Re: [ANNOUNCE] mod_ssl 2.8.17 for Apache 1.3.31

2004-05-27 Thread Ralf S. Engelschall
On Fri, May 14, 2004, a k wrote:

 Did you add my eintr fix ?
 [...]

Ops, I seem to have overlooked this.
I'll include this into mod_ssl 2.8.18.
Thanks.

   Ralf S. Engelschall
   [EMAIL PROTECTED]
   www.engelschall.com

__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  [EMAIL PROTECTED]
Automated List Manager[EMAIL PROTECTED]


[ANNOUNCE] mod_ssl 2.8.18

2004-05-27 Thread Ralf S. Engelschall
A security issue was discovered.
It is now fixed with mod_ssl 2.8.18.
Please upgrade your installations ASAP.

o http://www.modssl.org/source/
o  ftp://ftp.modssl.org/source/
   Ralf S. Engelschall
   [EMAIL PROTECTED]
   www.engelschall.com

  Changes with mod_ssl 2.8.18 (11-May-2004 to 27-May-2004)

   *) Fix buffer overflow in SSLOptions +FakeBasicAuth implementation
  if the Subject-DN in the client certificate exceeds 6KB in length.
  (CVE CAN-2004-0488).

   *) Handle the case of OpenSSL retry requests after interrupted system
  calls during the SSL handshake phase.

   *) Remove some unused functions.

__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  [EMAIL PROTECTED]
Automated List Manager[EMAIL PROTECTED]


Re: [ANNOUNCE] mod_ssl 2.8.17 for Apache 1.3.31

2004-05-27 Thread Martin Nyberg
test
On Thu, 27 May 2004 14:49:35 +0200, Ralf S. Engelschall  
[EMAIL PROTECTED] wrote:

On Fri, May 14, 2004, a k wrote:
Did you add my eintr fix ?
[...]
Ops, I seem to have overlooked this.
I'll include this into mod_ssl 2.8.18.
Thanks.
   Ralf S. Engelschall
   [EMAIL PROTECTED]
   www.engelschall.com
__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  [EMAIL PROTECTED]
Automated List Manager[EMAIL PROTECTED]

--
Using M2, Opera's revolutionary e-mail client: http://www.opera.com/m2/
__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  [EMAIL PROTECTED]
Automated List Manager[EMAIL PROTECTED]


Re: [ANNOUNCE] mod_ssl 2.8.18

2004-05-27 Thread Udo Schweigert
On Thu, May 27, 2004 at 15:21:37 +0200, Ralf S. Engelschall wrote:
   Changes with mod_ssl 2.8.18 (11-May-2004 to 27-May-2004)
 
*) Fix buffer overflow in SSLOptions +FakeBasicAuth implementation
   if the Subject-DN in the client certificate exceeds 6KB in length.
   (CVE CAN-2004-0488).
 

Is that also an issue in apache-2.x? (I wasn't able to find that CVE, so I
ask here ;-)

Best regards

Udo
--
Udo Schweigert, Siemens AG   | Voice  : +49 89 636 42170
CT IC CERT, Siemens CERT | Fax: +49 89 636 41166
D-81730 München / Germany| email  : [EMAIL PROTECTED]
__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  [EMAIL PROTECTED]
Automated List Manager[EMAIL PROTECTED]


RE: [ANNOUNCE] mod_ssl 2.8.18

2004-05-27 Thread Boyle Owen
 -Original Message-
 From: Udo Schweigert [mailto:[EMAIL PROTECTED]
 Sent: Donnerstag, 27. Mai 2004 17:03
 To: [EMAIL PROTECTED]
 Subject: Re: [ANNOUNCE] mod_ssl 2.8.18
 
 
 On Thu, May 27, 2004 at 15:21:37 +0200, Ralf S. Engelschall wrote:
Changes with mod_ssl 2.8.18 (11-May-2004 to 27-May-2004)
  
 *) Fix buffer overflow in SSLOptions +FakeBasicAuth 
 implementation
if the Subject-DN in the client certificate exceeds 
 6KB in length.
(CVE CAN-2004-0488).
  
 
 Is that also an issue in apache-2.x? (I wasn't able to find 
 that CVE, so I
 ask here ;-)

The problem was originally identified on apache2 (see
http://www.securityfocus.com/bid/10355/) and it has already been patched
there. 

Incidentally, AFAIK there is no vulnerability unless you are using
SSLOptions FakeBasicAuth. It's a fairly specialised option so my
feeling is that this doesn't urgently affect a whole lot of people... Of
course, you should still upgrade just in case some time in the future
you do switch that option on.

