>>>>>> I've been getting reports from users who see issues with openssl
>>>>>> after the upgrade from 1.0.1c to 1.0.1e
>>>>>>
>>>>>> See:
>>>>>> http://bugs.debian.org/678353#10
>>>>> I tried on my Intel Core i7-3770S with 1.0.1e connecting to his
>>>>> mail server and was unable to reproduce with the stock 1.0.1e
>>>>> I built.
>>>>>
>>>> I got an other bug report now:
>>>> http://bugs.debian.org/701868
>>>>
>>>> Both user report that using OPENSSL_ia32cap=~0x200000200000000
>>>> fixes there problem.
>>> And I've also been pointed to:
>>> http://forums.otterhub.org/viewtopic.php?f=62&t=18941
>>>
>>> It seems various users are affected by this.
>> There are seem to be several problems... As for AES-NI you seem have 
>> missed fix for zero-length TLS fragments, 
>> http://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=fc90e42c8623af13308d8ef7e7ada84af0a36509.
>>  
>> I mean I've 'apt-get source openssl' on a Ubuntu machine, applied your 
>> CVE-2013-0169.patch manually and there is no NO_PAYLOAD_LENGTH... This 
>> means that if AES-NI enabled machine talks to server that support 
>> zero-length countermeasure, you are in trouble.
> 
> I don't have anything to do with the Ubuntu upload.

Oops! I apologize:-)

> The Debian package
> is a real 1.0.1e version, not a backport of patches, that does have that
> patch applied.

I can't reproduce the problem with 'openssl s_client -connect 
mail.uni-paderborn.de:465' from 
http://www.openssl.org/source/openssl-1.0.1e.tar.gz. Server is mentioned 
on http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=678353#10.


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       openssl-dev@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to