Re: Context options and SSL_MODE_SEND_FALLBACK_SCSV

2014-10-17 Thread Giuseppe D'Angelo
Il 17/10/2014 01:11, Salz, Rich ha scritto: That will not work. You can do this: #ifdef SSL_MODE_SEND_FALLBACK_SCSV SSL_CTX_set_mode(ctx, SSL_MODE_SEND_FALLBACK_SCSV) #endif But that is not the same thing. You cannot just slip SCSV into an application without code changes to the

Re: Use of TLS_FALLBACK_SCSV

2014-10-17 Thread Florian Weimer
On 10/17/2014 01:24 AM, Salz, Rich wrote: It does not matter who you talk to. With a POODLE attack, your content can be decrypted. Cookies, etc., were just used as an example. If OpenSSL talks to OpenSSL, and both ends have been set up with the SSLv23_method, and SSL_CTX_set_options has not

Re: Use of TLS_FALLBACK_SCSV

2014-10-17 Thread Florian Weimer
On 10/16/2014 10:42 PM, Nou Dadoun wrote: A few short (simple) questions about the use of TLS_FALLBACK_SCSV since we’re currently upgrading to the latest openssl releases. We don’t establish sessions with any other products than our own clients and servers. We’ve already disabled the use of

Re: Use of TLS_FALLBACK_SCSV

2014-10-17 Thread Bodo Moeller
Salz, Rich rs...@akamai.com: Disabling ssl3 is a good thing. But set the fallback because silently dropping from tls 1.2 to tls 1.1 is bad. All this assumes that your client application *does* explicitly fall back from TLS 1.2 to TLS 1.1, instead of just relying on automatic protocol version

Re: Context options and SSL_MODE_SEND_FALLBACK_SCSV

2014-10-17 Thread Florian Weimer
On 10/17/2014 10:10 AM, Giuseppe D'Angelo wrote: Yep, and the problem is that I control the application, not which OpenSSL version is installed. Therefore I wanted to future-proof my application, so when OpenSSL gets upgraded to a version which supports SSL_MODE_SEND_FALLBACK_SCSV, everything

Re: [PATCH] Segfault in 1.0.1j BIO_reset() compiled with no-ssl2 no-ssl3

2014-10-17 Thread Frank Schmirler
On Thu, 16 Oct 2014 16:33:28 +0200, Frank Schmirler wrote I get the following segfault when trying to send an SSLv3 request to the reverse proxy pound, running on openssl-1.0.1j with SSLv2/3 disabled: Program received signal SIGSEGV, Segmentation fault. 0xb77498fa in ssl_ctrl (b=0xb7001010,

freeing SSL related memory

2014-10-17 Thread Matthias Apitz
Hello, We use the below attached C-code (I stripped away any error handlings etc.) to establish a connection to an IPv6 server, send/read some data and shutdown the connection again. My question is if the *_free() calls at the end are enough or if we have some memory leak not freeing enough

RE: Context options and SSL_MODE_SEND_FALLBACK_SCSV

2014-10-17 Thread Salz, Rich
SSL_set_mode(ssl, SSL_MODE_SEND_FALLBACK_SCSV) You might care about fallback from TLS 1.2 (which has PFS) to TLS 1.1 (which doesn't). I recommend that you always set that flag. Two clarifications: TLS 1.2 (with AEAD) to TLS 1.1 (doesn't). Or TLS 1.1 (PFS) to TLS 1.0. And by always,

Quick question about the poodle fix

2014-10-17 Thread dol o
Dear Devs, Here is the blogpost of the HTTPS breakdown: http://www.moserware.com/2009/06/first-few-milliseconds-of-https.html From what I understand, the Client hello is the first part of the ssl handshake that is not encrypted/HMAC’d According to https://www.openssl.org/~bodo/ssl-poodle.pdf

Please document the new SSL_MODE_SEND_FALLBACK_SCSV

2014-10-17 Thread Jakob Bohm
The new SSL_MODE_SEND_FALLBACK_SCSV option is badly documented in the wiki and man pages, which is going to cause a lot of problems when people everywhere rush to incorporate the security fixes into their code. In particular, I find the following to be fully undocumented (except by trying to

