Re: OpenSSL version 1.0.1f released

2014-01-08 Thread yaberger
Hi,

I've recently seen OpenSSL 1.0.1f and 1.0.0l releases which fix some 
security issues.
Your vulnerabilities page state it only affect some 1.0.0* and 1.0.1* 
releases.
However, when I look at these URLs, I'm under the impression it also 
affects 0.9.8y.
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6450
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6449


Question(s)
Are these 2 security issues affecting 0.9.8.y ?
If so, will you release a 0.9.8z version that will fix them?
If not why? Is it because 0.9.8 is now unsupported? If so, would be great 
if you could state it on your website


Best regards,

Yannick Bergeron
Advisory IT Specialist

Re: OpenSSL version 1.0.1f released

2014-01-08 Thread Dr. Stephen Henson
On Wed, Jan 08, 2014, yaber...@ca.ibm.com wrote:

 Hi,
 
 I've recently seen OpenSSL 1.0.1f and 1.0.0l releases which fix some 
 security issues.
 Your vulnerabilities page state it only affect some 1.0.0* and 1.0.1* 
 releases.
 However, when I look at these URLs, I'm under the impression it also 
 affects 0.9.8y.
 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6450
 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-6449
 
 
 Question(s)
 Are these 2 security issues affecting 0.9.8.y ?
 If so, will you release a 0.9.8z version that will fix them?
 If not why? Is it because 0.9.8 is now unsupported? If so, would be great 
 if you could state it on your website
 
 

While the bugs are present in 0.9.8y they don't have any security
implications.

In the case of CVE-2013-6449 it's a DoS attack because the handling of SSL
v3.0 and TLS 1.0 differ markedly compared to TLS 1.1 and 1.2. In 0.9.8y only
SSL v3.0 and TLS 1.0 are suported and the differences wont cause a crash.

For CVE-2013-6450 this is a security issue for OpenSSL 1.0 and later because
an attempt is made to use a freed context. For 0.9.8 this is still a bug
because the current (instead of the old) session parameters are used but 
not for a freed context.

And the version after 0.9.8y (if there is one) will be 0.9.8za, see the FAQ.

Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


Re: OpenSSL version 1.0.1f released

2014-01-07 Thread Erik Tkal
Also, the release notes list:

Fix for TLS record tampering bug CVE-2013-4353
But the list of OpenSSL vulnerabilities linked from there does not mention this 
anywhere...


Erik Tkal
et...@me.com

uʍop ǝpısdn ǝɹɐ noʎ sıɥʇ pɐǝɹ uɐɔ noʎ ɟı



On 06 Jan 2014, at 10:27 AM, Daniel Kahn Gillmor d...@fifthhorseman.net wrote:

 On 01/06/2014 09:49 AM, OpenSSL wrote:
 
   OpenSSL version 1.0.1f released
   ===
 [...]
   The OpenSSL project team is pleased to announce the release of
   version 1.0.1f of our open source toolkit for SSL/TLS. For details
   of changes and known issues see the release notes at:
 
http://www.openssl.org/news/openssl-1.0.1-notes.html
 
 Looking at the source on github, i see that Nick Mathewson's
 no_gmt_unix_time branch was also merged between 1.0.1e and 1.0.1f, but
 it is not mentioned in the release notes.
 



Re: OpenSSL version 1.0.1f released

2014-01-07 Thread Jeffrey Walton
snip

  *) Integrate hostname, email address and IP address checking with certificate
 verification. New verify options supporting checking in opensl utility.
 [Steve Henson]

  *) Fixes and wildcard matching support to hostname and email checking
 functions. Add manual page.
 [Florian Weimer (Red Hat Product Security Team)]

  *) New functions to check a hostname email or IP address against a
 certificate. Add options x509 utility to print results of checks against
 a certificate.
 [Steve Henson]

/snip

+10. Great job.

