Re: OpenSSL version 1.0.1f released
Hi, I've recently seen OpenSSL 1.0.1f and 1.0.0l releases which fix some security issues. Your vulnerabilities page state it only affect some 1.0.0* and 1.0.1* releases. However, when I look at these URLs, I'm under the impression it also affects 0.9.8y. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6450 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6449 Question(s) Are these 2 security issues affecting 0.9.8.y ? If so, will you release a 0.9.8z version that will fix them? If not why? Is it because 0.9.8 is now unsupported? If so, would be great if you could state it on your website Best regards, Yannick Bergeron Advisory IT Specialist
Re: OpenSSL version 1.0.1f released
On Wed, Jan 08, 2014, yaber...@ca.ibm.com wrote: Hi, I've recently seen OpenSSL 1.0.1f and 1.0.0l releases which fix some security issues. Your vulnerabilities page state it only affect some 1.0.0* and 1.0.1* releases. However, when I look at these URLs, I'm under the impression it also affects 0.9.8y. http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6450 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6449 Question(s) Are these 2 security issues affecting 0.9.8.y ? If so, will you release a 0.9.8z version that will fix them? If not why? Is it because 0.9.8 is now unsupported? If so, would be great if you could state it on your website While the bugs are present in 0.9.8y they don't have any security implications. In the case of CVE-2013-6449 it's a DoS attack because the handling of SSL v3.0 and TLS 1.0 differ markedly compared to TLS 1.1 and 1.2. In 0.9.8y only SSL v3.0 and TLS 1.0 are suported and the differences wont cause a crash. For CVE-2013-6450 this is a security issue for OpenSSL 1.0 and later because an attempt is made to use a freed context. For 0.9.8 this is still a bug because the current (instead of the old) session parameters are used but not for a freed context. And the version after 0.9.8y (if there is one) will be 0.9.8za, see the FAQ. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager majord...@openssl.org
Re: OpenSSL version 1.0.1f released
Also, the release notes list: Fix for TLS record tampering bug CVE-2013-4353 But the list of OpenSSL vulnerabilities linked from there does not mention this anywhere... Erik Tkal et...@me.com uʍop ǝpısdn ǝɹɐ noʎ sıɥʇ pɐǝɹ uɐɔ noʎ ɟı On 06 Jan 2014, at 10:27 AM, Daniel Kahn Gillmor d...@fifthhorseman.net wrote: On 01/06/2014 09:49 AM, OpenSSL wrote: OpenSSL version 1.0.1f released === [...] The OpenSSL project team is pleased to announce the release of version 1.0.1f of our open source toolkit for SSL/TLS. For details of changes and known issues see the release notes at: http://www.openssl.org/news/openssl-1.0.1-notes.html Looking at the source on github, i see that Nick Mathewson's no_gmt_unix_time branch was also merged between 1.0.1e and 1.0.1f, but it is not mentioned in the release notes.
Re: OpenSSL version 1.0.1f released
snip *) Integrate hostname, email address and IP address checking with certificate verification. New verify options supporting checking in opensl utility. [Steve Henson] *) Fixes and wildcard matching support to hostname and email checking functions. Add manual page. [Florian Weimer (Red Hat Product Security Team)] *) New functions to check a hostname email or IP address against a certificate. Add options x509 utility to print results of checks against a certificate. [Steve Henson] /snip +10. Great job. On Mon, Jan 6, 2014 at 9:49 AM, OpenSSL open...@openssl.org wrote: -BEGIN PGP SIGNED MESSAGE- Hash: SHA1 OpenSSL version 1.0.1f released === OpenSSL - The Open Source toolkit for SSL/TLS http://www.openssl.org/ The OpenSSL project team is pleased to announce the release of version 1.0.1f of our open source toolkit for SSL/TLS. For details of changes and known issues see the release notes at: http://www.openssl.org/news/openssl-1.0.1-notes.html OpenSSL 1.0.1f is available for download via HTTP and FTP from the following master locations (you can find the various FTP mirrors under http://www.openssl.org/source/mirror.html): * http://www.openssl.org/source/ * ftp://ftp.openssl.org/source/ The distribution file name is: o openssl-1.0.1f.tar.gz Size: 4509212 MD5 checksum: f26b09c028a0541cab33da697d522b25 SHA1 checksum: 9ef09e97dfc9f14ac2c042f3b7e301098794fc0f The checksums were calculated using the following commands: openssl md5 openssl-1.0.1f.tar.gz openssl sha1 openssl-1.0.1f.tar.gz Yours, The OpenSSL Project Team. __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager majord...@openssl.org
Re: OpenSSL version 1.0.1f released
On 01/06/2014 09:49 AM, OpenSSL wrote: OpenSSL version 1.0.1f released === [...] The OpenSSL project team is pleased to announce the release of version 1.0.1f of our open source toolkit for SSL/TLS. For details of changes and known issues see the release notes at: http://www.openssl.org/news/openssl-1.0.1-notes.html Looking at the source on github, i see that Nick Mathewson's no_gmt_unix_time branch was also merged between 1.0.1e and 1.0.1f, but it is not mentioned in the release notes. I fully support the draft that recommends this change: https://tools.ietf.org/html/draft-mathewson-no-gmtunixtime-00 but i also think it's a potentially significant change that is worth acknowledging publicly (it breaks at least tlsdate -- i don't know about other systems that rely on this). as an aside, the commit message of 2583270191a8b27eed303c03ece1da97b9b69fd3 appears to be misleading. it says: Control sending time with SSL_SEND_{CLIENT,SERVER}RANDOM_MODE but the code change indicates that the config flag is named SSL_MODE_SEND_{CLIENT,SERVER}HELLO_TIME, which has the opposite sense from the commit message's implication. Thanks for taking this step to minimize data leakage from TLS clients and servers! Regards, --dkg signature.asc Description: OpenPGP digital signature
