On Tue, Jun 10, 2014 at 01:03:17PM -0700, Kyle Hamilton wrote: > http://opensslrampage.org/post/88383880093 > > I don't know if this has in fact been given to the OpenSSL team yet. I > am not jsing, and I am not involved in the OpenBSD audit. > > However, this is important. If MD5 passes, but SHA1 fails, then the MAC > verification will pass. This reduces the security of the handshake to MD5. > > I don't know where ssl3_final_finish_mac() is called from, if it's > limited to SSLv3 or if it's also called from TLS.
As far as I can see this is SSLv3 only, and only about the Finish message. So it seems that function return the length of the digest, and in some error cases 0. We'll end up with a wrong value in (peer_)finish_md_len. It should then result in this error: if (i != n) { al=SSL_AD_DECODE_ERROR; SSLerr(SSL_F_SSL3_GET_FINISHED,SSL_R_BAD_DIGEST_LENGTH); goto f_err; } So at first look there doesn't seem to be anything wrong with the current code. But their patch doesn't do anything wrong either. Kurt ______________________________________________________________________ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager majord...@openssl.org