Re: openssl-0.9.8za violates RFC 6066 problem

2014-06-18 Thread Dr. Stephen Henson
On Tue, Jun 17, 2014, Viktor Dukhovni wrote: On Mon, Jun 16, 2014 at 02:12:07PM -0700, Steve Bush wrote: We have openssl installed with an apache server and we just upgraded from openssl-0.9.8u to openssl-0.9.8za, however we suddenly have large numbers of clients failing to connect.

Decryption succeed in GCM mode when tag is truncated

2014-06-18 Thread Michel
Hi all, I was surprised that decryption succeeded in GCM mode althought the tag was shorter than the one produced when encrypting, as it is not the case in CCM. Is it the intended behaviour ? In order to rule out a possible bug in my program, I finally used the example code at :

Re: Decryption succeed in GCM mode when tag is truncated

2014-06-18 Thread Thulasi Goriparthi
EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_GCM_SET_TAG, sizeof(gcm_tag), gcm_tag); When you change tag length with the above statement, you are telling the decrypt context to consider only those many number of bytes for tag comparision. On Wed, Jun 18, 2014 at 4:52 PM, Michel msa...@paybox.com wrote:

Re: Decryption succeed in GCM mode when tag is truncated

2014-06-18 Thread Michel
Thank for your answer. But isn't this strategy very hazardous ? And why just for GCM and not CCM ? Le 18/06/2014 14:37, Thulasi Goriparthi a écrit : EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_GCM_SET_TAG, sizeof(gcm_tag), gcm_tag); When you change tag length with the above statement, you are

Re: mod_ssl - client certificates broken after yum update of openssl

2014-06-18 Thread Nelson
On Tue, 6/17/14, Viktor Dukhovni openssl-us...@dukhovni.org wrote: Subject: Re: mod_ssl - client certificates broken after yum update of openssl To: openssl-users@openssl.org Date: Tuesday, June 17, 2014, 10:53 PM On Tue, Jun 17, 2014 at

Re: Decryption succeed in GCM mode when tag is truncated

2014-06-18 Thread Thulasi Goriparthi
Truncate-able tags gave a way to truncated hmac extension. Haven't gone through CCM RFC 3610 completely. I can see the restriction of possible M values(Tag lengths) to 2, 4, 6, 8, 10, 12, 14, 16. Can you try reducing the tag size accordingly and see if it succeeds. On Wed, Jun 18, 2014 at 6:52

Re: openssl-0.9.8za violates RFC 6066 problem

2014-06-18 Thread Viktor Dukhovni
On Wed, Jun 18, 2014 at 01:06:31PM +0200, Dr. Stephen Henson wrote: This commit does not introduce the alert generation. The alert is generated when the server callback returns SSL_TLSEXT_ERR_ALERT_WARNING, as in Apache's ssl_callback_ServerNameIndication() function in some Apache

RE: openssl-0.9.8za violates RFC 6066 problem

2014-06-18 Thread Salz, Rich
That's the code I saw. Should OpenSSL do Apache a favour and not send a warning alert anyway, when the extension callback is the SNI callback? NO!!! -- Principal Security Engineer Akamai Technologies, Cambridge, MA IM: rs...@jabber.me; Twitter: RichSalz

Re: Decryption succeed in GCM mode when tag is truncated

2014-06-18 Thread Michel
I tried all of 2, 4, 6, 8, 10, 12, 14, 16 values, and always got a Plaintext not available: tag verify failed. Even when tag length of decryption was equal to tag length of encryption. :-( It just works for : tag length of decryption = tag length of encryption = 16. Thanks again for your

Re: mod_ssl - client certificates broken after yum update of openssl

2014-06-18 Thread Viktor Dukhovni
On Wed, Jun 18, 2014 at 07:07:25AM -0700, Nelson wrote: Apache was upgraded with openssl as well as mod_ssl. You need to read the documentation, release notes, ... and determine any changes in policy or supported algorithms in the updated release. My best guess is that this release objects to

CVE-2014-0198: SSL_MODE_RELEASE_BUFFERS NULL pointer dereference

2014-06-18 Thread Casado, Reyes
Hello, I have a question about the following statement in advisory notice http://www.openssl.org/news/secadv_20140605.txt regarding CVE-2014-0198. This flaw only affects OpenSSL 1.0.0 and 1.0.1 where SSL_MODE_RELEASE_BUFFERS is enabled, which is not the default and not common. I am using

RE: CVE-2014-0198: SSL_MODE_RELEASE_BUFFERS NULL pointer dereference

2014-06-18 Thread Salz, Rich
That is the value for the flag, it does not say whether or not it is enabled. To enable it you need to call something like SSL_CTX_set_options() with that flag passed in. -- Principal Security Engineer Akamai Technologies, Cambridge, MA IM: rs...@jabber.memailto:rs...@jabber.me; Twitter:

Re: Decryption succeed in GCM mode when tag is truncated

2014-06-18 Thread Thulasi Goriparthi
In the test program, you are feeding a fixed ccm_tag to decryption process. This will not work for CCM, as tag length itself will also be an input for tag generation. Change in tag length, will change the tag produced. I modified the decryption api(aes_ccm_decrypt) to take the tag generated by

Re: Decryption succeed in GCM mode when tag is truncated

2014-06-18 Thread Thulasi Goriparthi
One more thing to correct myself. 2 as tag length is not allowed. only 4, 6, 8, 10, 12, 14, 16 are allowed. On Wed, Jun 18, 2014 at 11:55 PM, Thulasi Goriparthi thulasi.goripar...@gmail.com wrote: In the test program, you are feeding a fixed ccm_tag to decryption process. This will not work

Re: mod_ssl - client certificates broken after yum update of openssl

2014-06-18 Thread Nelson
On Wed, 6/18/14, Viktor Dukhovni openssl-us...@dukhovni.org wrote: Subject: Re: mod_ssl - client certificates broken after yum update of openssl To: openssl-users@openssl.org Date: Wednesday, June 18, 2014, 11:08 AM On Wed, Jun 18, 2014 at