The branch master has been updated via 85a91384a31f8ca359dae220bf4d2cc63f0d1f18 (commit) from 98dd590bb12c298a62e39a175b2b66511c3fb9bd (commit)
- Log ----------------------------------------------------------------- commit 85a91384a31f8ca359dae220bf4d2cc63f0d1f18 Author: Viktor Szakats <vszak...@users.noreply.github.com> Date: Thu Oct 29 20:15:25 2015 +0100 use secure URLs in secadv docs Also remove some trailing whitespace. Signed-off-by: Rich Salz <rs...@akamai.com> ----------------------------------------------------------------------- Summary of changes: docs/faq.txt | 16 ++++++++-------- news/secadv/20020730.txt | 16 ++++++++-------- news/secadv/20030219.txt | 6 +++--- news/secadv/20030319.txt | 8 ++++---- news/secadv/20030930.txt | 8 ++++---- news/secadv/20031104.txt | 8 ++++---- news/secadv/20040317.txt | 8 ++++---- news/secadv/20051011.txt | 10 +++++----- news/secadv/20060905.txt | 10 +++++----- news/secadv/20060928.txt | 6 +++--- news/secadv/20071129.txt | 8 ++++---- news/secadv/20090107.txt | 2 +- news/secadv/20090325.txt | 2 +- news/secadv/20091111.txt | 4 ++-- news/secadv/20100324.txt | 2 +- news/secadv/20100601.txt | 2 +- news/secadv/20101116-2.txt | 2 +- news/secadv/20101116.txt | 2 +- news/secadv/20101202.txt | 4 ++-- news/secadv/20110208.txt | 2 +- news/secadv/20110906.txt | 2 +- news/secadv/20120104.txt | 2 +- news/secadv/20120118.txt | 2 +- news/secadv/20120312.txt | 2 +- news/secadv/20120419.txt | 2 +- news/secadv/20120424.txt | 4 ++-- news/secadv/20120510.txt | 2 +- news/secadv/20130205.txt | 2 +- news/secadv/20140605.txt | 2 +- news/secadv/20140806.txt | 2 +- news/secadv/20150108.txt | 3 +-- news/secadv/prng.txt | 4 ++-- support/acks.html | 2 +- 33 files changed, 78 insertions(+), 79 deletions(-) mode change 100644 => 100755 news/secadv/20020730.txt mode change 100644 => 100755 news/secadv/20030219.txt mode change 100644 => 100755 news/secadv/20030319.txt mode change 100644 => 100755 news/secadv/20030930.txt mode change 100644 => 100755 news/secadv/20031104.txt mode change 100644 => 100755 news/secadv/20040317.txt mode change 100644 => 100755 news/secadv/20051011.txt mode change 100644 => 100755 news/secadv/20060905.txt mode change 100644 => 100755 news/secadv/20060928.txt mode change 100644 => 100755 news/secadv/20071129.txt mode change 100644 => 100755 news/secadv/20090107.txt mode change 100644 => 100755 news/secadv/20090325.txt mode change 100644 => 100755 news/secadv/20091111.txt mode change 100644 => 100755 news/secadv/20100324.txt mode change 100644 => 100755 news/secadv/20100601.txt mode change 100644 => 100755 news/secadv/20101116-2.txt mode change 100644 => 100755 news/secadv/20101116.txt mode change 100644 => 100755 news/secadv/20101202.txt mode change 100644 => 100755 news/secadv/20110208.txt mode change 100644 => 100755 news/secadv/20110906.txt mode change 100644 => 100755 news/secadv/20120104.txt mode change 100644 => 100755 news/secadv/20120118.txt mode change 100644 => 100755 news/secadv/20120312.txt mode change 100644 => 100755 news/secadv/20120419.txt mode change 100644 => 100755 news/secadv/20120424.txt mode change 100644 => 100755 news/secadv/20120510.txt mode change 100644 => 100755 news/secadv/20130205.txt mode change 100644 => 100755 news/secadv/20140605.txt mode change 100644 => 100755 news/secadv/20140806.txt mode change 100644 => 100755 news/secadv/prng.txt diff --git a/docs/faq.txt b/docs/faq.txt index 85b8092..dde39c0 100644 --- a/docs/faq.txt +++ b/docs/faq.txt @@ -15,7 +15,7 @@ OpenSSL - Frequently Asked Questions [LEGAL] Legal questions * Do I need patent licenses to use OpenSSL? -* Can I use OpenSSL with GPL