RE: Hiding headers for OpenSSL

2006-08-22 Thread Diffenderfer, Randy
Title: Message



Folks,
 
For 
the sake of closure (and finality, one would hope :-) ), the relevant Apache 
configuration parameter is "ServerTokens".  There is also a spiffy module 
available to do just about anything you might desire here: 
modsecurity.
 
Works 
for me...
rnd

  
  -Original Message-From: 
  [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On 
  Behalf Of Scott CampbellSent: Tuesday, August 22, 2006 11:21 
  AMTo: openssl-users@openssl.orgSubject: Re: Hiding 
  headers for OpenSSLYou are correct; I did miss Lutz's 
  email.Lutz ... thank you.  That is exactly the answer I was 
  looking for, to all my questions.Thank  you openssl list, and to 
  all those who provided helpful 
  feedback.Sincerely,  Scott
  On 8/22/06, Bernhard 
  Froehlich <[EMAIL PROTECTED]> 
  wrote:
  Scott 
Campbell wrote:> [...]> My question is 
(rephrased), if possible, how can I hide the> headers in OpenSSL from 
being broadcast to software running> rudimentary security scans 
(e.g., Nessus)? > Is there a line I can add 
to a conf file?> Is preventing the broadcast 
of software, version, and OS through> Apache all I need to do to 
prevent people from seeing that 
information?>> Last (though new) 
question: I thought that OpenSSL does not pass> header information 
back and forth to the client when establishing a> secure connection, 
but in fact, only certificate authenticating is > 
performed?  In other words, the client (however legitimate) 
doesn't> need to know the header information of my OpenSSL; if the 
certificate> is authenticated, the connection is 
made.>> Thanks in advance, 
>ScottLooks 
like you missed Lutz' mail, since he (IMHO) answers your questions:> 
This discussion is useless:> * OpenSSL does not disclose its version 
to attackers coming from the>   network as the SSL/TLS 
protocol does not give any version information >   of the 
software used (it does give protocol compatibility 
information>   needed for interoperability wrt SSLv2, SSLv3 
etc)> * It is the application using OpenSSL (in this case Apache) 
disclosing>   the information.>   -> 
Please complain to the Apache people.> * Both projects OpenSSL and 
Apache are Open Source projects. If you find>   anything 
about it annoying please feel free to make any modification 
>   you want.>I might add the following: There 
is a configuration option of Apachewhich allows you to customize the 
reported version string in the HTTPheaders, but I just don't remember 
its name. If that is not flexible enough (and I remember it correctly) 
theresponsible part of the Apache source code is not hard to find 
either. ;)Ted;)--PGP Public Key 
InformationDownload complete Key from http://www.convey.de/ted/tedkey_convey.ascKey 
fingerprint = 31B0 E029 BCF9 6605 DAC1  B2E1 0CC8 70F4 7AFB 
8D26-- Scott 
  Campbell[EMAIL PROTECTED]"Listen to the 
  mustn'ts, child..." 


Re: Hiding headers for OpenSSL

2006-08-22 Thread Scott Campbell
You are correct; I did miss Lutz's email.Lutz ... thank you.  That is exactly the answer I was looking for, to all my questions.Thank  you openssl list, and to all those who provided helpful feedback.
Sincerely,  ScottOn 8/22/06, Bernhard Froehlich <[EMAIL PROTECTED]> wrote:
Scott Campbell wrote:> [...]> My question is (rephrased), if possible, how can I hide the> headers in OpenSSL from being broadcast to software running> rudimentary security scans (e.g., Nessus)?
> Is there a line I can add to a conf file?> Is preventing the broadcast of software, version, and OS through> Apache all I need to do to prevent people from seeing that information?>
> Last (though new) question: I thought that OpenSSL does not pass> header information back and forth to the client when establishing a> secure connection, but in fact, only certificate authenticating is
> performed?  In other words, the client (however legitimate) doesn't> need to know the header information of my OpenSSL; if the certificate> is authenticated, the connection is made.>> Thanks in advance,
>ScottLooks like you missed Lutz' mail, since he (IMHO) answers your questions:> This discussion is useless:> * OpenSSL does not disclose its version to attackers coming from the>   network as the SSL/TLS protocol does not give any version information
>   of the software used (it does give protocol compatibility information>   needed for interoperability wrt SSLv2, SSLv3 etc)> * It is the application using OpenSSL (in this case Apache) disclosing
>   the information.>   -> Please complain to the Apache people.> * Both projects OpenSSL and Apache are Open Source projects. If you find>   anything about it annoying please feel free to make any modification
>   you want.>I might add the following: There is a configuration option of Apachewhich allows you to customize the reported version string in the HTTPheaders, but I just don't remember its name.
If that is not flexible enough (and I remember it correctly) theresponsible part of the Apache source code is not hard to find either. ;)Ted;)--PGP Public Key InformationDownload complete Key from 
http://www.convey.de/ted/tedkey_convey.ascKey fingerprint = 31B0 E029 BCF9 6605 DAC1  B2E1 0CC8 70F4 7AFB 8D26
-- Scott Campbell[EMAIL PROTECTED]"Listen to the mustn'ts, child..."


