William A. Rowe Jr. wrote:
On 6/14/2010 7:59 PM, Nicholas Maniscalco wrote:
Is using OpenSSL built with the PURIFY flag considered "secure"?
I ask because I came across this comment, in md_rand.c:

#ifndef PURIFY /* purify complains */
       /* DO NOT REMOVE THE FOLLOWING CALL TO MD_Update()! */
       if (!MD_Update(&m,buf,j))
           goto err;
       /* We know that line may cause programs such as
          purify and valgrind to complain about use of
          uninitialized data.  */
#endif

The last time someone went by such nonsense[1], they created an entirely
exploitable set of keys on all debian/ubuntu-derived distributions.  Good
luck with that, and please let us know what you are maintaining, so that
we might avoid such distributions and products.

[1] http://www.debian.org/security/2008/dsa-1571

Thanks, William.  I am familiar with the Debian issue.

The code I pasted above is from ssleay_rand_bytes. Perhaps you were thinking I was talking about the call in ssleay_rand_add? I am quite aware that removing the call from ssleay_rand_add is a very bad idea :)

Are you still of the opinion that an OpenSSL built with PURIFY is insecure? David Schwartz, indicated otherwise in a similar thread I started a few weeks back (see his last sentence),

http://www.mail-archive.com/[email protected]/msg27732.html

I was satisfied with his answer until I saw the comment above, hence the new thread. Again, I'm just trying to get a definitive answer on whether the PURIFY flag is considered secure. Thanks.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [email protected]
Automated List Manager                           [email protected]

Reply via email to