software? +* Can I use OpenSSL with GPL software? [USER] Questions on using the OpenSSL applications @@ -174,9 +174,9 @@ just do: * How does the versioning scheme work? -After the release of OpenSSL 1.0.0 the versioning scheme changed. Letter +After the release of OpenSSL 1.0.0 the versioning scheme changed. Letter releases (e.g. 1.0.1a) can only contain bug and security fixes and no -new features. Minor releases change the last number (e.g. 1.0.2) and +new features. Minor releases change the last number (e.g. 1.0.2) and can contain new features that retain binary compatibility. Changes to the middle number are considered major releases and neither source nor binary compatibility is guaranteed. @@ -543,7 +543,7 @@ that the OpenSSL bntest throws at it. This gets triggered when you run the test suite (using "make test"). The message returned is "bc: stack empty". The best way to deal with this is to find another implementation of bc -and compile/install it. GNU bc (see <URL: http://www.gnu.org/software/software.html> +and compile/install it. GNU bc (see <URL: https://www.gnu.org/software/software.html> for download instructions) can be safely used, for example. @@ -582,7 +582,7 @@ This will only compile sha_dgst.c with -O0, the rest with the optimization level chosen by the configuration process. When the above is done, do the test and installation and you're set. -3. Reconfigure the toolkit with no-sha0 option to leave out SHA0. It +3. Reconfigure the toolkit with no-sha0 option to leave out SHA0. It should not be used and is not used in SSL/TLS nor any other recognized protocol in either case. @@ -774,14 +774,14 @@ See also <URL: https://www.openssl.org/community> * I've found a security issue, how do I report it? If you think your bug has security implications then please send it to -openssl-secur...@openssl.org if you don't get a prompt reply at least +openssl-secur...@openssl.org if you don't get a prompt reply at least acknowledging receipt then resend or mail it directly to one of the more active team members (e.g. Steve). If you wish to use PGP to send in a report please use one or more of the keys of the team members listed at <URL: https://www.openssl.org/community/team.html> Note that bugs only present in the openssl utility are not in general -considered to be security issues. +considered to be security issues. [PROG] ======================================================================== @@ -931,7 +931,7 @@ macros with a C++ compiler. There is hardly ever any need to use the PKCS#12 macros in a program, it is much easier to parse and create PKCS#12 files using the PKCS12_parse() and PKCS12_create() functions documented in doc/openssl.txt and with examples in demos/pkcs12. The -'pkcs12' application has to use the macros because it prints out +'pkcs12' application has to use the macros because it prints out debugging information. diff --git a/news/secadv/20020730.txt b/news/secadv/20020730.txt old mode 100644 new mode 100755 index 918b764..464307c --- a/news/secadv/20020730.txt +++ b/news/secadv/20020730.txt @@ -56,7 +56,7 @@ Apply the attached patch to OpenSSL 0.9.6d, or upgrade to OpenSSL TLS. A patch for 0.9.7 is available from the OpenSSL website -(http://www.openssl.org/). +(https://www.openssl.org/). Servers can disable SSL2, alternatively disable all applications using SSL or TLS until the patches are applied. Users of 0.9.7 pre-release @@ -74,9 +74,9 @@ possible, but have not released the exploit code. References ---------- -http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0655 -http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0656 -http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0657 +https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0655 +https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0656 +https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0657 Acknowledgements ---------------- @@ -126,7 +126,7 @@ There are no known exploits for this vulnerability. References ---------- -http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0659 +https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2002-0659 Acknowledgements ---------------- @@ -141,10 +141,10 @@ The patch and advisory were prepared by Dr. Stephen Henson. Combined patches for OpenSSL 0.9.6d: -http://www.openssl.org/news/patch_20020730_0_9_6d.txt +https://www.openssl.org/news/patch_20020730_0_9_6d.txt Combined patches for OpenSSL 0.9.7 beta 2: -http://www.openssl.org/news/patch_20020730_0_9_7.txt +https://www.openssl.org/news/patch_20020730_0_9_7.txt URL for this Security Advisory: -http://www.openssl.org/news/secadv_20020730.txt +https://www.openssl.org/news/secadv_20020730.txt diff --git a/news/secadv/20030219.txt b/news/secadv/20030219.txt old mode 100644 new mode 100755 index 647373a..d8266ba --- a/news/secadv/20030219.txt +++ b/news/secadv/20030219.txt @@ -48,7 +48,7 @@ plaintext block. OpenSSL version since 0.9.6c supposedly treat block cipher padding errors like MAC verification errors during record decryption -(see http://www.openssl.org/~bodo/tls-cbc.txt), but MAC verification +(see https://www.openssl.org/~bodo/tls-cbc.txt), but MAC verification was still skipped after detection of a padding error, which allowed the timing attack. (Note that it is likely that other SSL/TLS implementations will have similar problems.) @@ -208,7 +208,7 @@ http://lasecwww.epfl.ch/memo_ssl.shtml The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0078 to this issue: -http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0078 +https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0078 URL for this Security Advisory: -http://www.openssl.org/news/secadv_20030219.txt +https://www.openssl.org/news/secadv_20030219.txt diff --git a/news/secadv/20030319.txt b/news/secadv/20030319.txt old mode 100644 new mode 100755 index f868198..778f9e2 --- a/news/secadv/20030319.txt +++ b/news/secadv/20030319.txt @@ -44,7 +44,7 @@ The following patch can be applied to OpenSSL releases 0.9.6b up to 0.9.6i, + /* SSLerr(SSL_F_SSL3_GET_CLIENT_KEY_EXCHANGE,SSL_R_BAD_PROTOCOL_VERSION_NUMBER); */ + + /* The Klima-Pokorny-Rosa extension of Bleichenbacher's attack -+ * (http://eprint.iacr.org/2003/052/) exploits the version ++ * (https://eprint.iacr.org/2003/052/) exploits the version + * number check as a "bad version oracle" -- an alert would + * reveal that the plaintext corresponding to some ciphertext + * made up by the adversary is properly formatted except @@ -84,11 +84,11 @@ References Report "Attacking RSA-based Sessions in SSL/TLS" by V. Klima, O. Pokorny, and T. Rosa: -http://eprint.iacr.org/2003/052/ +https://eprint.iacr.org/2003/052/ The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0131 to this issue. -http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0131 +https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0131 URL for this Security Advisory: -http://www.openssl.org/news/secadv_20030319.txt +https://www.openssl.org/news/secadv_20030319.txt diff --git a/news/secadv/20030930.txt b/news/secadv/20030930.txt old mode 100644 new mode 100755 index 72aee84..ad0b90e --- a/news/secadv/20030930.txt +++ b/news/secadv/20030930.txt @@ -61,12 +61,12 @@ References The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0545 