Re: Hiding headers for OpenSSL

2006-08-22 Thread Bernhard Froehlich

Scott Campbell wrote:

[...]
My question is (rephrased), if possible, how can I hide the 
headers in OpenSSL from being broadcast to software running 
rudimentary security scans (e.g., Nessus)?

Is there a line I can add to a conf file?
Is preventing the broadcast of software, version, and OS through 
Apache all I need to do to prevent people from seeing that information?


Last (though new) question: I thought that OpenSSL does not pass 
header information back and forth to the client when establishing a 
secure connection, but in fact, only certificate authenticating is 
performed?  In other words, the client (however legitimate) doesn't 
need to know the header information of my OpenSSL; if the certificate 
is authenticated, the connection is made.


Thanks in advance,
   Scott

Looks like you missed Lutz' mail, since he (IMHO) answers your questions:

This discussion is useless:
* OpenSSL does not disclose its version to attackers coming from the
  network as the SSL/TLS protocol does not give any version information
  of the software used (it does give protocol compatibility information
  needed for interoperability wrt SSLv2, SSLv3 etc)
* It is the application using OpenSSL (in this case Apache) disclosing
  the information.
  -> Please complain to the Apache people.
* Both projects OpenSSL and Apache are Open Source projects. If you find
  anything about it annoying please feel free to make any modification
  you want.
  
I might add the following: There is a configuration option of Apache 
which allows you to customize the reported version string in the HTTP 
headers, but I just don't remember its name.
If that is not flexible enough (and I remember it correctly) the 
responsible part of the Apache source code is not hard to find either. ;)


Ted
;)

--
PGP Public Key Information
Download complete Key from http://www.convey.de/ted/tedkey_convey.asc
Key fingerprint = 31B0 E029 BCF9 6605 DAC1  B2E1 0CC8 70F4 7AFB 8D26



smime.p7s
Description: S/MIME Cryptographic Signature


Re: Hiding headers for OpenSSL

2006-08-22 Thread Scott Campbell
Guys,    While I appreciate the vibrant discussion, I was not asking for the pros and cons of hiding the header information, whether or not one feels it promotes security, and whether one believes meddling with this makes one a geek or not.  In many people's desire to announce their opinion on the matter, the question was ignored.  Your thoughts are much appreciated, but I need a technical answer.
    My question is (rephrased), if possible, how can I hide the headers in OpenSSL from being broadcast to software running rudimentary security scans (e.g., Nessus)?    Is there a line I can add to a conf file?
    Is preventing the broadcast of software, version, and OS through Apache all I need to do to prevent people from seeing that information?    Last (though new) question: I thought that OpenSSL does not pass header information back and forth to the client when establishing a secure connection, but in fact, only certificate authenticating is performed?  In other words, the client (however legitimate) doesn't need to know the header information of my OpenSSL; if the certificate is authenticated, the connection is made.
    Thanks in advance,   Scott


Re: Hiding headers for OpenSSL

2006-08-22 Thread Lutz Jaenicke
On Mon, Aug 21, 2006 at 04:15:46PM -0500, Doug Nebeker wrote:
>  
> The problem is that virtually no legit users will ever look, but the
> hackers 
> definitely will.  I'll admit (being a geek) that I checked once when
> logging 
> into my banking site for the first time many years ago.  So maybe I was 
> 'benefitted' that one time (and my case is definitely not typical), but
> the 
> hackers could be 'benefitting' over and over with internal knowledge.  
> 
> The same arguments (showing that I'm trustworthy) could be made for
> posting 
> company network diagrams, physical site security procedures, backup
> courier,
> etc, but nobody does that.  
> 
> The risk/reward ratio doesn't justify giving the information out in my
> opinion.