On Mon, Jan 6, 2014 at 9:49 AM, OpenSSL open...@openssl.org wrote:
 -BEGIN PGP SIGNED MESSAGE-
 Hash: SHA1


OpenSSL version 1.0.1f released
===

OpenSSL - The Open Source toolkit for SSL/TLS
http://www.openssl.org/

The OpenSSL project team is pleased to announce the release of
version 1.0.1f of our open source toolkit for SSL/TLS. For details
of changes and known issues see the release notes at:

 http://www.openssl.org/news/openssl-1.0.1-notes.html

OpenSSL 1.0.1f is available for download via HTTP and FTP from the
following master locations (you can find the various FTP mirrors under
http://www.openssl.org/source/mirror.html):

  * http://www.openssl.org/source/
  * ftp://ftp.openssl.org/source/

The distribution file name is:

 o openssl-1.0.1f.tar.gz
   Size: 4509212
   MD5 checksum: f26b09c028a0541cab33da697d522b25
   SHA1 checksum: 9ef09e97dfc9f14ac2c042f3b7e301098794fc0f

The checksums were calculated using the following commands:

 openssl md5 openssl-1.0.1f.tar.gz
 openssl sha1 openssl-1.0.1f.tar.gz

Yours,

The OpenSSL Project Team.
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


Re: OpenSSL version 1.0.1f released

2014-01-06 Thread Daniel Kahn Gillmor
On 01/06/2014 09:49 AM, OpenSSL wrote:

OpenSSL version 1.0.1f released
===
 [...]
The OpenSSL project team is pleased to announce the release of
version 1.0.1f of our open source toolkit for SSL/TLS. For details
of changes and known issues see the release notes at:
 
 http://www.openssl.org/news/openssl-1.0.1-notes.html

Looking at the source on github, i see that Nick Mathewson's
no_gmt_unix_time branch was also merged between 1.0.1e and 1.0.1f, but
it is not mentioned in the release notes.

I fully support the draft that recommends this change:

 https://tools.ietf.org/html/draft-mathewson-no-gmtunixtime-00

but i also think it's a potentially significant change that is worth
acknowledging publicly (it breaks at least tlsdate -- i don't know about
other systems that rely on this).

as an aside, the commit message of
2583270191a8b27eed303c03ece1da97b9b69fd3 appears to be misleading.  it says:

Control sending time with SSL_SEND_{CLIENT,SERVER}RANDOM_MODE

but the code change indicates that the config flag is named
SSL_MODE_SEND_{CLIENT,SERVER}HELLO_TIME, which has the opposite sense
from the commit message's implication.

Thanks for taking this step to minimize data leakage from TLS clients
and servers!

Regards,

--dkg



signature.asc
Description: OpenPGP digital signature


Re: OpenSSL version 1.0.1f released

2014-01-06 Thread Dr. Stephen Henson
On Mon, Jan 06, 2014, Daniel Kahn Gillmor wrote:

 On 01/06/2014 09:49 AM, OpenSSL wrote:
 
 OpenSSL version 1.0.1f released
 ===
  [...]
 The OpenSSL project team is pleased to announce the release of
 version 1.0.1f of our open source toolkit for SSL/TLS. For details
 of changes and known issues see the release notes at:
  
  http://www.openssl.org/news/openssl-1.0.1-notes.html
 
 Looking at the source on github, i see that Nick Mathewson's
 no_gmt_unix_time branch was also merged between 1.0.1e and 1.0.1f, but
 it is not mentioned in the release notes.


Updated now.

Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


Re: OpenSSL version 1.0.1f released

2014-01-06 Thread Dr. Stephen Henson
On Mon, Jan 06, 2014, ET wrote:

 Also, the release notes list:
 
   * Fix for TLS record tampering bug CVE-2013-4353
 
 But the list of OpenSSL vulnerabilities linked from there does not mention 
 this anywhere...
 

The list hasn't been updated yet. You can get details from the CHANGES entry
for now:

Fix for TLS record tampering bug. A carefully crafted invalid
handshake could crash OpenSSL with a NULL pointer exception.
Thanks to Anton Johansson for reporting this issues.
(CVE-2013-4353)

Steve.
-
Dr Stephen N. Hens n. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


Re: OpenSSL version 1.0.1f released

2014-01-06 Thread ET
Also, the release notes list:

  * Fix for TLS record tampering bug CVE-2013-4353

But the list of OpenSSL vulnerabilities linked from there does not mention this 
anywhere...


