Re: OpenSSL Security Advisory

2009-01-09 Thread Ger Hobbelt
On Wed, Jan 7, 2009 at 1:10 PM, Dr. Stephen Henson wrote: [...] > diff -ur openssl-0.9.8i-ORIG/apps/speed.c openssl-0.9.8i/apps/speed.c [...] > diff -ur openssl-0.9.8i-ORIG/ssl/ssltest.c openssl-0.9.8i/ssl/ssltest.c 0.9.9 CVS head (and probably 0.9.8 as well): for completeness sake there's one mo

Re: GPG verification of patch vulnerability CVE-2008-5077..

2009-01-09 Thread Vineet Kumar
Thanks. I proceeded a bit further but gpg reports the following despite it having already imported the key you suggested. % gpg -o /dev/null -v < ~/openssl_dsa_advisory.asc gpg: armor header: Hash: SHA1 gpg: armor header: Version: GnuPG v1.4.6 (GNU/Linux) gpg: original file name='' gpg: Signature

Re: pubkey format

2009-01-09 Thread Dhiva
Perfect. Thanks dhiva --On January 9, 2009 2:02:43 PM +0100 Mounir IDRASSI wrote: Hi, These are link errors. You certainly forgot to add "-lcrypto" to the gcc link command line (gcc -o pubkey2ssh pubkey2ssh.c -lcrypto) . Cheers, -- Mounir IDRASSI IDRIX http://www.idrix.fr Dhiva wrote:

Re: GPG verification of patch vulnerability CVE-2008-5077..

2009-01-09 Thread Dr. Stephen Henson
On Fri, Jan 09, 2009, Vineet Kumar wrote: > > Before taking in the patch for the recent security advisory for > vulnerability CVE-2008-5077, I want to verify its authenticity using GPG. > However, I get this: > *** > % (gpg --list-keys 89A36572 > /dev/null 2>&1 || gpg --recv-keys 89A3657

GPG verification of patch vulnerability CVE-2008-5077..

2009-01-09 Thread Vineet Kumar
Don't know why my first email did not go through. Resending the email below... -- Forwarded message -- From: Vineet Kumar Date: Thu, Jan 8, 2009 at 10:22 AM Subject: GPG verification of patch vulnerability CVE-2008-5077.. To: openssl-dev@openssl.org Before taking in the patch fo

Problems with decrypting using openssl-0.9.8b and windows 64 (x64). Same test works on windows 32 bit os

2009-01-09 Thread Mark Allison
Problems with decrypting using openssl-0.9.8b and windows 64 (x64). Same test works on windows 32 bit os. We are having difficulties trying to decrypt a encrypted text string using a simple test application on a windows 64 bit os. The same test application works as expected on windows 32 bit o

Re: OpenSSL 0.9.8j bug (reproducible SSL negotiation issue, 0.9.8i unaffected)B

2009-01-09 Thread Ben Laurie
Bodo Moeller wrote: > On Fri, Jan 9, 2009 at 1:42 PM, Brad House > wrote: > BTW, I didn't see in the changelog the fact that tls extensions were enabled by default between 0.9.8i and j... > >>> It's there, 3rd entry: >>> *) Enable TLS extensions by default. [Ben Laurie

Re: OpenSSL Security Advisory

2009-01-09 Thread Remo Inverardi
One way to exploit this flaw would be for a remote attacker who is in control of a malicious server or who can use a 'man in the middle' attack to present a malformed SSL/TLS signature from a certificate chain to a vulnerable client, bypassing validation. In my opinion, this statement is not ver

Re: OpenSSL 0.9.8j bug (reproducible SSL negotiation issue, 0.9.8i unaffected)B

2009-01-09 Thread Bodo Moeller
On Fri, Jan 9, 2009 at 1:42 PM, Brad House wrote: >>> BTW, I didn't see in the changelog the fact that tls extensions were >>> enabled by default between 0.9.8i and j... >> It's there, 3rd entry: >> >>> *) Enable TLS extensions by default. >>> [Ben Laurie] > Hmm, we must be looking at dif

Re: pubkey format

2009-01-09 Thread Mounir IDRASSI
Hi, These are link errors. You certainly forgot to add "-lcrypto" to the gcc link command line (gcc -o pubkey2ssh pubkey2ssh.c -lcrypto) . Cheers, -- Mounir IDRASSI IDRIX http://www.idrix.fr Dhiva wrote: Thanks for the sample code. I am getting the following errors. "_BIO_f_base64", refere

Re: OpenSSL 0.9.8j bug (reproducible SSL negotiation issue, 0.9.8i unaffected)B

2009-01-09 Thread Brad House
BTW, I didn't see in the changelog the fact that tls extensions were enabled by default between 0.9.8i and j... It's there, 3rd entry: *) Enable TLS extensions by default. [Ben Laurie] Hmm, we must be looking at different things. I was looking at the changelog referenced from the 0.

Re: OpenSSL 0.9.8j bug (reproducible SSL negotiation issue, 0.9.8i unaffected)B

2009-01-09 Thread Damien Miller
On Fri, 9 Jan 2009, Brad House wrote: > BTW, I didn't see in the changelog the fact that tls extensions were > enabled by default between 0.9.8i and j... It's there, 3rd entry: > *) Enable TLS extensions by default. > [Ben Laurie] -d _

[openssl.org #1813] [0.9.8j] Memory leak in ENGINE_by_id (patch included)

2009-01-09 Thread Torsten Hilbrich via RT
I found the following memory leak in the function ENGINE_by_id in the 0.9.8-line of code. It seems also to present in the current CVS version. The leak occurs if the dynamic engine is used to automatically load an engine not already registered in engine_list_head. If the engine cannot be found (or