On Fri, Mar 01, 2013 at 09:32:21PM +0100, Andy Polyakov via RT wrote:
> Hi,
> 
> >>>> I've been getting reports from users who see issues with openssl
> >>>> after the upgrade from 1.0.1c to 1.0.1e
> >>>>
> >>>> See:
> >>>> http://bugs.debian.org/678353#10
> >>> I tried on my Intel Core i7-3770S with 1.0.1e connecting to his
> >>> mail server and was unable to reproduce with the stock 1.0.1e
> >>> I built.
> >>>
> >> I got an other bug report now:
> >> http://bugs.debian.org/701868
> >>
> >> Both user report that using OPENSSL_ia32cap=~0x200000200000000
> >> fixes there problem.
> > 
> > And I've also been pointed to:
> > http://forums.otterhub.org/viewtopic.php?f=62&t=18941
> > 
> > It seems various users are affected by this.
> 
> There are seem to be several problems... As for AES-NI you seem have 
> missed fix for zero-length TLS fragments, 
> http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fc90e42c8623af13308d8ef7e7ada84af0a36509.
>  
> I mean I've 'apt-get source openssl' on a Ubuntu machine, applied your 
> CVE-2013-0169.patch manually and there is no NO_PAYLOAD_LENGTH... This 
> means that if AES-NI enabled machine talks to server that support 
> zero-length countermeasure, you are in trouble.

I don't have anything to do with the Ubuntu upload.  The Debian package
is a real 1.0.1e version, not a backport of patches, that does have that
patch applied.

> As for myrta.com:443, the problem is not specific to AES-NI as it 
> persists even with -cipher RC4-SHA. Looking further into it...

Yes, I said that that message was unrelated, it also affects
1.0.1c and it goes away when you use -no_tls1_1.


Kurt


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       openssl-dev@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to