This discussion is useless:
* OpenSSL does not disclose its version to attackers coming from the
  network as the SSL/TLS protocol does not give any version information
  of the software used (it does give protocol compatibility information
  needed for interoperability wrt SSLv2, SSLv3 etc)
* It is the application using OpenSSL (in this case Apache) disclosing
  the information.
  -> Please complain to the Apache people.
* Both projects OpenSSL and Apache are Open Source projects. If you find
  anything about it annoying please feel free to make any modification
  you want.
* "Meta bullet point":
  This discussion about version information and security through obscurity
  has been seen often enough (have a look into the OpenSSH mailing list
  archives) and it finally leads nowhere.
  I will therefore not comment wrt my personal point of view.

Best regards,
Lutz

> 
> 
> [EMAIL PROTECTED] wrote on 08/21/2006 03:15:33 PM:
> 
> > 
> > > The OP, however, is right.  Why report the version at all to the
> user of
> > > a website?  There is no need to let them know you are even running
> > > OpenSSL let alone the version being run.  I'm not talking about
> security
> > > through obscurity.  I'm referring to common sense.  Don't tell
> people
> > > what you are running unless it is absolutely necessary for proper
> > > operation.  Since version information is "metadata", it is not
> necessary
> > > for the proper operation of OpenSSL.  The only thing it does is
> waste a
> > > few bytes of bandwidth every time someone connects.  Just a thought.
> > 
> >We've come along way from the time when banks posted their reserve
> ratios
> > in the window.
> > 
> >If you have fixed the latest vulnerabilities, why would you want to
> keep
> > this a secret from the people you are asking to trust you? And if you
> have
> > not, what right do you have to keep that secret? The main reason you
> run SSL
> > is because you are going to ask other people to trust you with their
> > personal data.
> > 
> >It comes down to that fundamental question, "why should I trust
> you?" If
> > the answer is because you do things securely, fixing vulnerabilities
> and
> > choosing proven products, why should that need to be a secret? And if
> a new
> > vulnerability appears and you haven't had a chance to fix it yet,
> shouldn't
> > I at least have a chance to know that before I trust you with
> sensitive
> > information?
> > 
> >Security through obscurity is wrong for more than just one reason.
> But a
> > big one is that it robs the people you interoperate with of the chance
> to
> > judge for themself whether you are trustworthy. They may just find
> someone
> > else who is more transparent.
> > 
> >So here's my primary answer: suppose a new SSL bug is discovered.
> It's
> > fixed in version Y but not version X. I need to put a million dollar
> order
> > through to your server. What should I do? Should I not give you the
> order
> > until I can somehow confirm you have version Y? (Which, according to
> you, I
> > should never be able to do. So in this case you don't get the order.)
> Or
> > should I just assume you do, because you're typically on the ball?
> (Which
> > might not be what you want, depending on what the consequences are to
> *you*
> > if the data leaks to a competitor.)
> > 
> >Why force the people you are asking to trust you into such
> craziness? Why
> > not reassure them, assuming you do things right. And if you do things
> wrong,
> > is it really in your interest to dupe people into trusting you. Think
> long
> > and hard about that -- it may not be.
> > 
> >DS
> > 
> > 
> > __
> > OpenSSL Project http://www.openssl.org
> > User Support Mailing Listopenssl-users@openssl.org
> > Automated List Manager   [EMAIL PROTECTED]
> 
> 
> 
> To find out more about Reuters visit www.about.reuters.com
> 
> Any views expressed in this message are those of the individual sender, 
> except where the sender specifically states them to be the views of Reuters 
> Ltd.
> 
> __

RE: Hiding headers for OpenSSL

2006-08-22 Thread Marek Marcola
On Mon, 2006-08-21 at 11:42 -0700, [EMAIL PROTECTED] wrote:
> plain text document attachment (RE:)
> > > The long version:  We run security check software, which makes
> > > connections
> > > with various services, calls up the header, and then tells us that based
> > > upon the version it read in the header, this service has certain
> > > vulnerabilities.
> 
>   I just have to say one more thing:
> 
>   You run security check software, and you are asking us for help in 
> reducing
> the effectiveness of that software? Are you really more concerned with
> keeping your vulnerabilities secret than in fixing them?
We don't now how this software is use. Security scanners (like Nessus) has
distributed architecture and agents may be installed on checked systems.
In this situation banners are not important because security scanner
agent has access to operating system and may exactly check installed
patches/versions/... without looking at banners.
And next thing: if someone wants to hide his software - he has right
for that, of course this is not defence against hackers, but there
is nothing bad in that.
We know to little of this system/person to judge or even to offend
other persons. Live and let to live others.

