RE: [openssl.org #541] Problem with the blinding patch
Per recommendation below, I built with the openssl-e-0.9.6-stable-SNAP-20030323.tar.gz snapshot this morning and all is well. The intermittant problems regarding dropping GIFs, etc are gone and preliminary testing looks good. I deduce from the thread history that this snapshot does indeed contain the RSA Blinding fix as well as the fix for the Klima-Pokorny-Rosa attack... I am VERY interested in building with an official release and would greatly appreciate any info regarding when OpenSSL.org thinks it might release an official 0.9.6j. --- Pete Bobco --- -Original Message- From: Bodo Moeller [mailto:[EMAIL PROTECTED] Sent: Friday, March 21, 2003 7:19 PM To: [EMAIL PROTECTED] Cc: Bobco, Pete Subject: Re: [openssl.org #541] Problem with the blinding patch Bobco, Pete [EMAIL PROTECTED]: After applying the March 17, 2003 RSA Blinding patch, I am seeing some intermittant problems when I browse to my test server to retrieve pages. Sometimes a GIF file does not appear, but using the Refresh key will get it. I am wondering if anyone else out there is seeing similar oddities. Are there any server-side OpenSSL error messages? Background: My scenario is using OpenSSL 0.9.6i as the baseline. [...] On a side note, it looks to me like the openssl-0.9.7-stable-SNAP-20030320 build mentioned below DOES NOT contain the RSA Blinding fix... It does, although not literally the same fix as found in the patch. Please try the latest openssl-0.9.6-stable snapshot with your test server and report if you still observe problems. -- Bodo Möller [EMAIL PROTECTED] PGP http://www.informatik.tu-darmstadt.de/TI/Mitarbeiter/moeller/0x36d2c658.html * TU Darmstadt, Theoretische Informatik, Alexanderstr. 10, D-64283 Darmstadt * Tel. +49-6151-16-6628, Fax +49-6151-16-6036 __ OpenSSL Project http://www.openssl.org Development Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED] __ OpenSSL Project http://www.openssl.org Development Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]
Re: [openssl.org #541] Problem with the blinding patch
In message [EMAIL PROTECTED] on Mon, 24 Mar 2003 13:24:08 -0600, Bobco, Pete [EMAIL PROTECTED] said: Pete.Bobco I am VERY interested in building with an official release Pete.Bobco and would greatly appreciate any info regarding when Pete.Bobco OpenSSL.org thinks it might release an official 0.9.6j. We will release 0.9.6j as soon as possible. There are a couple of related bug reports to take care of first. -- Richard Levitte \ Spannvägen 38, II \ [EMAIL PROTECTED] [EMAIL PROTECTED] \ S-168 35 BROMMA \ T: +46-8-26 52 47 \ SWEDEN \ or +46-708-26 53 44 Procurator Odiosus Ex Infernis-- [EMAIL PROTECTED] Member of the OpenSSL development team: http://www.openssl.org/ Unsolicited commercial email is subject to an archival fee of $400. See http://www.stacken.kth.se/~levitte/mail/ for more info. __ OpenSSL Project http://www.openssl.org Development Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]
RE: [openssl.org #541] Problem with the blinding patch
Unfortunately, I built with openssl-0.9.6-stable-SNAP-20030324.tar.gz and am now again seeing the intermittant problem of the dropping GIFs that I wrote about on 3/21/2003. My statements about the problem being gone in the Stable 323 build were true if the engine snapshot was used (i.e., when openssl-e-0.9.6-stable-SNAP-20030323.tar.gz was used). However, I believe that was because the 'engine' build did not pick up these latest timing fixes (I know that the Stable 323 engine build did NOT contain the Klima-Pokorny-Rosa attack patch whereas the non-engine Stable 323 build did). The openssl-0.9.6-stable-SNAP-20030324.tar.gz does indeed contain the fixes for the RSA Blinding and Klima-Pokorny-Rosa Security Advisories, but unfortunately it also results in the dropped GIF problems. I will dig in deeper tomorrow to see if I can see any server side OpenSSL error messages... --- Pete Bobco --- -Original Message- From: Richard Levitte - VMS Whacker [mailto:[EMAIL PROTECTED] Sent: Monday, March 24, 2003 2:21 PM To: [EMAIL