Re: OpenSSL version 1.0.1f released
On Mon, Jan 06, 2014, Daniel Kahn Gillmor wrote: On 01/06/2014 09:49 AM, OpenSSL wrote: OpenSSL version 1.0.1f released === [...] The OpenSSL project team is pleased to announce the release of version 1.0.1f of our open source toolkit for SSL/TLS. For details of changes and known issues see the release notes at: http://www.openssl.org/news/openssl-1.0.1-notes.html Looking at the source on github, i see that Nick Mathewson's no_gmt_unix_time branch was also merged between 1.0.1e and 1.0.1f, but it is not mentioned in the release notes. Updated now. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager majord...@openssl.org
Re: OpenSSL version 1.0.1f released
On Mon, Jan 06, 2014, ET wrote: Also, the release notes list: * Fix for TLS record tampering bug CVE-2013-4353 But the list of OpenSSL vulnerabilities linked from there does not mention this anywhere... The list hasn't been updated yet. You can get details from the CHANGES entry for now: Fix for TLS record tampering bug. A carefully crafted invalid handshake could crash OpenSSL with a NULL pointer exception. Thanks to Anton Johansson for reporting this issues. (CVE-2013-4353) Steve. - Dr Stephen N. Hens n. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager majord...@openssl.org
Re: OpenSSL version 1.0.1f released
Also, the release notes list: * Fix for TLS record tampering bug CVE-2013-4353 But the list of OpenSSL vulnerabilities linked from there does not mention this anywhere... Erik Tkal et...@me.com uʍop ǝpısdn ǝɹɐ noʎ sıɥʇ pɐǝɹ uɐɔ noʎ ɟı On 06 Jan 2014, at 10:27 AM, Daniel Kahn Gillmor d...@fifthhorseman.net wrote: On 01/06/2014 09:49 AM, OpenSSL wrote: OpenSSL version 1.0.1f released === [...] The OpenSSL project team is pleased to announce the release of version 1.0.1f of our open source toolkit for SSL/TLS. For details of changes and known issues see the release notes at: http://www.openssl.org/news/openssl-1.0.1-notes.html Looking at the source on github, i see that Nick Mathewson's no_gmt_unix_time branch was also merged between 1.0.1e and 1.0.1f, but it is not mentioned in the release notes.
RE: OpenSSL version 1.0.1f released
Also, I apologize if I'm missing something, but the release notes state: Fix for TLS record tampering bug CVE-2013-4353. I can't find any mention of that CVE anywhere. The linked OpenSSL vulnerabilities list doesn't include it and neither does NVD (http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4353). Patrick Watson, CISSP Software Engineer Data Security Electronic Payment Systems NCR Retail -Original Message- From: owner-openssl-...@openssl.org [mailto:owner-openssl-...@openssl.org] On Behalf Of Dr. Stephen Henson Sent: Monday, January 06, 2014 10:41 AM To: openssl-dev@openssl.org Subject: Re: OpenSSL version 1.0.1f released On Mon, Jan 06, 2014, Daniel Kahn Gillmor wrote: On 01/06/2014 09:49 AM, OpenSSL wrote: OpenSSL version 1.0.1f released === [...] The OpenSSL project team is pleased to announce the release of version 1.0.1f of our open source toolkit for SSL/TLS. For details of changes and known issues see the release notes at: http://www.openssl.org/news/openssl-1.0.1-notes.html Looking at the source on github, i see that Nick Mathewson's no_gmt_unix_time branch was also merged between 1.0.1e and 1.0.1f, but it is not mentioned in the release notes. Updated now. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager majord...@openssl.org __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager majord...@openssl.org
Re: OpenSSL version 1.0.1f released
On Mon, Jan 06, 2014, ET wrote: Ok, thanks. What previous versions would have been affected by that vulnerability? The vulnerabilities list has been updated now. Steve. -- Dr Stephen N. Henson. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager majord...@openssl.org
Re: OpenSSL version 1.0.1f released
Ok, thanks. What previous versions would have been affected by that vulnerability? Erik On 06 Jan 2014, at 11:30 AM, Dr. Stephen Henson st...@openssl.org wrote: On Mon, Jan 06, 2014, ET wrote: Also, the release notes list: * Fix for TLS record tampering bug CVE-2013-4353 But the list of OpenSSL vulnerabilities linked from there does not mention this anywhere... The list hasn't been updated yet. You can get details from the CHANGES entry for now: Fix for TLS record tampering bug. A carefully crafted invalid handshake could crash OpenSSL with a NULL pointer exception. Thanks to Anton Johansson for reporting this issues. (CVE-2013-4353) Steve. - Dr Stephen N. Hens n. OpenSSL project core developer. Commercial tech support now available see: http://www.openssl.org __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager majord...@openssl.org __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager majord...@openssl.org