for issue 1: -http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0545 +https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0545 and CAN-2003-0543 and CAN-2003-0544 for issue 2: -http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0543 -http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0544 +https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0543 +https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0544 URL for this Security Advisory: -http://www.openssl.org/news/secadv_20030930.txt +https://www.openssl.org/news/secadv_20030930.txt diff --git a/news/secadv/20031104.txt b/news/secadv/20031104.txt old mode 100644 new mode 100755 index 2cd2fb8..31b332c --- a/news/secadv/20031104.txt +++ b/news/secadv/20031104.txt @@ -42,9 +42,9 @@ applications statically linked to OpenSSL libraries. OpenSSL 0.9.6l is available for download via HTTP and FTP from the following master locations (you can find the various FTP mirrors under -http://www.openssl.org/source/mirror.html): +https://www.openssl.org/source/mirror.html): - o http://www.openssl.org/source/ + o https://www.openssl.org/source/ o ftp://ftp.openssl.org/source/ The distribution file name is: @@ -65,7 +65,7 @@ References The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0851 to this issue. -http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0851 +https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0851 URL for this Security Advisory: -http://www.openssl.org/news/secadv_20031104.txt +https://www.openssl.org/news/secadv_20031104.txt diff --git a/news/secadv/20040317.txt b/news/secadv/20040317.txt old mode 100644 new mode 100755 index daf0b67..15879c6 --- a/news/secadv/20040317.txt +++ b/news/secadv/20040317.txt @@ -48,7 +48,7 @@ statically linked to OpenSSL libraries. OpenSSL 0.9.7d and OpenSSL 0.9.6m are available for download via HTTP and FTP from the following master locations (you can find the various FTP -mirrors under http://www.openssl.org/source/mirror.html): +mirrors under https://www.openssl.org/source/mirror.html): ftp://ftp.openssl.org/source/ @@ -79,10 +79,10 @@ References ---------- http://www.codenomicon.com/testtools/tls/ -http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0079 -http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0112 +https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0079 +https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0112 URL for this Security Advisory: -http://www.openssl.org/news/secadv_20040317.txt +https://www.openssl.org/news/secadv_20040317.txt diff --git a/news/secadv/20051011.txt b/news/secadv/20051011.txt old mode 100644 new mode 100755 index c4fd001..1fadb6f --- a/news/secadv/20051011.txt +++ b/news/secadv/20051011.txt @@ -63,9 +63,9 @@ following measures is sufficient. OpenSSL 0.9.8a and OpenSSL 0.9.7h are available for download via HTTP and FTP from the following master locations (you can find the - various FTP mirrors under http://www.openssl.org/source/mirror.html): + various FTP mirrors under https://www.openssl.org/source/mirror.html): - o http://www.openssl.org/source/ + o https://www.openssl.org/source/ o ftp://ftp.openssl.org/source/ The distribution file names are: @@ -88,7 +88,7 @@ following measures is sufficient. source code to resolve the problem. The patch is compatible with the 0.9.6, 0.9.7, and 0.9.8 branches of OpenSSL. - o http://www.openssl.org/news/patch-CAN-2005-2969.txt + o https://www.openssl.org/news/patch-CAN-2005-2969.txt Whether you choose to upgrade to a new version or to apply the patch, make sure to recompile any applications statically