RE: Quick question about the poodle fix

2014-10-17 Thread Salz, Rich
Here is the blogpost of the HTTPS breakdown: http://www.moserware.com/2009/06/first-few-milliseconds-of-https.html From what I understand, the Client hello is the first part of the ssl handshake that is not encrypted/HMAC’d No. Re-read the prepare to be encrypted section again. All

Re: Quick question about the poodle fix

2014-10-17 Thread Jakob Bohm
On 17/10/2014 16:37, dol o wrote: Dear Devs, Here is the blogpost of the HTTPS breakdown: http://www.moserware.com/2009/06/first-few-milliseconds-of-https.html From what I understand, the Client hello is the first part of the ssl handshake that is not encrypted/HMAC’d According to

Wiki bug: Documentation_Index generated wrongly

2014-10-17 Thread Jakob Bohm
The code/script which generates http://wiki.openssl.org/index.php/Documentation_Index from the manpages looks like it contains two bugs: 1. If a manpage lists another function under see also, that other function is listed as a subitem of that first manpage, causing lotsof duplicate entries

Re: Quick question about the poodle fix

2014-10-17 Thread dol o
Thanks for the help guys, I appreciate it. Have a good weekend! On Fri, Oct 17, 2014 at 10:05 AM, Jakob Bohm jb-open...@wisemo.com wrote: On 17/10/2014 16:37, dol o wrote: Dear Devs, Here is the blogpost of the HTTPS breakdown:

Re: Wiki bug: Documentation_Index generated wrongly

2014-10-17 Thread Matt Caswell
On 17 October 2014 16:13, Jakob Bohm jb-open...@wisemo.com wrote: The code/script which generates http://wiki.openssl.org/index.php/Documentation_Index from the manpages looks like it contains two bugs: 1. If a manpage lists another function under see also, that other function is listed as

RE: Please document the new SSL_MODE_SEND_FALLBACK_SCSV

2014-10-17 Thread Nou Dadoun
Since this is the users list (as opposed to the dev list) I’m a little confused about point 2 there; my understanding from the sketchy descriptions I’ve read is that the fallback to a lower version is automatically done by openssl on connect failure as opposed to something similar to the code

Re: Use of TLS_FALLBACK_SCSV

2014-10-17 Thread no_spam_98
Thank you, Bodo. This is a crucial point that was not clear to me when I was investigating the use of TLS_FALLBACK_SCSV the first time. If my application uses SSLv23_method() when constructing the SSL context, and then explicitly disables SSLv2 and SSLv3 using SSL_CTX_set_options(), then

Re: FIPS 1.2.4 and OpenSSL 0.9.8zc Fails 'make test'

2014-10-17 Thread Emilia Käsper
Yes, I think that's a reasonable solution. The new test was added together with the bugfix as a regression test. Disabling it would bring you back to the earlier state without any further regression. Cheers, Emilia On Thu, Oct 16, 2014 at 5:37 PM, Russell Selph rse...@tibco.com wrote: Thanks.

SSL_get_peer_certificate giving empty certificate on Yosemite.

2014-10-17 Thread Madhavi Shashi
Hi, I am using below code to get domain name/server name from IP address on Mac OS X. But SSL_get_peer_certificateis returning empty certificate for twitter and some of the https sites. This problem I am facing from Yesterday. After Yosemite release. Log:

Re: Context options and SSL_MODE_SEND_FALLBACK_SCSV

2014-10-17 Thread Giuseppe D'Angelo
Il 17/10/2014 11:05, Florian Weimer ha scritto: Do you downgrade the support protocols on handshake failures, like web browsers do? Not explicitely. I think it's my fault at understanding the issue -- I somehow that that could be the case when using SSL_CTX_new(SSLv23_client_method())

Re: Patch to mitigate CVE-2014-3566 (POODLE)

2014-10-17 Thread Jeffrey Walton
Thanks for the patch. Is there a way to compile without the patch? I think I would rather 'config no=ssl3' and omit the additional complexity. Its additional protocol complexity and heartbleed is still fresh in my mind. Also, are there any test cases that accompany the patch? I'm trying to