On 09/12/14 20:30, Arthur Tsang wrote:
> Hi Rich,
>
> do we have some formal announcement that openssl is not vulnerable for
> POODLE in TLS?  or can you explain why Openssl is not affected?  if
> symantec is issuing notification like that, i guess, a lot of
> management will demand explanations.  Thanks,
>
>
Adam Langley's post provides a good explanation of this problem:
https://www.imperialviolet.org/2014/12/08/poodleagain.html

The specification of SSLv3 did not specify the format of padding bytes
to be used when encrypting data. This led to an oracle attack.

TLS on the other hand *does* specify this, and therefore (if you
implement it correctly) is not vulnerable to this oracle attack. A TLS
library needs to check the padding bytes are correctly formatted and
fail if not. The problem is that it is possible to implement a TLS
library and still use the SSLv3 decryption routines when working with
TLS (i.e. don't check the padding bytes). This *will* work, although it
is not compliant with the spec. If you fail to check the padding bytes
then your TLS implementation is vulnerable to the same POODLE oracle attack.

I can confirm that OpenSSL is compliant with the spec and *does* check
the padding bytes. It is therefore is not vulnerable to this issue.

Matt

_______________________________________________
openssl-users mailing list
openssl-users@openssl.org
https://mta.opensslfoundation.net/mailman/listinfo/openssl-users

Reply via email to