Re: CVE-2022-0778 - Impact of ECC cipher with valid server ECC certificate

2022-03-27 Thread Vipul Mehta
Thanks. I did some more analysis and now I understand it completely. ECC curve equation: y^2 = x^3 + ax + b (mod p), where p is prime Elliptic Curve parameters are: p, a, b, G, n, h G = Generator Point used to generate other points Private Key = Random Number Public Key = Point on Curve =

Re: CVE-2022-0778 - Impact of ECC cipher with valid server ECC certificate

2022-03-26 Thread Viktor Dukhovni
On Sat, Mar 26, 2022 at 12:32:03PM +0530, Vipul Mehta wrote: > If we consider ECDHE_ECDSA cipher based TLS handshake, then it is possible > that the client can send invalid public session key to the server causing > the vulnerability. Is this assumption correct ? The CVE only affects situations

CVE-2022-0778 - Impact of ECC cipher with valid server ECC certificate

2022-03-26 Thread Vipul Mehta
Hello, Our server does not consume any certificate from the client. Client authentication or client certificate verification is disabled. Server always has a valid ECC certificate. BN_mod_sqrt() is not used anywhere in the server except by openssl. If we consider ECDHE_ECDSA cipher based TLS