Thanks Steve and Matt. That makes sense.

-----Original Message-----
From: [email protected] [mailto:[email protected]] On 
Behalf Of Dr. Stephen Henson
Sent: Friday, June 06, 2014 6:11 PM
To: [email protected]
Subject: Re: Question about SSL/TLS MITM vulnerability (CVE-2014-0224)

On Fri, Jun 06, 2014, Matt Caswell wrote:

> On 6 June 2014 08:27, Zhong Chen <[email protected]> wrote:
> >
> > We are using openssl 1.0.0 as a server. Looking at the diff between 
> > 1.0.0m and 1.0.0k, same patch is applied to s3_srvr.c and s3_pkt.c. 
> > I want to confirm this is just for precaution, or openssl 1.0.0 is 
> > vulnerable too.
> >
> 
> As it says in the quote you have provided, only 1.0.1 servers are 
> known to be vulnerable. The same patch is applied to other server 
> versions as a precaution and we still advise you to upgrade.
> 

Just to expand on the reason for this. It's a bit complex and I hope I haven't 
oversimplified it.

Roughly speaking the attack relies on being able to persuade server and client 
to use a compatible (i.e. still able to complete) invalid handshake with a zero 
length master secret. The MITM can then determine the session keys and decrypt 
and modify all traffic.

A client or server not based on a vulnerable version of OpenSSL will abort the 
connection because the handshake is invalid. This is why you need a vulnerable 
client and server for the attack to work.

The compatibility requirement explains why only 1.0.1 servers are vulnerable:
although servers earlier than 1.0.0 *can* be persuaded to use an invalid 
hanshake it is *not* compatible with the client handshake so any attempt to 
perform the attack will fail.

It's for that reason that the patch is the same in 1.0.0 versions of OpenSSL:
it prevents the invalid handshake which is a good thing.

Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org 
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [email protected]
Automated List Manager                           [email protected]
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [email protected]
Automated List Manager                           [email protected]

Reply via email to