Thanks Matt,

So, just the cipher+MAC matter, the authentication/key-exchange are irrelevant.

What about AEAD ciphers? Are they considered "stitched"?

--
-Todd Short
// tsh...@akamai.com<mailto:tsh...@akamai.com>
// "One if by land, two if by sea, three if by the Internet."

On Feb 26, 2019, at 10:40 AM, Matt Caswell 
<m...@openssl.org<mailto:m...@openssl.org>> wrote:



On 26/02/2019 15:03, Short, Todd via openssl-users wrote:
The latest security advisory:

https://www.openssl.org/news/secadv/20190226.txt

mentions stitched vs. non-stitched ciphersuites, but doesn’t really elaborate on
which ciphersuites are stitched and non-stitched.

The actual list in use is platform specific - the stitched ciphers are based on
asm implementations. Libssl in 1.0.2 knows about these stitched ciphers:

https://github.com/openssl/openssl/blob/56ff0f643482b19f7b2d7ed532dfb94ed3a4e294/ssl/ssl_ciph.c#L651-L671

Any TLS ciphersuite based on the above ciphers will use the stitched
implementation if it is available on that platform.

So, for example, if a stitched implementation of AES-128-CBC-HMAC-SHA1 is
available on your platform then it will be used if you negotiate the AES128-SHA
ciphersuite (aka TLS_RSA_WITH_AES_128_CBC_SHA). Similarly it will be used if you
negotiate DH-RSA-AES128-SHA (aka TLS_DH_RSA_WITH_AES_128_CBC_SHA) The combined
encrypt and mac operation will be performed in one go by the stitched
implementation. If you don't have a stitched implementation then the encrypt and
mac operations are performed individually.

Matt



"In order for this to be exploitable "non-stitched" ciphersuites must be in
use. Stitched ciphersuites are optimised implementations of certain commonly
used ciphersuites."

Can someone give some examples of both?

--
-Todd Short
// tsh...@akamai.com <mailto:tsh...@akamai.com>
// "One if by land, two if by sea, three if by the Internet."


Reply via email to