RE: OpenSSL has exploit mitigation countermeasures to make sure its exploitable

2014-04-14 Thread Salz, Rich
> Recommendation: protect the rest of the private key material. Yes, we missed some important fields. "Dang" is a word that comes to mind. At least, one I can use in polite company. /r$ -- Principal Security Engineer Akamai Technology Cambridge, MA __

Re: OpenSSL has exploit mitigation countermeasures to make sure its exploitable

2014-04-14 Thread mancha
On Sat, Apr 12, 2014 at 09:02:50PM -0400, Salz, Rich wrote: > > Would you please elaborate on how it differs from what you've been > > using in production? > > Local platform issues, mainly. Conceptually, nothing different about > the security. > Hello Rich et al. I believe Akamai's secure mal

RE: OpenSSL has exploit mitigation countermeasures to make sure its exploitable

2014-04-12 Thread Salz, Rich
> Would you please elaborate on how it differs from what you've been using in > production? Local platform issues, mainly. Conceptually, nothing different about the security. -- Principal Security Engineer Akamai Technology Cambridge, MA __

Re: OpenSSL has exploit mitigation countermeasures to make sure its exploitable

2014-04-12 Thread mancha
[From: openssl-users] On Fri, Apr 11, 2014, Salz, Rich wrote: > This patch is a variant of what we've been using to help protect > customer keys for a decade. Would you please elaborate on how it differs from what you've been using in production? > OpenSSL is important to us, and this is the fi

RE: OpenSSL has exploit mitigation countermeasures to make sure its exploitable

2014-04-12 Thread Salz, Rich
> It would be appreciated if you cared to contribute back your own custom > secure_malloc allocator. We did. See http://marc.info/?l=openssl-users&m=139723710923076&w=2 and http://marc.info/?l=openssl-users&m=139723972124003&w=2 -- Principal Security Engineer Akamai Technology Cambri

Re: OpenSSL has exploit mitigation countermeasures to make sure its exploitable

2014-04-12 Thread Otto Moerbeek
On Fri, Apr 11, 2014 at 05:51:17PM -0500, Reini Urban wrote: > On 04/11/2014 04:13 PM, Carlos Alberto Lopez Perez wrote: > >Probably this blog post provides more information about what Akamai has > >been doing related to this issue: > > > >https://blogs.akamai.com/2014/04/heartbleed-update.html >

Re: OpenSSL has exploit mitigation countermeasures to make sure its exploitable

2014-04-12 Thread Reini Urban
On 04/11/2014 04:13 PM, Carlos Alberto Lopez Perez wrote: Probably this blog post provides more information about what Akamai has been doing related to this issue: https://blogs.akamai.com/2014/04/heartbleed-update.html It would be appreciated if you cared to contribute back your own custom sec

Re: OpenSSL has exploit mitigation countermeasures to make sure its exploitable

2014-04-11 Thread Carlos Alberto Lopez Perez
On 10/04/14 18:46, Salz, Rich wrote: > We've been compiling -DOPENSSL_NO_BUF_FREELISTS forever. Our only complaint > is that the BUF is misspelled :) > > Theo can be obnoxious. This should not be news to most folks. > > /r$ > > -- > Principal Security Engineer > Akamai Technology > Ca

Re: OpenSSL has exploit mitigation countermeasures to make sure its exploitable

2014-04-11 Thread Loganaden Velvindron
On Fri, Apr 11, 2014 at 5:17 AM, Salz, Rich wrote: > Karma has a sense of humor. > > http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libssl/ssl/Makefile?f=h;rev=1.29 > > http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libssl/ssl/Makefile.diff?r1=1.29;r2=1.30;f=h > > Two people reviewed the c

RE: OpenSSL has exploit mitigation countermeasures to make sure its exploitable

2014-04-10 Thread Salz, Rich
Karma has a sense of humor. http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libssl/ssl/Makefile?f=h;rev=1.29 http://www.openbsd.org/cgi-bin/cvsweb/src/lib/libssl/ssl/Makefile.diff?r1=1.29;r2=1.30;f=h Two people reviewed the change (the ok line) and they got the -D flag wrong for nearly an

