CVE-2014-0076 and OpenSSL 0.9.8

2014-03-26 Thread Geoff_Lowe
It looks as though CVE-2014-0076 affects OpenSSL 0.9.8-based distributions as 
well, correct?

It doesn't appear that the fix has been applied to the OpenSSL_0_9_8-stable 
branch yet though.  I suppose it might need a few tweaks to apply there 
cleanly...

Thanks.
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


Re: CVE-2014-0076 and OpenSSL 0.9.8

2014-03-26 Thread mancha
On Wed, 26 Mar 2014 06:55:41 + geoff_l...@mcafee.com wrote:
It looks as though CVE-2014-0076 affects OpenSSL 0.9.8-based 
distributions as well, correct?

Yes, 0.9.8y also uses the same Lopez/Dahab algo when computing
elliptic scalar mult on curves defined over binary fields
(i.e. GF(2^m)).

It doesn't appear that the fix has been applied to the 
OpenSSL_0_9_8-stable branch yet though.  I suppose it might need a 
few tweaks to apply there cleanly...

The tweaks are minimal and I've placed a backport here:

http://sf.net/projects/mancha/files/sec/openssl-0.9.8y_CVE-2014-
0076.diff
(.sig in same dir)

Note: all 0.9.8y ecdsa regression tests passed post-patch.

--mancha

__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


Re: CVE-2014-0076 and OpenSSL 0.9.8

2014-03-26 Thread Dr. Stephen Henson
On Tue, Mar 25, 2014, geoff_l...@mcafee.com wrote:

 It looks as though CVE-2014-0076 affects OpenSSL 0.9.8-based distributions as 
 well, correct?
 
 

Yes that's correct but  we weren't planning on making any more 0.9.8 releases.

Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


Re: CVE-2014-0076 and OpenSSL 0.9.8

2014-03-26 Thread Viktor Dukhovni
On Tue, Mar 25, 2014 at 09:23:58PM +, geoff_l...@mcafee.com wrote:

 It looks as though CVE-2014-0076 affects OpenSSL 0.9.8-based
 distributions as well, correct?

Isn't this an ECDSA issue?  I thought that EC algorithms are by
default disabled in OpenSSL 0.9.8 (require explicit ECCdraft in
cipherlist to enable and do not appear in either DEFAULT or ALL).

Perhaps given the number of post-0.9.8y commits pending on the
OpenSSL_0_9_8-stable branch, one final z release could be issued,
no more commits made after that, and plans to not make any further
releases announced?