PROTECTED]; Bobco, Pete Subject: Re: [openssl.org #541] Problem with the blinding patch In message [EMAIL PROTECTED] on Mon, 24 Mar 2003 13:24:08 -0600, Bobco, Pete [EMAIL PROTECTED] said: Pete.Bobco I am VERY interested in building with an official release Pete.Bobco and would greatly appreciate any info regarding when Pete.Bobco OpenSSL.org thinks it might release an official 0.9.6j. We will release 0.9.6j as soon as possible. There are a couple of related bug reports to take care of first. -- Richard Levitte \ Spannvägen 38, II \ [EMAIL PROTECTED] [EMAIL PROTECTED] \ S-168 35 BROMMA \ T: +46-8-26 52 47 \ SWEDEN \ or +46-708-26 53 44 Procurator Odiosus Ex Infernis-- [EMAIL PROTECTED] Member of the OpenSSL development team: http://www.openssl.org/ Unsolicited commercial email is subject to an archival fee of $400. See http://www.stacken.kth.se/~levitte/mail/ for more info. __ OpenSSL Project http://www.openssl.org Development Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]
Re: [openssl.org #541] Problem with the blinding patch
In message [EMAIL PROTECTED] on Mon, 24 Mar 2003 17:54:00 -0600, Bobco, Pete [EMAIL PROTECTED] said: Pete.Bobco Unfortunately, I built with Pete.Bobco openssl-0.9.6-stable-SNAP-20030324.tar.gz and am now Pete.Bobco again seeing the intermittant problem of the dropping GIFs Pete.Bobco that I wrote about on 3/21/2003. My statements about the Pete.Bobco problem being gone in the Stable 323 build were true if Pete.Bobco the engine snapshot was used (i.e., when Pete.Bobco openssl-e-0.9.6-stable-SNAP-20030323.tar.gz was used). Pete.Bobco However, I believe that was because the 'engine' build did Pete.Bobco not pick up these latest timing fixes (I know that the Pete.Bobco Stable 323 engine build did NOT contain the Pete.Bobco Klima-Pokorny-Rosa attack patch whereas the non-engine Pete.Bobco Stable 323 build did). Your conclusion is correct. I'll fix that within minutes. -- Richard Levitte \ Spannvägen 38, II \ [EMAIL PROTECTED] [EMAIL PROTECTED] \ S-168 35 BROMMA \ T: +46-8-26 52 47 \ SWEDEN \ or +46-708-26 53 44 Procurator Odiosus Ex Infernis-- [EMAIL PROTECTED] Member of the OpenSSL development team: http://www.openssl.org/ Unsolicited commercial email is subject to an archival fee of $400. See http://www.stacken.kth.se/~levitte/mail/ for more info. __ OpenSSL Project http://www.openssl.org Development Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]
Re: [openssl.org #541] Problem with the blinding patch
Terry Kennedy via RT [EMAIL PROTECTED]: I downloaded and configured/built/tested 0.9.7a on BSD/OS 4.3.1 with no problems, using the following commands: [...] The tests completed with no errors. I then applied the blinding patch from http://www.openssl.org//news/secadv_20030317.txt, did make clean and then the same commands as shown above. One of the certificate request tests failed with the following output: [...] 20476:error:24064064:random number generator:SSLEAY_RAND_BYTES:PRNG not seeded:md_rand.c:503:You need to read the OpenSSL FAQ, http://www.openssl.org/support/faq.html Please try again using the latest 0.9.7a snapshot, which is available from ftp://ftp.openssl.org/snapshot;type=d (don't apply the patch, the countermeasure is included with that snapshot). The problem should now be solved; please confirm if the snapshot works for you. I downloaded openssl-0.9.7-stable-SNAP-20030320 and it does indeed fix the problem with make test. I'm a little uncomfortable installing this develop- ment version and re-linking all my SSL applications against it - any idea if 0.9.7b is coming out soon? Thanks, Terry __ OpenSSL Project http://www.openssl.org Development Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]
Re: [openssl.org #541] Problem with the blinding patch