Best regards,
-- 
Marek Marcola <[EMAIL PROTECTED]>

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


RE: Hiding headers for OpenSSL

2006-08-21 Thread Doug Nebeker
 
The problem is that virtually no legit users will ever look, but the
hackers 
definitely will.  I'll admit (being a geek) that I checked once when
logging 
into my banking site for the first time many years ago.  So maybe I was 
'benefitted' that one time (and my case is definitely not typical), but
the 
hackers could be 'benefitting' over and over with internal knowledge.  

The same arguments (showing that I'm trustworthy) could be made for
posting 
company network diagrams, physical site security procedures, backup
courier,
etc, but nobody does that.  

The risk/reward ratio doesn't justify giving the information out in my
opinion.


[EMAIL PROTECTED] wrote on 08/21/2006 03:15:33 PM:

> 
> > The OP, however, is right.  Why report the version at all to the
user of
> > a website?  There is no need to let them know you are even running
> > OpenSSL let alone the version being run.  I'm not talking about
security
> > through obscurity.  I'm referring to common sense.  Don't tell
people
> > what you are running unless it is absolutely necessary for proper
> > operation.  Since version information is "metadata", it is not
necessary
> > for the proper operation of OpenSSL.  The only thing it does is
waste a
> > few bytes of bandwidth every time someone connects.  Just a thought.
> 
>We've come along way from the time when banks posted their reserve
ratios
> in the window.
> 
>If you have fixed the latest vulnerabilities, why would you want to
keep
> this a secret from the people you are asking to trust you? And if you
have
> not, what right do you have to keep that secret? The main reason you
run SSL
> is because you are going to ask other people to trust you with their
> personal data.
> 
>It comes down to that fundamental question, "why should I trust
you?" If
> the answer is because you do things securely, fixing vulnerabilities
and
> choosing proven products, why should that need to be a secret? And if
a new
> vulnerability appears and you haven't had a chance to fix it yet,
shouldn't
> I at least have a chance to know that before I trust you with
sensitive
> information?
> 
>Security through obscurity is wrong for more than just one reason.
But a
> big one is that it robs the people you interoperate with of the chance
to
> judge for themself whether you are trustworthy. They may just find
someone
> else who is more transparent.
> 
>So here's my primary answer: suppose a new SSL bug is discovered.
It's
> fixed in version Y but not version X. I need to put a million dollar
order
> through to your server. What should I do? Should I not give you the
order
> until I can somehow confirm you have version Y? (Which, according to
you, I
> should never be able to do. So in this case you don't get the order.)
Or
> should I just assume you do, because you're typically on the ball?
(Which
> might not be what you want, depending on what the consequences are to
*you*
> if the data leaks to a competitor.)
> 
>Why force the people you are asking to trust you into such
craziness? Why
> not reassure them, assuming you do things right. And if you do things
wrong,
> is it really in your interest to dupe people into trusting you. Think
long
> and hard about that -- it may not be.
> 
>DS
> 
> 
> __
> OpenSSL Project http://www.openssl.org
> User Support Mailing Listopenssl-users@openssl.org
> Automated List Manager   [EMAIL PROTECTED]



To find out more about Reuters visit www.about.reuters.com

Any views expressed in this message are those of the individual sender, except 
where the sender specifically states them to be the views of Reuters Ltd.

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


RE: Hiding headers for OpenSSL

2006-08-21 Thread David Schwartz

> [EMAIL PROTECTED] wrote:
> > Blocking the version number is worse than reporting stale version
> > information. At least they can determine a minimum security level.
> > Incorrect information cuts both ways, helping the hacker and legitimate
> > user at the same time. Better to prefer the legitimate user's interest.
> >
> > SP

> How many "legitimate users" even know of the existence of the OpenSSL
> version number?  How many of those actually care?

How many legitimate users can perform an RSA operation? Obviously we 
don't
mean human beings do it literally.

> Now compare that number to how many hackers know and care about the same
> information.  Percentage-wise, users don't care.

