1060:SSL alert number 40
> 499818:error:1409E0E5:SSL routines:SSL3_WRITE_BYTES:ssl handshake
> failure:s3_pkt.c:530:
> 
> Client Session is terminated .
> 
> Can any one please tell me which is the intended behaviour?
> 
> Which patch should i have to apply to OpenSSL 0.9.8k. Please Guide me .
> As i can not move to OpenSSL 0.9.8l now , I have to apply the patch for
> this problem in OpenSSL 0.9.8k.. Please direct me to the correct patch
> which i need to apply to OpenSSL 0.9.8k . 
> 
> Thanks In Advance
> 
> Samuel
> 
> 
> 
> 

-- 
View this message in context: 
http://old.nabble.com/New-Babie---Query-on-CVE-2009-3555..-tp26435399p26441574.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to