This is one reason why keeping around old assembly code can have a cost. :(

https://github.com/openssl/openssl/pull/5320

Andy and Tim:  Still waiting for your response to my question in that PR …

--- Begin Message ---
OpenSSL bugs, TLSv1.3 latest, Cloud Crypto Logging  and a free 14-day trial of 
Cryptosense Analyzer! 
Find and resolve crypto misuse vulnerabilities in your applications and 
infrastructure. 
View  this email in your browser 
Dear Rich, 
In April's crypto bulletin: 
Open  SSL - Security-critical bug in PA-RISC Assembly code  
Cloud  Crypto Providers Comparison - Part 3 
TLS v1.3  - Is 0-RTT Safe?  
Get  a Free 14-day trial of Cryptosense Analyzer!  
PA-RISC OpenSSL Issue  

On 27th March, an OpenSSL security advisory was issued describing an issue in 
the PA-RISC assembly-language implementation of CRYPTO_memcmp. This function 
compares two bitstrings in contant time to avoid timing leaks. The bug meant 
that effectively only the least significant bit of every byte in the bitstring 
was actually compared, making it substantially easier to e.g. fake an HMAC tag. 
The assembly code can only be compiled on the HP-UX platform so relatively few 
users are affected. However, there are  a couple more issues in the advisory 
so, as always, it's important to upgrade. 
Cloud Crypto Providers  Comparison - Part 3

At Cryptosense we've been taking a look at the crypto on offer from the big 
three public cloud providers - Amazon (AWS KMS), Google (Cloud KMS) and 
Microsoft (Azure Keyvault). In part three we covered logging and alerts on key 
usage. You can still read parts one and two.
  
TLS v1.3 - is 0-RTT Secure?
The long awaited TLS v1.3 protocol includes a special zero round-trip or 0-RTT 
mode that allows a client and server that have communicated before to restart 
communication without a full handshake. This saves time but introduces a 
possible security risk if the server is compromised. A widely-ready twitter 
thread by Amazon's Colm MacCárthaigh (unrolled  here) explains the issues 
nicely. Briefly: security requires a certain amount of trust in the servers 
that you talk to. 
Get a Free Trial of Cryptosense Analyzer SaaS  Edition

You can now get a free trial of our automated crypto audit software for 
applications, Cryptosense Analyzer. Just hit the button below to start your 
14-day evaluation, no credit card required. You can also come and see us in San 
Francisco around RSAC 2018 April 17-19. 

  
Cryptosense  Analyzer Free Trial 

The Cryptosense Team 
 
Twitter 
Cryptosense 
LinkedIn 
Copyright © 2018 Cryptosense, All rights reserved.
You're receiving this mail because you signed up at the Cryptosense website, 
visited us at on the booth at RSA or met with us over the last year. The volume 
of these mails will be maximum one per month. To unsubscribe, see the link 
below.

Our mailing address is:
Cryptosense 40bis rue du Fbg Poissonnière
Paris 75010 France

Add us to your address book


unsubscribe  from this list    update subscription preferences  






This email was sent to [email protected] 
why  did I get this?    unsubscribe  from this list    update  subscription 
preferences 
Cryptosense · 40bis rue du Fbg Poissonnière · Paris 75010 · France 



--- End Message ---
_______________________________________________
openssl-project mailing list
[email protected]
https://mta.openssl.org/mailman/listinfo/openssl-project

Reply via email to