We don't mean that humans will literally look at the data, we mean
automated processes will to assure that they have a certain level of
security. I don't know if you read the O.P. but that's why he cares -- a
security tool is reporting him as having vulnerabilities or possible
vulnerabilityes.

> Hackers do.  As well
> as geeks.  If you care, you are either a hacker or a geek.  The average
> user doesn't even know about the existence of OpenSSL, let alone its
> version number, and they also don't care.

Right, that's why average users use automated tools that well may care
about such things.

> They implicitly trust that
> people are doing their jobs and keeping servers up-to-date.  Hence geeks
> and hackers are the only people who will ever see an OpenSSL version
> number.  And hackers are the only ones who will abuse it.  The OP's
> point is still valid...users don't care.  And most people spending a
> million dollars are not geeks.

And automated tools used by normal people and hackers. And auditors.

> My point is that 100% of the people here aren't qualified to discuss how
> users think because we're all geeks and assume the rest of the world
> is/should be too (anyone brilliant enough to join openssl-users is a
> geek - yes, I realize I'm calling myself that too).  The OP wants to
> remove the Apache server header announcing that Apache is being used and
> what compiled modules are included (one of them being OpenSSL).  That is
> doable.  I'm pretty sure there is an option somewhere in the httpd.conf
> file.  Edit that and restart the server.  Just realize you are a geek
> and you'll be fine (or maybe you'll realize you don't want to be one and
> will decide to change careers).

If you really believed what you are saying, you would have to argue that
the worst people to design security systems are experts in security. That's
a complete load of crap.

He's trying to hide the version from automated auditing processes that 
are
helping human beings audit security levels and be cautioned about
vulnerabilities.

DS



__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: Hiding headers for OpenSSL

2006-08-21 Thread William A. Rowe, Jr.
Thomas J. Hruska wrote:
> Now compare that number to how many hackers know and care about the same
> information.

None.  If an exploit exists, it will be exploited.  You are a fool if you
expect that a hacker would rely on the reported version number to elect
one of the dozens of past exploits.  They simply pound all of them at the
server until they discover one works.

Legitimate users are the actual browsers and other non-interactive clients
which make deterministic decisions about process flow and exploit *features*
based on if they know the server is capable of using the optimization or
bandwidth saving feature reliably.

Close any vulnerabilities by applying the current/corrected code, if you
actually want to prevent your server from being exploited.  Hiding your
head in the sand by attempting to hide the software you are running is
foolish and silly.

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: Hiding headers for OpenSSL

2006-08-21 Thread Thomas J. Hruska

[EMAIL PROTECTED] wrote:
Blocking the version number is worse than reporting stale version 
information. At least they can determine a minimum security level. 
Incorrect information cuts both ways, helping the hacker and legitimate 
user at the same time. Better to prefer the legitimate user's interest. 


SP


How many "legitimate users" even know of the existence of the OpenSSL 
version number?  How many of those actually care?


Now compare that number to how many hackers know and care about the same 
information.  Percentage-wise, users don't care.  Hackers do.  As well 
as geeks.  If you care, you are either a hacker or a geek.  The average 
user doesn't even know about the existence of OpenSSL, let alone its 
version number, and they also don't care.  They implicitly trust that 
people are doing their jobs and keeping servers up-to-date.  Hence geeks 
and hackers are the only people who will ever see an OpenSSL version 
number.  And hackers are the only ones who will abuse it.  The OP's 
point is still valid...users don't care.  And most people spending a 
million dollars are not geeks.


My point is that 100% of the people here aren't qualified to discuss how 
users think because we're all geeks and assume the rest of the world 
is/should be too (anyone brilliant enough to join openssl-users is a 
geek - yes, I realize I'm calling myself that too).  The OP wants to 
remove the Apache server header announcing that Apache is being used and 
what compiled modules are included (one of them being OpenSSL).  That is 
doable.  I'm pretty sure there is an option somewhere in the httpd.conf 
file.  Edit that and restart the server.  Just realize you are a geek 
and you'll be fine (or maybe you'll realize you don't want to be one and 
will decide to change careers).


--
Thomas Hruska
Shining Light Productions

Home of BMP2AVI, Nuclear Vision, ProtoNova, and Win32 OpenSSL.
http://www.slproweb.com/

Ask me about discounts on any Shining Light Productions product!

