On 2/6/2016 2:09 PM, Dana Burd wrote:
On 1/29/2016 1:38 AM, Dana Burd wrote:
There¹s a new ³high severity² vulnerability in OpenSSL 1.0.2:
   https://www.openssl.org/news/secadv/20160128.txt

I¹m curious if curl-7.40.0 is affected at all.  I poked around the
source, but it¹s a bit over my head.  Any insights appreciatedŠ
If curl-7.40.0 is affected, pointers on how to patch with the right
OpenSSL option is even more appreciated!

CVE-2016-0701 looks primarily like a server issue. The server generated
the weak primes and libcurl doesn't have anything to do with that as far
as I can tell [1]. The responsibility to fix this seems to me to be on
the server. In other words you updating libcurl w/OpenSSL isn't going to
fix this or stop someone from possibly decrypting your traffic to a
vulnerable server. But you should update anyway, for every other
security reason. I'd hoped someone more knowledgeable about this would
reply, but it's been a week...


[1]:
http://intothesymmetry.blogspot.com/2016/01/openssl-key-recovery-attack-on
-dh-small.html

Thanks for the note & link, Ray.

I, too, figured this was mostly a server issue, but have a nagging
concern: an attacker could impersonate the server, and force the curl
client to give up its private key.  This is obviously a much harder attack
vector than with a server vulnerability, but... is it possible???
Perhaps, if curl plays into the OpenSSL flaw, which requires curl to both:
   1. reuse the key for DHE ciphers suites or use static DH cipher suites,
and
   2. Have DH configured with non-safe primes


Looking at the curl source, I can¹t figure out if the above two things are
done.  To be honest, I barely understand what they mean!
I am hoping someone familiar with the curl security model can weigh in,
and say ³nope, curl doesn¹t do those 2 things so you¹re safe,² or ³yep,
curl is vulnerable, you need to add SSL_OP_SINGLE_DH_USE (or something
else) at such and such a place.²

(I would happily upgrade OpenSSL to solve this issue, but for a variety of
reasons this isn¹t an option.)


As far as I'm aware SSL_OP_SINGLE_DH_USE is a server option. Whether or not a key could be recovered from your client certificate information if an attacker is able to impersonate a vulnerable server I don't know. I think you should ask at openssl-...@openssl.org and see what they have to say about it.
-------------------------------------------------------------------
List admin: https://cool.haxx.se/list/listinfo/curl-library
Etiquette:  https://curl.haxx.se/mail/etiquette.html

Reply via email to