Re: OpenSSL has exploit mitigation countermeasures to make sure its exploitable

2014-04-10 Thread Piotr Sikora
Hey, > His patch was not against -current. > > http://elandsys.com/~logan/openssl_fix.diff > > Please find it here: > > diff --git a/ssl/s3_pkt.c b/ssl/s3_pkt.c > index b9e45c7..61b017f 100644 > --- a/ssl/s3_pkt.c > +++ b/ssl/s3_pkt.c > @@ -1334,8 +1334,6 @@ start: > { > s->rstate=SSL_ST_READ_

RE: OpenSSL has exploit mitigation countermeasures to make sure its exploitable

2014-04-10 Thread Salz, Rich
> Read what Ted wrote. There's is a use after free if you > -DOPENSSL_NO_BUF_FREELISTS It would have been spotted by OpenBSD's malloc. I was commenting on Theo, not Ted. -- Principal Security Engineer Akamai Technology Cambridge, MA __

Re: OpenSSL has exploit mitigation countermeasures to make sure its exploitable

2014-04-10 Thread Otto Moerbeek
On Thu, Apr 10, 2014 at 12:46:23PM -0400, Salz, Rich wrote: > We've been compiling -DOPENSSL_NO_BUF_FREELISTS forever. Our only complaint > is that the BUF is misspelled :) > > Theo can be obnoxious. This should not be news to most folks. Read what Ted wrote. There's is a use after free if yo

Re: OpenSSL has exploit mitigation countermeasures to make sure its exploitable

2014-04-10 Thread Loganaden Velvindron
On Thu, Apr 10, 2014 at 9:08 PM, Viktor Dukhovni wrote: > On Thu, Apr 10, 2014 at 12:46:23PM -0400, Salz, Rich wrote: > >> We've been compiling -DOPENSSL_NO_BUF_FREELISTS forever. Our >> only complaint is that the BUF is misspelled :) > > Apparently, this introduces a problem when free() actually

Re: OpenSSL has exploit mitigation countermeasures to make sure its exploitable

2014-04-10 Thread Viktor Dukhovni
On Thu, Apr 10, 2014 at 12:46:23PM -0400, Salz, Rich wrote: > We've been compiling -DOPENSSL_NO_BUF_FREELISTS forever. Our > only complaint is that the BUF is misspelled :) Apparently, this introduces a problem when free() actually wipes freed memory, rather than just putting it on the free list

Re: OpenSSL has exploit mitigation countermeasures to make sure its exploitable

2014-04-10 Thread Loganaden Velvindron
On Thu, Apr 10, 2014 at 8:46 PM, Salz, Rich wrote: > We've been compiling -DOPENSSL_NO_BUF_FREELISTS forever. Our only complaint > is that the BUF is misspelled :) > > Theo can be obnoxious. This should not be news to most folks. > > /r$ It appears that my previous mail got stuck somew

RE: OpenSSL has exploit mitigation countermeasures to make sure its exploitable

2014-04-10 Thread Salz, Rich
We've been compiling -DOPENSSL_NO_BUF_FREELISTS forever. Our only complaint is that the BUF is misspelled :) Theo can be obnoxious. This should not be news to most folks. /r$ -- Principal Security Engineer Akamai Technology Cambridge, MA

Re: OpenSSL has exploit mitigation countermeasures to make sure its exploitable

2014-04-10 Thread Hanno Böck
On Thu, 10 Apr 2014 17:49:52 +0200 Carlos Alberto Lopez Perez wrote: > What's the stance of openssl developers on this? Will you get rid of > this wrapper? What would make even more sense: Build openssl with a safe malloc implementation. I've no idea how practical this is, but there's something

Re: OpenSSL has exploit mitigation countermeasures to make sure its exploitable

2014-04-10 Thread Loganaden Velvindron
On Thu, Apr 10, 2014 at 7:49 PM, Carlos Alberto Lopez Perez wrote: > ""OpenSSL has exploit mitigation countermeasures to make sure its > exploitable"" http://article.gmane.org/gmane.os.openbsd.misc/211963 > > Leaving aside the personal (and questionable) opinions from Theo about > OpenSSL develope