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


RE: Hiding headers for OpenSSL

2006-08-21 Thread Steve . Pauly

Blocking the version number is worse
than reporting stale version information. At least they can determine a
minimum security level. Incorrect information cuts both ways, helping the
hacker and legitimate user at the same time. Better to prefer the legitimate
user's interest. 

SP



[EMAIL PROTECTED] wrote on 08/21/2006
03:15:33 PM:

> 
> > The OP, however, is right.  Why report the version at all
to the user of
> > a website?  There is no need to let them know you are even
running
> > OpenSSL let alone the version being run.  I'm not talking
about security
> > through obscurity.  I'm referring to common sense.  Don't
tell people
> > what you are running unless it is absolutely necessary for proper
> > operation.  Since version information is "metadata",
it is not necessary
> > for the proper operation of OpenSSL.  The only thing it
does is waste a
> > few bytes of bandwidth every time someone connects.  Just
a thought.
> 
>    We've come along way from the time when banks posted
their reserve ratios
> in the window.
> 
>    If you have fixed the latest vulnerabilities, why would
you want to keep
> this a secret from the people you are asking to trust you? And if
you have
> not, what right do you have to keep that secret? The main reason you
run SSL
> is because you are going to ask other people to trust you with their
> personal data.
> 
>    It comes down to that fundamental question, "why
should I trust you?" If
> the answer is because you do things securely, fixing vulnerabilities
and
> choosing proven products, why should that need to be a secret? And
if a new
> vulnerability appears and you haven't had a chance to fix it yet,
shouldn't
> I at least have a chance to know that before I trust you with sensitive
> information?
> 
>    Security through obscurity is wrong for more than just
one reason. But a
> big one is that it robs the people you interoperate with of the chance
to
> judge for themself whether you are trustworthy. They may just find
someone
> else who is more transparent.
> 
>    So here's my primary answer: suppose a new SSL bug is
discovered. It's
> fixed in version Y but not version X. I need to put a million dollar
order
> through to your server. What should I do? Should I not give you the
order
> until I can somehow confirm you have version Y? (Which, according
to you, I
> should never be able to do. So in this case you don't get the order.)
Or
> should I just assume you do, because you're typically on the ball?
(Which
> might not be what you want, depending on what the consequences are
to *you*
> if the data leaks to a competitor.)
> 
>    Why force the people you are asking to trust you into
such craziness? Why
> not reassure them, assuming you do things right. And if you do things
wrong,
> is it really in your interest to dupe people into trusting you. Think
long
> and hard about that -- it may not be.
> 
>    DS
> 
> 
> __
> OpenSSL Project                
                http://www.openssl.org
> User Support Mailing List            
       openssl-users@openssl.org
> Automated List Manager              
            [EMAIL PROTECTED]


RE: Hiding headers for OpenSSL

2006-08-21 Thread David Schwartz

> The OP, however, is right.  Why report the version at all to the user of
> a website?  There is no need to let them know you are even running
> OpenSSL let alone the version being run.  I'm not talking about security
> through obscurity.  I'm referring to common sense.  Don't tell people
> what you are running unless it is absolutely necessary for proper
> operation.  Since version information is "metadata", it is not necessary
> for the proper operation of OpenSSL.  The only thing it does is waste a
> few bytes of bandwidth every time someone connects.  Just a thought.

We've come along way from the time when banks posted their reserve 
ratios
in the window.

If you have fixed the latest vulnerabilities, why would you want to keep
this a secret from the people you are asking to trust you? And if you have
not, what right do you have to keep that secret? The main reason you run SSL
is because you are going to ask other people to trust you with their
personal data.

It comes down to that fundamental question, "why should I trust you?" If
the answer is because you do things securely, fixing vulnerabilities and
choosing proven products, why should that need to be a secret? And if a new
vulnerability appears and you haven't had a chance to fix it yet, shouldn't
I at least have a chance to know that before I trust you with sensitive
information?

Security through obscurity is wrong for more than just one reason. But a
big one is that it robs the people you interoperate with of the chance to
judge for themself whether you are trustworthy. They may just find someone
else who is more transparent.

So here's my primary answer: suppose a new SSL bug is discovered. It's
fixed in version Y but not version X. I need to put a million dollar order
through to your server. What should I do? Should I not give you the order
until I can somehow confirm you have version Y? (Which, according to you, I
should never be able to do. So in this case you don't get the order.) Or
should I just assume you do, because you're typically on the ball? (Which
might not be what you want, depending on what the consequences are to *you*
if the data leaks to a competitor.)