Rgds,
Owen Boyle
Disclaimer: Any disclaimer attached to this message may be ignored. 

 
 Best regards
 
 Udo
 --
 Udo Schweigert, Siemens AG   | Voice  : +49 89 636 42170
 CT IC CERT, Siemens CERT | Fax: +49 89 636 41166
 D-81730 München / Germany| email  : [EMAIL PROTECTED]
 __
 Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
 User Support Mailing List  [EMAIL PROTECTED]
 Automated List Manager[EMAIL PROTECTED]
 
Diese E-mail ist eine private und persönliche Kommunikation. Sie hat
keinen Bezug zur Börsen- bzw. Geschäftstätigkeit der SWX Gruppe. This
e-mail is of a private and personal nature. It is not related to the
exchange or business activities of the SWX Group. Le présent e-mail est
un message privé et personnel, sans rapport avec l'activité boursière du
Groupe SWX.

This message is for the named person's use only. It may contain
confidential, proprietary or legally privileged information. No
confidentiality or privilege is waived or lost by any mistransmission.
If you receive this message in error, please notify the sender urgently
and then immediately delete the message and any copies of it from your
system. Please also immediately destroy any hardcopies of the message.
You must not, directly or indirectly, use, disclose, distribute, print,
or copy any part of this message if you are not the intended recipient.
The sender's company reserves the right to monitor all e-mail
communications through their networks. Any views expressed in this
message are those of the individual sender, except where the message
states otherwise and the sender is authorised to state them to be the
views of the sender's company. 


__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  [EMAIL PROTECTED]
Automated List Manager[EMAIL PROTECTED]


Re: [ANNOUNCE] mod_ssl 2.8.18

2004-05-27 Thread Joe Orton
On Thu, May 27, 2004 at 05:09:17PM +0200, Boyle Owen wrote:
  On Thu, May 27, 2004 at 15:21:37 +0200, Ralf S. Engelschall wrote:
 Changes with mod_ssl 2.8.18 (11-May-2004 to 27-May-2004)
   
  *) Fix buffer overflow in SSLOptions +FakeBasicAuth 
  implementation
 if the Subject-DN in the client certificate exceeds 
  6KB in length.
 (CVE CAN-2004-0488).
   
  
  Is that also an issue in apache-2.x? (I wasn't able to find 
  that CVE, so I
  ask here ;-)
 
 The problem was originally identified on apache2 (see
 http://www.securityfocus.com/bid/10355/) and it has already been patched
 there. 

Anybody wanting to patch directly can fetch this:

http://cvs.apache.org/viewcvs.cgi/httpd-2.0/modules/ssl/ssl_engine_kernel.c?r1=1.105r2=1.106

 Incidentally, AFAIK there is no vulnerability unless you are using
 SSLOptions FakeBasicAuth. It's a fairly specialised option so my
 feeling is that this doesn't urgently affect a whole lot of people... Of
 course, you should still upgrade just in case some time in the future
 you do switch that option on.

And furthermore, you must trust a CA who will issue a client cert with
exploit code embedded in the subject DN.

Regards,

joe
__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  [EMAIL PROTECTED]
Automated List Manager[EMAIL PROTECTED]


Re: [ANNOUNCE] mod_ssl 2.8.17 for Apache 1.3.31

2004-05-27 Thread a k
Thanks !!

ak
--- Ralf S. Engelschall [EMAIL PROTECTED] wrote:
 On Fri, May 14, 2004, a k wrote:
 
  Did you add my eintr fix ?
  [...]
 
 Ops, I seem to have overlooked this.
 I'll include this into mod_ssl 2.8.18.
 Thanks.
 
Ralf S.
 Engelschall
   
 [EMAIL PROTECTED]
   
 www.engelschall.com
 

__
 Apache Interface to OpenSSL (mod_ssl)   
www.modssl.org
 User Support Mailing List 
 [EMAIL PROTECTED]
 Automated List Manager   
[EMAIL PROTECTED]





__
Do you Yahoo!?
Friends.  Fun.  Try the all-new Yahoo! Messenger.
http://messenger.yahoo.com/ 
__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  [EMAIL PROTECTED]
Automated List Manager[EMAIL PROTECTED]


Re: [ANNOUNCE] mod_ssl 2.8.17 for Apache 1.3.31

2004-05-27 Thread a . moon
I am away on paternity leave for the next few days.  
Please contact OLSU if urgent, otherwise i will get back 
to you as soon as possible on my return.


__
Apache Interface to OpenSSL (mod_ssl)   www.modssl.org
User Support Mailing List  [EMAIL PROTECTED]
Automated List Manager[EMAIL PROTECTED]