Erik Tkal
et...@me.com

uʍop ǝpısdn ǝɹɐ noʎ sıɥʇ pɐǝɹ uɐɔ noʎ ɟı



On 06 Jan 2014, at 10:27 AM, Daniel Kahn Gillmor d...@fifthhorseman.net wrote:


 On 01/06/2014 09:49 AM, OpenSSL wrote:
 
   OpenSSL version 1.0.1f released
   ===
 [...]
   The OpenSSL project team is pleased to announce the release of
   version 1.0.1f of our open source toolkit for SSL/TLS. For details
   of changes and known issues see the release notes at:
 
http://www.openssl.org/news/openssl-1.0.1-notes.html
 
 Looking at the source on github, i see that Nick Mathewson's
 no_gmt_unix_time branch was also merged between 1.0.1e and 1.0.1f, but
 it is not mentioned in the release notes.
 



RE: OpenSSL version 1.0.1f released

2014-01-06 Thread Watson, Patrick
Also, I apologize if I'm missing something, but the release notes state: Fix 
for TLS record tampering bug CVE-2013-4353. I can't find any mention of that 
CVE anywhere. The linked OpenSSL vulnerabilities list doesn't include it and 
neither does NVD 
(http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4353). 

Patrick Watson, CISSP
Software Engineer
Data Security  Electronic Payment Systems
NCR Retail


-Original Message-
From: owner-openssl-...@openssl.org [mailto:owner-openssl-...@openssl.org] On 
Behalf Of Dr. Stephen Henson
Sent: Monday, January 06, 2014 10:41 AM
To: openssl-dev@openssl.org
Subject: Re: OpenSSL version 1.0.1f released

On Mon, Jan 06, 2014, Daniel Kahn Gillmor wrote:

 On 01/06/2014 09:49 AM, OpenSSL wrote:
 
 OpenSSL version 1.0.1f released
 ===
  [...]
 The OpenSSL project team is pleased to announce the release of
 version 1.0.1f of our open source toolkit for SSL/TLS. For details
 of changes and known issues see the release notes at:
  
  http://www.openssl.org/news/openssl-1.0.1-notes.html
 
 Looking at the source on github, i see that Nick Mathewson's 
 no_gmt_unix_time branch was also merged between 1.0.1e and 1.0.1f, but 
 it is not mentioned in the release notes.


Updated now.

Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org 
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


Re: OpenSSL version 1.0.1f released

2014-01-06 Thread Dr. Stephen Henson
On Mon, Jan 06, 2014, ET wrote:

 Ok, thanks.  What previous versions would have been affected by that 
 vulnerability?
 

The vulnerabilities list has been updated now.

Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


Re: OpenSSL version 1.0.1f released

2014-01-06 Thread ET
Ok, thanks.  What previous versions would have been affected by that 
vulnerability?

  Erik

On 06 Jan 2014, at 11:30 AM, Dr. Stephen Henson st...@openssl.org wrote:

 On Mon, Jan 06, 2014, ET wrote:
 
 Also, the release notes list:
 
  * Fix for TLS record tampering bug CVE-2013-4353
 
 But the list of OpenSSL vulnerabilities linked from there does not mention 
 this anywhere...
 
 
 The list hasn't been updated yet. You can get details from the CHANGES entry
 for now:
 
   Fix for TLS record tampering bug. A carefully crafted invalid
   handshake could crash OpenSSL with a NULL pointer exception.
   Thanks to Anton Johansson for reporting this issues.
   (CVE-2013-4353)
 
 Steve.
 -
 Dr Stephen N. Hens n. OpenSSL project core developer.
 Commercial tech support now available see: http://www.openssl.org
 __
 OpenSSL Project http://www.openssl.org
 Development Mailing List   openssl-dev@openssl.org
 Automated List Manager   majord...@openssl.org

__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org