Why force the people you are asking to trust you into such craziness? 
Why
not reassure them, assuming you do things right. And if you do things wrong,
is it really in your interest to dupe people into trusting you. Think long
and hard about that -- it may not be.

DS


__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: Hiding headers for OpenSSL

2006-08-21 Thread Thomas J. Hruska

Thomas J. Hruska wrote:

David Schwartz wrote:
The long version:  We run security check software, which makes 
connections

with various services, calls up the header, and then tells us that based
upon the version it read in the header, this service has certain

vulnerabilities.

You mean it might have certain vulnerabilities. You certainly 
can't be sure

just based on the version, local patches could have been applied.


For security purposes, we would like to disable the broadcasting of

headers so
outside users cannot simply call up the header and see what version 
we're

running.

Right, we don't want the people who have to rely on us to be 
secure to know

that we aren't secure. And if we are secure, we don't want to reassure
people that we did fix the latest bugs, because we just like to keep them
guessing.

Additionally, the vulnerabilities are wrong since the header is one 
thing

but
the revision numbers indicate that the vulnerabilities have been 
resolved
(those using RedHat RHEL should be familiar with this issue).  What I 
want
to do is prevent outside connections from seeing any version 
information,

in
order to give potential abusers as little information about our 
system as

possible.

Right, don't want to give those potential abusers any incorrect
information.

Wow, you guys do things very differently from the rest of us.

DS


The OP, however, is right.  Why report the version at all to the user of 
a website?  There is no need to let them know you are even running 
OpenSSL let alone the version being run.  I'm not talking about security 
through obscurity.  I'm referring to common sense.  Don't tell people 
what you are running unless it is absolutely necessary for proper 
operation.  Since version information is "metadata", it is not necessary 
for the proper operation of OpenSSL.  The only thing it does is waste a 
few bytes of bandwidth every time someone connects.  Just a thought.


I should have mentioned that the OP is probably referring to Apache 
headers - where OpenSSL and other modules get compiled into Apache.  The 
displayed "Server" HTTP header response contains "OpenSSL x.y.z" and is 
usually the wrong version that gets reported.  Most people patch OpenSSL 
without rebuilding Apache.  But why report anything in the first place? 
 There is no need to do so except to look geeky for those who care 
about looking geeky.  It isn't a matter of security.  It is a matter of 
who is the bigger geek/nerd/whatever.


--
Thomas Hruska
Shining Light Productions

Home of BMP2AVI, Nuclear Vision, ProtoNova, and Win32 OpenSSL.
http://www.slproweb.com/

Ask me about discounts on any Shining Light Productions product!

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: Hiding headers for OpenSSL

2006-08-21 Thread Thomas J. Hruska

David Schwartz wrote:

The long version:  We run security check software, which makes connections
with various services, calls up the header, and then tells us that based
upon the version it read in the header, this service has certain

vulnerabilities.

You mean it might have certain vulnerabilities. You certainly can't be 
sure
just based on the version, local patches could have been applied.


For security purposes, we would like to disable the broadcasting of

headers so

outside users cannot simply call up the header and see what version we're

running.

Right, we don't want the people who have to rely on us to be secure to 
know
that we aren't secure. And if we are secure, we don't want to reassure
people that we did fix the latest bugs, because we just like to keep them
guessing.


Additionally, the vulnerabilities are wrong since the header is one thing

but

the revision numbers indicate that the vulnerabilities have been resolved
(those using RedHat RHEL should be familiar with this issue).  What I want
to do is prevent outside connections from seeing any version information,

in

order to give potential abusers as little information about our system as

possible.

Right, don't want to give those potential abusers any incorrect
information.

Wow, you guys do things very differently from the rest of us.

DS


The OP, however, is right.  Why report the version at all to the user of 
a website?  There is no need to let them know you are even running 
OpenSSL let alone the version being run.  I'm not talking about security 
through obscurity.  I'm referring to common sense.  Don't tell people 
what you are running unless it is absolutely necessary for proper 
operation.  Since version information is "metadata", it is not necessary 
for the proper operation of OpenSSL.  The only thing it does is waste a 
few bytes of bandwidth every time someone connects.  Just a thought.


