Hi Ben Laurie,

Do you mean that there would be a release (say 0.9.6j and 0.9.7b) with this
patch included.

Regards,
Umesh
Ben Laurie wrote:
> 
> I expect a release to follow shortly.
> 
> --
> http://www.apache-ssl.org/ben.html       http://www.thebunker.net/
> 
> "There is no limit to what a man can do or how far he can go if he
> doesn't mind who gets the credit." - Robert Woodruff
> 
>   ------------------------------------------------------------------------------
> OpenSSL v0.9.7a and 0.9.6i vulnerability
> ----------------------------------------
> 
> Researchers have discovered a timing attack on RSA keys, to which
> OpenSSL is generally vulnerable, unless RSA blinding has been turned
> on.
> 
> Typically, it will not have been, because it is not easily possible to
> do so when using OpenSSL to provide SSL or TLS.
> 
> The enclosed patch switches blinding on by default. Applications that
> wish to can remove the blinding with RSA_blinding_off(), but this is
> not generally advised. It is also possible to disable it completely by
> defining OPENSSL_NO_FORCE_RSA_BLINDING at compile-time.
> 
> The performance impact of blinding appears to be small (a few
> percent).
> 
> This problem affects many applications using OpenSSL, in particular,
> almost all SSL-enabled Apaches. You should rebuild and reinstall
> OpenSSL, and all affected applications.
> 
> The Common Vulnerabilities and Exposures project (cve.mitre.org) has
> assigned the name CAN-2003-0147 to this issue.
> 
> We strongly advise upgrading OpenSSL in all cases, as a precaution.
> 
>   ------------------------------------------------------------------------------
> Index: crypto/rsa/rsa_eay.c
> ===================================================================
> RCS file: /e/openssl/cvs/openssl/crypto/rsa/rsa_eay.c,v
> retrieving revision 1.28.2.3
> diff -u -r1.28.2.3 rsa_eay.c
> --- crypto/rsa/rsa_eay.c        30 Jan 2003 17:37:46 -0000      1.28.2.3
> +++ crypto/rsa/rsa_eay.c        16 Mar 2003 10:34:13 -0000
> @@ -195,6 +195,25 @@
>         return(r);
>         }
> 
> +static int rsa_eay_blinding(RSA *rsa, BN_CTX *ctx)
> +       {
> +       int ret = 1;
> +       CRYPTO_w_lock(CRYPTO_LOCK_RSA);
> +       /* Check again inside the lock - the macro's check is racey */
> +       if(rsa->blinding == NULL)
> +               ret = RSA_blinding_on(rsa, ctx);
> +       CRYPTO_w_unlock(CRYPTO_LOCK_RSA);
> +       return ret;
> +       }
> +
> +#define BLINDING_HELPER(rsa, ctx, err_instr) \
> +       do { \
> +               if(((rsa)->flags & RSA_FLAG_BLINDING) && \
> +                               ((rsa)->blinding == NULL) && \
> +                               !rsa_eay_blinding(rsa, ctx)) \
> +                       err_instr \
> +       } while(0)
> +
>  /* signing */
>  static int RSA_eay_private_encrypt(int flen, const unsigned char *from,
>              unsigned char *to, RSA *rsa, int padding)
> @@ -239,8 +258,8 @@
>                 goto err;
>                 }
> 
> -       if ((rsa->flags & RSA_FLAG_BLINDING) && (rsa->blinding == NULL))
> -               RSA_blinding_on(rsa,ctx);
> +       BLINDING_HELPER(rsa, ctx, goto err;);
> +
>         if (rsa->flags & RSA_FLAG_BLINDING)
>                 if (!BN_BLINDING_convert(&f,rsa->blinding,ctx)) goto err;
> 
> @@ -318,8 +337,8 @@
>                 goto err;
>                 }
> 
> -       if ((rsa->flags & RSA_FLAG_BLINDING) && (rsa->blinding == NULL))
> -               RSA_blinding_on(rsa,ctx);
> +       BLINDING_HELPER(rsa, ctx, goto err;);
> +
>         if (rsa->flags & RSA_FLAG_BLINDING)
>                 if (!BN_BLINDING_convert(&f,rsa->blinding,ctx)) goto err;
> 
> Index: crypto/rsa/rsa_lib.c
> ===================================================================
> RCS file: /e/openssl/cvs/openssl/crypto/rsa/rsa_lib.c,v
> retrieving revision 1.30.2.2
> diff -u -r1.30.2.2 rsa_lib.c
> --- crypto/rsa/rsa_lib.c        30 Jan 2003 17:37:46 -0000      1.30.2.2
> +++ crypto/rsa/rsa_lib.c        16 Mar 2003 10:34:13 -0000
> @@ -72,7 +72,13 @@
> 
>  RSA *RSA_new(void)
>         {
> -       return(RSA_new_method(NULL));
> +       RSA *r=RSA_new_method(NULL);
> +
> +#ifndef OPENSSL_NO_FORCE_RSA_BLINDING
> +       r->flags|=RSA_FLAG_BLINDING;
> +#endif
> +
> +       return r;
>         }
> 
>  void RSA_set_default_method(const RSA_METHOD *meth)
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to