Terry Kennedy via RT [EMAIL PROTECTED]: I downloaded and configured/built/tested 0.9.7a on BSD/OS 4.3.1 with no problems, using the following commands: [...] The tests completed with no errors. I then applied the blinding patch from http://www.openssl.org//news/secadv_20030317.txt, did make clean and then the same commands as shown above. One of the certificate request tests failed with the following output: [...] 20476:error:24064064:random number generator:SSLEAY_RAND_BYTES:PRNG not seeded:md_rand.c:503:You need to read the OpenSSL FAQ, http://www.openssl.org/support/faq.html Please try again using the latest 0.9.7a snapshot, which is available from ftp://ftp.openssl.org/snapshot;type=d (don't apply the patch, the countermeasure is included with that snapshot). The problem should now be solved; please confirm if the snapshot works for you. I downloaded openssl-0.9.7-stable-SNAP-20030320 and it does indeed fix the problem with make test. I'm a little uncomfortable installing this develop- ment version and re-linking all my SSL applications against it - any idea if 0.9.7b is coming out soon? Thanks, Terry __ OpenSSL Project http://www.openssl.org Development Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]
[openssl.org #541] Problem with the blinding patch
[EMAIL PROTECTED] - Fri Mar 21 09:58:12 2003]: I downloaded openssl-0.9.7-stable-SNAP-20030320 and it does indeed fix the problem with make test. I'm a little uncomfortable installing this develop- ment version and re-linking all my SSL applications against it - any idea if 0.9.7b is coming out soon? Thanks for checking, that resolves this ticket. I believe 0.9.7b will be out quite soon. -- Richard Levitte [EMAIL PROTECTED] __ OpenSSL Project http://www.openssl.org Development Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]
RE: [openssl.org #541] Problem with the blinding patch
After applying the March 17, 2003 RSA Blinding patch, I am seeing some intermittant problems when I browse to my test server to retrieve pages. Sometimes a GIF file does not appear, but using the Refresh key will get it. I am wondering if anyone else out there is seeing similar oddities. Background: My scenario is using OpenSSL 0.9.6i as the baseline. Although the RSA Blinding Patch was intended for 0.9.7a, the patch utility successfully updated RSA_LIB.C and RSA_EAY.C on 0.9.6i. I have made sure that the patch went in correctly, by verifying that the changes to these two files (when the patch is applied to 0.9.7a) are idential to the changes to the files when it is applied it to 0.9.6i. I have also verified that nothing else in my test or build scenario is different, except that the RSA Blinding patch has been built in. I have not seen this problem prior to applying the RSA Blinding fix. On a side note, it looks to me like the openssl-0.9.7-stable-SNAP-20030320 build mentioned below DOES NOT contain the RSA Blinding fix... --- Pete Bobco --- -Original Message- From: Richard Levitte via RT [mailto:[EMAIL PROTECTED] Sent: Friday, March 21, 2003 6:47 AM To: [EMAIL PROTECTED] Cc: [EMAIL PROTECTED] Subject: [openssl.org #541] Problem with the blinding patch [EMAIL PROTECTED] - Fri Mar 21 09:58:12 2003]: I downloaded openssl-0.9.7-stable-SNAP-20030320 and it does indeed fix the problem with make test. I'm a little uncomfortable installing this develop- ment version and re-linking all my SSL applications against it - any idea if 0.9.7b is coming out soon? Thanks for checking, that resolves this ticket. I believe 0.9.7b will be out quite soon. -- Richard Levitte [EMAIL PROTECTED] __ OpenSSL Project http://www.openssl.org Development Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED] __ OpenSSL Project http://www.openssl.org Development Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]
Re: [openssl.org #541] Problem with the blinding patch
Bobco, Pete [EMAIL PROTECTED]: After applying the March 17, 2003 RSA Blinding patch, I am seeing some intermittant problems when I browse to my test server to retrieve pages. Sometimes a GIF file does not appear, but using the Refresh key will get it. I am wondering if anyone else out there is seeing similar oddities. Are there any server-side OpenSSL error messages? Background: My scenario is using OpenSSL 0.9.6i as the baseline. [...] On a side note, it looks to me like the openssl-0.9.7-stable-SNAP-20030320 build mentioned below DOES NOT contain the RSA Blinding fix... It does, although not literally the same fix as found in the patch. Please try the latest openssl-0.9.6-stable snapshot with your test server and report if you still observe problems. -- Bodo Möller [EMAIL PROTECTED] PGP http://www.informatik.tu-darmstadt.de/TI/Mitarbeiter/moeller/0x36d2c658.html * TU Darmstadt, Theoretische Informatik, Alexanderstr. 10, D-64283 Darmstadt * Tel. +49-6151-16-6628, Fax +49-6151-16-6036 __ OpenSSL Project http://www.openssl.org Development Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]