--
Thomas Hruska
Shining Light Productions

Home of BMP2AVI, Nuclear Vision, ProtoNova, and Win32 OpenSSL.
http://www.slproweb.com/

Ask me about discounts on any Shining Light Productions product!

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: Hiding headers for OpenSSL

2006-08-21 Thread Marek Marcola
Hello,
>  The quick version:  How can I disable or prevent OpenSSL headers
> from being viewable to outside traffic (similiar to when you disable
> Apache from allowing its header and version information from being
> viewable to the outside world)? 
OpenSSL is realizing SSL3/TLS1 protocol and there is no place to put
any "upper library" version information.
Of course attacker may use some specific behaviour of SSL layer to guess
what version you have but you have no control on that.
In general in SSL protocol there is no place for for example 
"OpenSSL x.y.z" string.

Best regards,
-- 
Marek Marcola <[EMAIL PROTECTED]>

__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


RE: Hiding headers for OpenSSL

2006-08-21 Thread David Schwartz

> > The long version:  We run security check software, which makes
> > connections
> > with various services, calls up the header, and then tells us that based
> > upon the version it read in the header, this service has certain
> > vulnerabilities.

I just have to say one more thing:

You run security check software, and you are asking us for help in 
reducing
the effectiveness of that software? Are you really more concerned with
keeping your vulnerabilities secret than in fixing them?

DS


__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


RE: Hiding headers for OpenSSL

2006-08-21 Thread David Schwartz

> The long version:  We run security check software, which makes connections
> with various services, calls up the header, and then tells us that based
> upon the version it read in the header, this service has certain
vulnerabilities.

You mean it might have certain vulnerabilities. You certainly can't be 
sure
just based on the version, local patches could have been applied.

> For security purposes, we would like to disable the broadcasting of
headers so
> outside users cannot simply call up the header and see what version we're
running.

Right, we don't want the people who have to rely on us to be secure to 
know
that we aren't secure. And if we are secure, we don't want to reassure
people that we did fix the latest bugs, because we just like to keep them
guessing.

> Additionally, the vulnerabilities are wrong since the header is one thing
but
> the revision numbers indicate that the vulnerabilities have been resolved
> (those using RedHat RHEL should be familiar with this issue).  What I want
> to do is prevent outside connections from seeing any version information,
in
> order to give potential abusers as little information about our system as
possible.

Right, don't want to give those potential abusers any incorrect
information.

Wow, you guys do things very differently from the rest of us.

DS


__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Re: Hiding headers for OpenSSL

2006-08-21 Thread Michael Sierchio

Scott Campbell wrote:

 The long version:  We run security check software, which makes 
connections with various services, calls up the header, and then tells 
us that based upon the version it read in the header, this service has 
certain vulnerabilities.  For security purposes, we would like to 
disable the broadcasting of headers so outside users cannot simply call 
up the header and see what version we're running.  Additionally, the 
vulnerabilities are wrong since the header is one thing but the revision 
numbers indicate that the vulnerabilities have been resolved (those 
using RedHat RHEL should be familiar with this issue).  What I want to 
do is prevent outside connections from seeing any version information, 
in order to give potential abusers as little information about our 
system as possible.


It sounds as if you're approaching this in a bass-ackwards way.

First - fix the false positives in your vulnerability reporting.

Second - the bid for security through obscurity in not reporting
the version number seems misguided to me.
__
OpenSSL Project http://www.openssl.org
User Support Mailing Listopenssl-users@openssl.org
Automated List Manager   [EMAIL PROTECTED]


Hiding headers for OpenSSL

2006-08-21 Thread Scott Campbell
Dear All, The quick version:  How can I disable or prevent OpenSSL headers from being viewable to outside traffic (similiar to when you disable Apache from allowing its header and version information from being viewable to the outside world)?
 The long version:  We run security check software, which makes connections with various services, calls up the header, and then tells us that based upon the version it read in the header, this service has certain vulnerabilities.  For security purposes, we would like to disable the broadcasting of headers so outside users cannot simply call up the header and see what version we're running.  Additionally, the vulnerabilities are wrong since the header is one thing but the revision numbers indicate that the vulnerabilities have been resolved (those using RedHat RHEL should be familiar with this issue).  What I want to do is prevent outside connections from seeing any version information, in order to give potential abusers as little information about our system as possible.
   In Apache, you can modify the information sent to almost anything.  We disable such broadcasting, and I was hoping you can do the same with OpenSSL. Thank you in advance,    Scott