linked @@ -108,7 +108,7 @@ problem. References ---------- -http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2969 +https://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2969 URL for this Security Advisory: -http://www.openssl.org/news/secadv_20051011.txt +https://www.openssl.org/news/secadv_20051011.txt diff --git a/news/secadv/20060905.txt b/news/secadv/20060905.txt old mode 100644 new mode 100755 index 45c9e7f..9865eee --- a/news/secadv/20060905.txt +++ b/news/secadv/20060905.txt @@ -38,9 +38,9 @@ following measures is sufficient. OpenSSL 0.9.8c and OpenSSL 0.9.7k are available for download via HTTP and FTP from the following master locations (you can find the - various FTP mirrors under http://www.openssl.org/source/mirror.html): + various FTP mirrors under https://www.openssl.org/source/mirror.html): - o http://www.openssl.org/source/ + o https://www.openssl.org/source/ o ftp://ftp.openssl.org/source/ The distribution file names are: @@ -63,7 +63,7 @@ following measures is sufficient. source code to resolve the problem. The patch is compatible with the 0.9.6, 0.9.7, 0.9.8, and 0.9.9 branches of OpenSSL. - o http://www.openssl.org/news/patch-CVE-2006-4339.txt + o https://www.openssl.org/news/patch-CVE-2006-4339.txt Whether you choose to upgrade to a new version or to apply the patch, make sure to recompile any applications statically linked to OpenSSL @@ -82,9 +82,9 @@ to fix the problems. References ---------- -http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339 +https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339 http://www.imc.org/ietf-openpgp/mail-archive/msg14307.html URL for this Security Advisory: -http://www.openssl.org/news/secadv_20060905.txt +https://www.openssl.org/news/secadv_20060905.txt diff --git a/news/secadv/20060928.txt b/news/secadv/20060928.txt old mode 100644 new mode 100755 index 9c2c1e1..50a2f09 --- a/news/secadv/20060928.txt +++ b/news/secadv/20060928.txt @@ -79,9 +79,9 @@ These vulnerabilities are resolved in the following versions of OpenSSL: OpenSSL 0.9.8d and OpenSSL 0.9.7l are available for download via HTTP and FTP from the following master locations (you can find the -various FTP mirrors under http://www.openssl.org/source/mirror.html): +various FTP mirrors under https://www.openssl.org/source/mirror.html): - o http://www.openssl.org/source/ + o https://www.openssl.org/source/ o ftp://ftp.openssl.org/source/ The distribution file names are: @@ -108,4 +108,4 @@ References ========== URL for this Security Advisory: -http://www.openssl.org/news/secadv_20060928.txt +https://www.openssl.org/news/secadv_20060928.txt diff --git a/news/secadv/20071129.txt b/news/secadv/20071129.txt old mode 100644 new mode 100755 index 52e7c5f..d3f0be3 --- a/news/secadv/20071129.txt +++ b/news/secadv/20071129.txt @@ -4,7 +4,7 @@ OpenSSL FIPS Object Module Vulnerabilities ------------------------------------------ A significant flaw in the PRNG implementation for the OpenSSL FIPS Object -Module v1.1.1 (http://openssl.org/source/openssl-fips-1.1.1.tar.gz, FIPS +Module v1.1.1 (https://www.openssl.org/source/openssl-fips-1.1.1.tar.gz, FIPS 140-2 validation certificate #733, http://csrc.nist.gov/groups/STM/cmvp/documents/140-1/140val-all.htm#733) has been reported by Geoff Lowe of Secure Computing Corporation. Due to a coding @@ -32,11 +32,11 @@ Wait for official approval of a patched distribution. For reference purposes the patches - http://www.openssl.org/news/patch-CVE-2007-5502-1.txt + https://www.openssl.org/news/patch-CVE-2007-5502-1.txt (the simplest direct fix) and: - http://www.openssl.org/news/patch-CVE-2007-5502-2.txt + https://www.openssl.org/news/patch-CVE-2007-5502-2.txt (a workaround which avoids touching the PRNG code directly) demonstrate two different fixes that independently address the vulnerability. However, for @@ -49,7 +49,7 @@ Institute (OSSI), has supplied the information needed for a "letter change" update request based on the latter of these two patches to the FIPS 140-2 test lab to be submitted for official approval. Once (and if) approved the new distribution containing this patch will be posted as -http://openssl.org/source/openssl-fips-1.1.2.tar.gz. The timeline for this +https://www.openssl.org/source/openssl-fips-1.1.2.tar.gz. The timeline for this approval is presently unknown. diff --git a/news/secadv/20090107.txt b/news/secadv/20090107.txt old mode 100644 new mode 100755 index b2816c9..4e06b88 --- a/news/secadv/20090107.txt +++ b/news/secadv/20090107.txt @@ -63,7 +63,7 @@ References =========== URL for this Security Advisory: -http://www.openssl.org/news/secadv_20090107.txt +https://www.openssl.org/news/secadv_20090107.txt diff -ur openssl-0.9.8i-ORIG/apps/speed.c openssl-0.9.8i/apps/speed.c diff --git a/news/secadv/20090325.txt b/news/secadv/20090325.txt old mode 100644 new mode 100755 index 4e90a20..de84b65 --- a/news/secadv/20090325.txt +++ b/news/secadv/20090325.txt @@ -60,5 +60,5 @@ References =========== URL for this Security Advisory: -http://www.openssl.org/news/secadv_20090325.txt +https://www.openssl.org/news/secadv_20090325.txt diff --git a/news/secadv/20091111.txt b/news/secadv/20091111.txt old mode 100644 new mode 100755 index 62af9e9..b21eec9 --- a/news/secadv/20091111.txt +++ b/news/secadv/20091111.txt @@ -83,11 +83,11 @@ References =========== CVE-2009-3555: -http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555 +https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555 TLS extension: https://svn.resiprocate.org/rep/ietf-drafts/ekr/draft-rescorla-tls-renegotiate.txt URL for this Security Advisory: -http://www.openssl.org/news/secadv_20091111.txt +https://www.openssl.org/news/secadv_20091111.txt diff --git a/news/secadv/20100324.txt b/news/secadv/20100324.txt old mode 100644 new mode 100755 index aabb4d3..0127494 --- a/news/secadv/20100324.txt +++ b/news/secadv/20100324.txt @@ -45,4 +45,4 @@ References This vulnerability is tracked as CVE-2010-0740. URL for this Security Advisory: -http://www.openssl.org/news/secadv_20100324.txt +https://www.openssl.org/news/secadv_20100324.txt diff --git a/news/secadv/20100601.txt b/news/secadv/20100601.txt old mode 100644 new mode 100755 index 6d874e3..709370c --- a/news/secadv/20100601.txt +++ b/news/secadv/20100601.txt @@ -41,5 +41,5 @@ References =========== URL for this Security Advisory: -http://www.openssl.org/news/secadv_20100601.txt +https://www.openssl.org/news/secadv_20100601.txt diff --git a/news/secadv/20101116-2.txt b/news/secadv/20101116-2.txt old mode 100644 new mode 100755 index e624bb3..4d6e0bf --- a/news/secadv/20101116-2.txt +++ b/news/secadv/20101116-2.txt @@ -203,6 +203,6 @@ References =========== URL for this Security Advisory: -http://www.openssl.org/news/secadv_20101116-2.txt +https://www.openssl.org/news/secadv_20101116-2.txt diff --git a/news/secadv/20101116.txt b/news/secadv/20101116.txt old mode 100644 new mode 100755 index 7273c81..bc392f1 --- a/news/secadv/20101116.txt +++ b/news/secadv/20101116.txt @@ -199,6 +199,6 @@ References =========== URL for this Security Advisory: -http://www.openssl.org/news/secadv_20101116.txt +https://www.openssl.org/news/secadv_20101116.txt diff --git a/news/secadv/20101202.txt b/news/secadv/20101202.txt old mode 100644 new