On 11/11/14 09:35, Koehne Kai wrote:
>> -----Original Message-----
>> From: owner-openssl-us...@openssl.org [mailto:owner-openssl-
>> [...]
>> I have been able to reproduce this.
>>
>> Using a standard openssl configured *without* including no-ec2m, start an
>> s_server:
>>
>> openssl s_server -named_curve sect239k1
>>
>> Then, using an openssl configured *with* no-ec2m, connect to the s_server:
>>
>> openssl s_client -cipher ECDHE-RSA-AES256-SHA
>>
>> You should see the same error message as you got displayed in the client.
> 
> Indeed.
> 
>> Please can you try the attached patch to see if that solves your problem.
> 
> If I apply the patch on the client side, the handshake succeeds :)
> 
> I guess the server-side fix to mitigate this issue would be to configure with 
> fips / no-ec2m, too?
> 

The server side is using a binary curve for its temporary ECDHE
parameters. If you expect clients to hit that server that are configured
with no-ec2m and you can't patch them, then the best workaround would be
to configure the server to use a prime field curve instead, e.g. P-256

Matt
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to