To my earlier code, I have added these extra flags for client:

SSL_CTX_set_options(ctx, SSL_OP_ALL | SSL_OP_NO_SSLv2 | SSL_OP_NO_SSLv3);

And server also has these same flags set, so that no way client and server can 
communicate on sslv2, sslv3.

But again in logs I see SSL3 is negotiated:

[2014-10-24 18:00:17.063, Info      <     proxysrv:10684>] SSLConfig::Init: SSL 
initiated (OpenSSL 1.0.1j 15 Oct 2014 built on: Mon Oct 20 15:08:32 2014).
[2014-10-24 18:02:11.640, Info      <     proxysrv:10684>] SSLSocket::Callback: 
Handshake done: AES256-SHA              SSLv3 Kx=RSA      Au=RSA  Enc=AES(256)  
Mac=SHA1

On server, I have these ciphers set:

::SSL_CTX_set_cipher_list(ctx, 
"ALL:!aNULL:!ADH:!eNULL:!LOW:!EXP:RC4+RSA:+HIGH:+MEDIUM");

Is there something wrong with these ciphers? What are best cipher argument for 
only TLSv1 communication. I think, I need not set ciphers on client side.

Thanks – Pradeep reddy.

-----Original Message-----
From: owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] 
On Behalf Of Jeffrey Walton
Sent: Friday, October 24, 2014 7:12 PM
To: OpenSSL Users List
Subject: Re: openssl SSL3 vulnerability

On Fri, Oct 24, 2014 at 9:30 AM, Michael Wojcik <michael.woj...@microfocus.com> 
wrote:
> You have "SSL_OP_NO_SSLv2 | SSL_OP_NO_SSLv2" there. I assume "v2 ... 
> v2" is a typo, but if that's what your code actually has, then that's the 
> problem.
> (Assuming there isn't some other problem, of course.)
>
That's actually correct in this case.

$ cat ssl/ssl.h | grep SSL_OP_NO_
#define SSL_OP_NO_QUERY_MTU                 0x00001000L
#define SSL_OP_NO_TICKET                0x00004000L
#define SSL_OP_NO_SESSION_RESUMPTION_ON_RENEGOTIATION    0x00010000L
#define SSL_OP_NO_COMPRESSION                0x00020000L
#define SSL_OP_NO_SSLv2                    0x01000000L
#define SSL_OP_NO_SSLv3                    0x02000000L
#define SSL_OP_NO_TLSv1                    0x04000000L
#define SSL_OP_NO_TLSv1_2                0x08000000L
#define SSL_OP_NO_TLSv1_1                0x10000000L
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org


::DISCLAIMER::
----------------------------------------------------------------------------------------------------------------------------------------------------

The contents of this e-mail and any attachment(s) are confidential and intended 
for the named recipient(s) only.
E-mail transmission is not guaranteed to be secure or error-free as information 
could be intercepted, corrupted,
lost, destroyed, arrive late or incomplete, or may contain viruses in 
transmission. The e mail and its contents
(with or without referred errors) shall therefore not attach any liability on 
the originator or HCL or its affiliates.
Views or opinions, if any, presented in this email are solely those of the 
author and may not necessarily reflect the
views or opinions of HCL or its affiliates. Any form of reproduction, 
dissemination, copying, disclosure, modification,
distribution and / or publication of this message without the prior written 
consent of authorized representative of
HCL is strictly prohibited. If you have received this email in error please 
delete it and notify the sender immediately.
Before opening any email and/or attachments, please check them for viruses and 
other defects.

----------------------------------------------------------------------------------------------------------------------------------------------------

Reply via email to