Kyle Hamilton wrote, On 2008-09-18 11:48:
> There's another, more pressing issue:
> 
> If there are buffer overflows in ASN.1 parsing (there have been in at
> the least OpenSSL and Microsoft's), anyone who can provide a
> certificate that points to an AIA that ultimately wouldn't be trusted
> could provide malicious data that could compromise the issue.

About 5-6 years ago, NISCC, an office of the UK government, made available
to software developers an enormous set of test data, over 1 million certs,
each crafted to detect buffer potential buffer overflows.  The set was
produced at the University of Oulu (IIRC) for NISCC.  There were also
test cases for PKCS#7 and numerous other common BER/DER message/file
formats.  There were SSL server certs and client auth certs, IIRC.

A major part of the work done for NSS 3.9.0 in late 2003 was that we
devised test programs and test scripts to test with all those files of
test data.  I devised an SSL server and SSL client that would serve up a
different one of those test certs in each full handshake.  We enhanced
certutil and our PKCS7 and SMIME test tools to facilitate this testing.
We found a lot of bugs, and fixed them all.  We now run the NISCC tests
periodically (nightly or weekly, IIRC) to ensure no regressions there.
Consequently, since the release of NSS 3.9.0, our confidence level in the
"bullet proof" nature of our ASN.1 decoder, and the higher level decoders
that use it (such as PKCS7) is very high.
_______________________________________________
dev-tech-crypto mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to