mode 100755 index 22a31c6..0d4d91a --- a/news/secadv/20101202.txt +++ b/news/secadv/20101202.txt @@ -119,9 +119,9 @@ References =========== URL for this Security Advisory: -http://www.openssl.org/news/secadv_20101202.txt +https://www.openssl.org/news/secadv_20101202.txt URL for updated CVS-2010-3864 Security Advisory: -http://www.openssl.org/news/secadv_20101116-2.txt +https://www.openssl.org/news/secadv_20101116-2.txt diff --git a/news/secadv/20110208.txt b/news/secadv/20110208.txt old mode 100644 new mode 100755 index 9c1e951..ee46181 --- a/news/secadv/20110208.txt +++ b/news/secadv/20110208.txt @@ -72,7 +72,7 @@ References This vulnerability is tracked as CVE-2011-0014. URL for this Security Advisory: -http://www.openssl.org/news/secadv_20110208.txt +https://www.openssl.org/news/secadv_20110208.txt OCSP stapling is defined in RFC 6066 (previously RFC 3546), section "Certificate Status Request". diff --git a/news/secadv/20110906.txt b/news/secadv/20110906.txt old mode 100644 new mode 100755 index f95aa02..db8cba1 --- a/news/secadv/20110906.txt +++ b/news/secadv/20110906.txt @@ -58,5 +58,5 @@ References ========== URL for this Security Advisory: -http://www.openssl.org/news/secadv_20110906.txt +https://www.openssl.org/news/secadv_20110906.txt diff --git a/news/secadv/20120104.txt b/news/secadv/20120104.txt old mode 100644 new mode 100755 index 6763fb4..d015463 --- a/news/secadv/20120104.txt +++ b/news/secadv/20120104.txt @@ -105,5 +105,5 @@ References ========== URL for this Security Advisory: -http://www.openssl.org/news/secadv_20120104.txt +https://www.openssl.org/news/secadv_20120104.txt diff --git a/news/secadv/20120118.txt b/news/secadv/20120118.txt old mode 100644 new mode 100755 index 64d3502..4ac82c3 --- a/news/secadv/20120118.txt +++ b/news/secadv/20120118.txt @@ -19,5 +19,5 @@ References ========== URL for this Security Advisory: -http://www.openssl.org/news/secadv_20120118.txt +https://www.openssl.org/news/secadv_20120118.txt diff --git a/news/secadv/20120312.txt b/news/secadv/20120312.txt old mode 100644 new mode 100755 index d584f62..1ee42d9 --- a/news/secadv/20120312.txt +++ b/news/secadv/20120312.txt @@ -29,5 +29,5 @@ References RFC3218 URL for this Security Advisory: -http://www.openssl.org/news/secadv_20120312.txt +https://www.openssl.org/news/secadv_20120312.txt diff --git a/news/secadv/20120419.txt b/news/secadv/20120419.txt old mode 100644 new mode 100755 index ca9bd34..617f8d7 --- a/news/secadv/20120419.txt +++ b/news/secadv/20120419.txt @@ -35,6 +35,6 @@ References ========== URL for this Security Advisory: -http://www.openssl.org/news/secadv_20120419.txt +https://www.openssl.org/news/secadv_20120419.txt diff --git a/news/secadv/20120424.txt b/news/secadv/20120424.txt old mode 100644 new mode 100755 index 5929329..21ff332 --- a/news/secadv/20120424.txt +++ b/news/secadv/20120424.txt @@ -7,7 +7,7 @@ ASN1 BIO incomplete fix (CVE-2012-2131) It was discovered that the fix for CVE-2012-2110 released on 19 Apr 2012 was not sufficient to correct the issue for OpenSSL 0.9.8. -Please see http://www.openssl.org/news/secadv_20120419.txt for details +Please see https://www.openssl.org/news/secadv_20120419.txt for details of that vulnerability. This issue only affects OpenSSL 0.9.8v. OpenSSL 1.0.1a and 1.0.0i @@ -21,4 +21,4 @@ References ========== URL for this Security Advisory: -http://www.openssl.org/news/secadv_20120424.txt +https://www.openssl.org/news/secadv_20120424.txt diff --git a/news/secadv/20120510.txt b/news/secadv/20120510.txt old mode 100644 new mode 100755 index 441b835..be085ed --- a/news/secadv/20120510.txt +++ b/news/secadv/20120510.txt @@ -22,6 +22,6 @@ References ========== URL for this Security Advisory: -http://www.openssl.org/news/secadv_20120510.txt +https://www.openssl.org/news/secadv_20120510.txt diff --git a/news/secadv/20130205.txt b/news/secadv/20130205.txt old mode 100644 new mode 100755 index 4d4a610..1a278f6 --- a/news/secadv/20130205.txt +++ b/news/secadv/20130205.txt @@ -57,7 +57,7 @@ Affected users should upgrade to OpenSSL 1.0.1d, 1.0.0k or 0.9.8y. References ========== URL for this Security Advisory: -http://www.openssl.org/news/secadv_20130204.txt +https://www.openssl.org/news/secadv_20130204.txt Wikipedia AES-NI description: https://en.wikipedia.org/wiki/AES-NI diff --git a/news/secadv/20140605.txt b/news/secadv/20140605.txt old mode 100644 new mode 100755 index a86051d..514929e --- a/news/secadv/20140605.txt +++ b/news/secadv/20140605.txt @@ -117,7 +117,7 @@ References ========== URL for this Security Advisory: -http://www.openssl.org/news/secadv_20140605.txt +https://www.openssl.org/news/secadv_20140605.txt Note: the online version of the advisory may be updated with additional details over time. diff --git a/news/secadv/20140806.txt b/news/secadv/20140806.txt old mode 100644 new mode 100755 index d2e7e53..0146712 --- a/news/secadv/20140806.txt +++ b/news/secadv/20140806.txt @@ -157,7 +157,7 @@ References ========== URL for this Security Advisory: -http://www.openssl.org/news/secadv_20140806.txt +https://www.openssl.org/news/secadv_20140806.txt Note: the online version of the advisory may be updated with additional details over time. diff --git a/news/secadv/20150108.txt b/news/secadv/20150108.txt index a4e68a8..c3fe15f 100644 --- a/news/secadv/20150108.txt +++ b/news/secadv/20150108.txt @@ -193,7 +193,7 @@ conducted by the OpenSSL development team and Adam Langley of Google. The final fix was developed by Andy Polyakov of the OpenSSL core team. -[1] http://css.csail.mit.edu/6.858/2013/readings/rsa-bug-attacks.pdf +[1] https://css.csail.mit.edu/6.858/2013/readings/rsa-bug-attacks.pdf Note ==== @@ -215,4 +215,3 @@ details over time. For details of OpenSSL severity classifications please see: https://www.openssl.org/about/secpolicy.html - diff --git a/news/secadv/prng.txt b/news/secadv/prng.txt old mode 100644 new mode 100755 index a923174..981b062 --- a/news/secadv/prng.txt +++ b/news/secadv/prng.txt @@ -23,7 +23,7 @@ MD5 checksums: openssl-engine-0.9.6b.tar.gz ab5ca5b157459c49bdab06a7db8a5a47 OpenSSL source code can also be obtained from a number of mirror sites. -For a list, see <URL: http://www.openssl.org/source/mirror.html>. +For a list, see <URL: https://www.openssl.org/source/mirror.html>. If you are using a pre-compiled OpenSSL package, please look for update information from the respective software distributor. The OpenSSL @@ -216,4 +216,4 @@ for discovering the PRNG problem and bringing it to our attention. URL for this Security Advisory: -http://www.openssl.org/news/secadv_prng.txt +https://www.openssl.org/news/secadv_prng.txt diff --git a/support/acks.html b/support/acks.html index 0118b3e..29bb761 100644 --- a/support/acks.html +++ b/support/acks.html @@ -25,7 +25,7 @@ <hr noshade size=1> <p>Exceptional support:</p> - <a href="http://www.linux-foundation.org/"><img src="/img/lf-logo-med.png"></a> + <a href="http://www.linuxfoundation.org/"><img src="/img/lf-logo-med.png"></a> <a href="http://www.linuxfoundation.org/programs/core-infrastructure-initiative"><img src="/img/cii-logo-med.png"></a> <a href="http://www.smartisan.com/"><img src="/img/smartisan-logo-med.png"></a> _____ openssl-commits mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-commits