According to a server testing service I have tried, OpenSSL 0.9.8
fails to reject degenerate ephemeral DH keys, while OpenSSL 1.0.0
does this rejection.  They do not provide a CVE number for this
issue, and I cannot find it in the OpenSSL CHANGES file for 1.0.0
(as that is the version they mention).

Could anyone:

- Confirm or deny this
- Indicate if this has a known CVE number
- Indicate in which OpenSSL version this was fixed
- Indicate why (if true) this has not been backported to 0.9.8, which
 was still receiving other security patches at the time this was
 allegedly fixed in 1.0.0

P.S.

I am very familiar with the DH algorithm as such and I am somewhat
surprised that these sanity checks were missing in the official DH
implementation so recently (if the report is true).

Enjoy

Jakob
--
Jakob Bohm, CIO, Partner, WiseMo A/S.  http://www.wisemo.com
Transformervej 29, 2730 Herlev, Denmark.  Direct +45 31 13 16 10
This public discussion message is non-binding and may contain errors.
WiseMo - Remote Service Management for PCs, Phones and Embedded
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to