d471adf Remove duplicate statement. (cherry picked from commit 
5a7652c3e585e970e5b778074c92e617e48fde38)
2fb8642 Clarify docs.
c44d95c fix shell syntax PR#3216 (cherry picked from commit 
080ae6843299c873808c04487d4ccf51624fe618)
0da40f0 Restore SSL_OP_MSIE_SSLV2_RSA_PADDING
7f722c9 remove obsolete STATUS file
4268216 Add release dates to NEWS
17540b7 Simplify and update openssl.spec
b70e4d3 Fixes for no-static-engine and Windows builds.
d9519a4 Update CHANGES.
5ac9786 Fix compilation with this branch's definition of SSL_CIPHER.
0b05204 Remove empty line.
a4bfeff Tidy up comments.
43433b3 Use TLS version supplied by client when fingerprinting Safari.
020a478 Backport TLS 1.1/1.2 #defines
cadbbd5 Don't prefer ECDHE-ECDSA ciphers when the client appears to be Safari 
on OS X. OS X 10.8..10.8.3 has broken support for ECDHE-ECDSA ciphers.
ff7b021 Fix overly lenient comparisons:
e7e4d50 Correct ECDSA example. (cherry picked from commit 
3a918ea2bbf4175d9461f81be1403d3781b2c0dc)
9204e7e DTLS message_sequence number wrong in rehandshake ServerHello
257df40 DTLS handshake fix.
a44c9b9 Set s-d1 to NULL after freeing it. (cherry picked from commit 
04638f2fc335a6dc2af8e5d556d36e29c261dcd2)
1cbd745 Print out DSA key if parameters absent.
e1e39a2 Disable compression for DTLS.
01de6e2 x86cpuid.pl: make it work with older CPU.
05689a1 Avoid unnecessary fragmentation. (cherry picked from commit 
80ccc66d7eedb2d06050130c77c482ae1584199a)
1643edc Encode INTEGER correctly.
1546fb7 Typo.
b7d222c Merge branch 'OpenSSL_0_9_8-stable' of /home/steve/src/git/openssl into 
OpenSSL_0_9_8-stable
a93cc7c Use orig_len, not rec-orig_len
8988407 Fix POD errors to stop make install_docs dying with pod2man 2.5.0+
b2afc0a cms-test.pl: make it work with not-so-latest perl. (cherry picked from 
commit 9c437e2faded18b4ef6499d7041c65d6e216955b)
a8655eb Check DTLS_BAD_VER for version number.
f751dc4 Fix for SSL_get_certificate
fbe621d Fix in ssltest is no-ssl2 configured (cherry picked from commit 
cbf9b4aed3e209fe8a39e1d6f55aaf46d1369dc4)
2e9fd43 use 10240 for tar record size
1638ce7 FAQ/README: we are now using Git instead of CVS (cherry picked from 
commit f88dbb8385c199a2a28e9525c6bba3a64bda96af)
7ecd974 Set next version.
db731da ssl/s3_[clnt|srvr].c: fix warning and linking error.
5864fd2 s3_cbc.c: make CBC_MAC_ROTATE_IN_PLACE universal. (cherry picked from 
commit f93a41877d8d7a287debb7c63d7b646abaaf269c)
ff58eaa s3_cbc.c: get rid of expensive divisions [from master]. (cherry picked 
from commit e9baceab5a385e570706ca98dec768b2d89d1ac6)
76c61a5 ssl/s3_enc.c: remove artefact.
4ea7019 ssl/[d1|s3]_pkt.c: harmomize orig_len handling. (cherry picked from 
commit 8545f73b8919770a5d012fe7a82d6785b69baa27)
59b1129 Fix IV check and padding removal.
fb092ef ssl/*: remove SSL3_RECORD-orig_len to restore binary compatibility.
6351ade Fix for EXP-RC2-CBC-MD5

-- 
Viktor.
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


Re: CVE-2014-0076 and OpenSSL 0.9.8

2014-03-26 Thread Dr. Stephen Henson
On Wed, Mar 26, 2014, Viktor Dukhovni wrote:

 On Tue, Mar 25, 2014 at 09:23:58PM +, geoff_l...@mcafee.com wrote:
 
  It looks as though CVE-2014-0076 affects OpenSSL 0.9.8-based
  distributions as well, correct?
 
 Isn't this an ECDSA issue?  I thought that EC algorithms are by
 default disabled in OpenSSL 0.9.8 (require explicit ECCdraft in
 cipherlist to enable and do not appear in either DEFAULT or ALL).
 

Certainly for TLS ECC ciphersuites are disabled by default in OpenSSL 0.9.8
though applications might use ECC for other purposes.

 Perhaps given the number of post-0.9.8y commits pending on the
 OpenSSL_0_9_8-stable branch, one final z release could be issued,
 no more commits made after that, and plans to not make any further
 releases announced?
 

That sounds reasonable to me. Though it would be version 0.9.8za.

Steve.
--
Dr Stephen N. Henson. OpenSSL project core developer.
Commercial tech support now available see: http://www.openssl.org
__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org


Re: CVE-2014-0076 and OpenSSL 0.9.8

2014-03-26 Thread mancha
Dr. Stephen Henson steve at openssl.org writes:
  On Wed, Mar 26, 2014, Viktor Dukhovni wrote:
  Perhaps given the number of post-0.9.8y commits pending on the
  OpenSSL_0_9_8-stable branch, one final z release could be issued,
  no more commits made after that, and plans to not make any further
  releases announced?
  
 
 That sounds reasonable to me. Though it would be version 0.9.8za.
 
 Steve.

It sounds like good news if 0.9.8 released one more update but would
sound even better if it adopted my fix for its broken alert handling
(see http://marc.info/?t=13676007772r=1w=2 for details).

--mancha


__
OpenSSL Project http://www.openssl.org
Development Mailing List   openssl-dev@openssl.org
Automated List Manager   majord...@openssl.org