Hi ALL,

I am newbie to openssl and i have recently joined in openssl activities.As
we all know , we have come across the security vulnerability issue
CVE-2009-3555 and i need to patch the OpenSSL 0.9.8k version. I was going
from some of query already in this forum . 

>From this link
http://www.derkeiler.com/Mailing-Lists/FreeBSD-Security/2009-11/msg00000.html,
I came to know the patch for this problem .
Obtained-From: http://cvs.openssl.org/chngview?cn=18791
Obtained-From: http://cvs.openssl.org/chngview?cn=18794

which i applied to openssl 0.9.8k 
but when i ran the openssl s_server and s_client .

I can see the output as 
At the client side , I can see

openssl s_client

R
RENEGOTIATING

It stays in this stage and when ever i type any thing in the server or
client , the data is passed to the other side

Server Side:
The server is sending the data to client

Client Side:
R
RENEGOTIATING
The server is sending the data to client.

I was thinking the connection should be dropped if the client tries for
renegotiation .

But if i have this  patch http://cvs.openssl.org/chngview?cn=18791 . 
The server drops the connection

Server Side:
SSL3 alert write:fatal:handshake failure
SSL_accept:error in SSLv3 read client hello A
ERROR
487572:error:1408A13F:SSL routines:SSL3_GET_CLIENT_HELLO:no
renegotiation:s3_srvr.c:725:
shutting down SSL
CONNECTION CLOSED
ACCEPT

Client Side:
R
RENEGOTIATING
SSL_connect:SSL renegotiate ciphers
>>> TLS 1.0 Handshake [length 0057], ClientHello
    01 00 00 53 03 01 4b 06 60 60 24 71 1f db 0d fe
    c8 39 83 1f c4 b1 fb af 64 5e 66 f4 5a 24 cb 7a
    73 98 32 f9 1d cf 00 00 26 00 39 00 38 00 35 00
    16 00 13 00 0a 00 33 00 32 00 2f 00 05 00 04 00
    15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 01
    00 00 04 00 23 00 00
SSL_connect:SSLv3 write client hello A
<<< TLS 1.0 Alert [length 0002], fatal handshake_failure
    02 28
SSL3 alert read:fatal:handshake failure
SSL_connect:failed in SSLv3 read server hello A
499818:error:14094410:SSL routines:SSL3_READ_BYTES:sslv3 alert handshake
failure:s3_pkt.c:1060:SSL alert number 40
499818:error:1409E0E5:SSL routines:SSL3_WRITE_BYTES:ssl handshake
failure:s3_pkt.c:530:

Client Session is terminated .

Can any one please tell me which is the intended behaviour?

As i can not move to OpenSSL 0.9.8l now , I have to apply the patch for this
problem in OpenSSL 0.9.8k.. Please direct me to the correct patch which i
need to apply to OpenSSL 0.9.8k . 

Thanks In Advance

Samuel



-- 
View this message in context: 
http://old.nabble.com/New-Babie---Query-on-CVE-2009-3555-tp26435399p26435399.html
Sent from the OpenSSL - User mailing list archive at Nabble.com.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to