Thanks Wim.

On Tue, Apr 8, 2014 at 10:36 PM, Wim Lewis <w...@omnigroup.com> wrote:

>
> On 8 Apr 2014, at 7:14 PM, Chris Hill wrote:
> > Team, I am having a discussions with a few friends about why this
> OpenSSL vuln (CVE 2014-0160) does not affect SSH. This may be TOO basic for
> many of you (apologize in advance), but can't think of any other way to
> prove my point other than speaking to the folks who really know (that's u).
> Or maybe I am the one wrong, wouldn't be the first time ;).
> >
> > A quick response to my frieds could be simply diffing the files for the
> actual OpenSSL change, e.g. ssl/d1_both.c and ssl/t1_lib.c, but I want a
> more classy answer.
> >
> > Is the below ok or am I completely off?
> >
> > Thank you in advance
> >
> > SSH and SSL/TLS are simply different protocols (doh). They may share
> some similar underlying crypto implementations, but as of their respective
> RFCs, they are just different protocols. The TLS Heartbeat TLS extension
> would not apply to SSH. SSH "may" have its own way to keep alive, but that
> would be a different one.
> >
> > Chris.
>
> This is correct as I understand it. ssh uses openssl mostly for crypto
> operations, but the ssh protocol does not have anything in common with
> ssl/tls (other than some fairly general design aspects). The heartbeat bug
> is particular to the openssl implementation of the heartbeat feature in
> tls, and that code isn't used by openssh.
>
>
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           majord...@openssl.org
>

Reply via email to