Re: [openssl.org #541] Problem with the blinding patch
Terry Kennedy via RT [EMAIL PROTECTED]: I downloaded and configured/built/tested 0.9.7a on BSD/OS 4.3.1 with no problems, using the following commands: [...] The tests completed with no errors. I then applied the blinding patch from http://www.openssl.org//news/secadv_20030317.txt, did make clean and then the same commands as shown above. One of the certificate request tests failed with the following output: [...] 20476:error:24064064:random number generator:SSLEAY_RAND_BYTES:PRNG not seeded:md_rand.c:503:You need to read the OpenSSL FAQ, http://www.openssl.org/support/faq.html Please try again using the latest 0.9.7a snapshot, which is available from ftp://ftp.openssl.org/snapshot;type=d (don't apply the patch, the countermeasure is included with that snapshot). The problem should now be solved; please confirm if the snapshot works for you. -- Bodo Möller [EMAIL PROTECTED] PGP http://www.informatik.tu-darmstadt.de/TI/Mitarbeiter/moeller/0x36d2c658.html * TU Darmstadt, Theoretische Informatik, Alexanderstr. 10, D-64283 Darmstadt * Tel. +49-6151-16-6628, Fax +49-6151-16-6036 __ OpenSSL Project http://www.openssl.org Development Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]
[openssl.org #541] Problem with the blinding patch
I downloaded and configured/built/tested 0.9.7a on BSD/OS 4.3.1 with no problems, using the following commands: ./config shared --prefix=/usr/contrib --openssldir=/usr/contrib/lib/openssl threads make make test The tests completed with no errors. I then applied the blinding patch from http://www.openssl.org//news/secadv_20030317.txt, did make clean and then the same commands as shown above. One of the certificate request tests failed with the following output: make a certificate request using 'req' rsa Generating a 512 bit RSA private key .. ... writing new private key to 'keyCA.ss' - You are about to be asked to enter information that will be incorporated into your certificate request. What you are about to enter is what is called a Distinguished Name or a DN. There are quite a few fields but you can leave some blank For some fields there will be a default value, If you enter '.', the field will be left blank. - Country Name (2 letter code) [AU]:AU Organization Name (eg, company) []:Dodgy Brothers Common Name (eg, YOUR name) []:Dodgy CA convert the certificate request into a self signed certificate using 'x509' unable to load 'random state' This means that the random number generator has not been seeded with much random data. Consider setting the RANDFILE environment variable to point at a file that 'random' data can be kept in (the file will be overwritten). Signature ok subject=/C=AU/O=Dodgy Brothers/CN=Dodgy CA Getting Private key 20476:error:24064064:random number generator:SSLEAY_RAND_BYTES:PRNG not seeded:md_rand.c:503:You need to read the OpenSSL FAQ, http://www.openssl.org/support/faq.html 20476:error:0D080006:asn1 encoding routines:ASN1_sign:EVP lib:a_sign.c:275:error using 'x509' to self sign a certificate request *** Error code 1 Stop. *** Error code 1 Stop. I then downloaded the latest rsa_lib.c and rsa_eay.c from CVS to make sure my patching went correctly, and the compared 100%. Any ideas why this patch breaks make test? Should I go ahead and install this build, or should I wait for a further patch? Terry Kennedy http://www.tmk.com [EMAIL PROTECTED] New York, NY USA __ OpenSSL Project http://www.openssl.org Development Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]