Hello.
#?1|kent:tmp$ x=U2FsdGVkX19hzr7eekkcCcfeydWYK7HAeLr2lRPThis
[ ^ $? of last command]
#?0|kent:tmp$ printf ${x}= | openssl enc -aes256 -k "dubidada" -a -A -pbkdf2
-d
#?0|kent:tmp$ printf ${x}=t | openssl enc -aes256 -k "dubidada" -a -A -pbkdf2
-d
#?0|
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
OpenSSL Security Advisory [27th June 2024]
==
SSL_select_next_proto buffer overread (CVE-2024-5535)
=
Severity: Low
Issue summary: Calling the OpenSSL API
On Wednesday, April 17th, 2024 at 6:57 AM, Michael Wojcik via openssl-users
wrote:
> > From: Turritopsis Dohrnii Teo En Ming teo.en.m...@protonmail.com
> > Sent: Monday, 15 April, 2024 07:36
> >
> > > > From: openssl-users openssl-users-boun...@openssl.org On
On 09/06/2024 19:59, Dennis Clarke via openssl-users wrote:
On 5/30/24 11:15, Michael Wojcik via openssl-users wrote:
From: openssl-users On Behalf Of
Dennis
Clarke via openssl-users
Sent: Thursday, 30 May, 2024 07:29
OKay, thank you. I guess today is a good day to test on a few oddball
Hi, I have a requirement to support the TLS status_request_v2 extension for
TLS 1.2 (rfc6961) using OpenSSL 3.x...
Looking at the API I've successfully used SSL_CTX_add_custom_ext() to add
the extension to the client hello, my server code is also picking this and
generating the extension
:
008C96F90100:error:1C880004:Provider routines:rsa_verify:RSA
lib:providers/implementations/signature/rsa_sig.c:785:
License key is invalid
```
Do you have any idea of how to solve this new error? any guidance?
On Mon, Jun 10, 2024 at 11:52 PM Thomas Dwyer III via openssl-users <
openssl-us
/LicenseValidator__;!!ACWV5N9M2RV99hQ!NbxXgIkXi0CHG7PAehmOM_k1dXimFAfepGUTqIqQlJDfvxHviaWiNf3Cq45qlpW8zwSBX6jMtdkdlo7VlA9bse82$> to
validate a hypothetical |program license| using OpenSSL 3.1 Library
<https://urldefense.com/v3/__https://wiki.openssl.org/index.php/OpenSS
idator> to validate a
hypothetical program license using OpenSSL 3.1 Library
<https://wiki.openssl.org/index.php/OpenSSL_3.0>, and when I tried to
validate the licensed content I got the following error:
Failed to verify license
008C1AF90100:error:0277:rsa routines:ossl_rsa_verify:
On Sat, Jun 08, 2024 at 08:12:57AM -0400, Neil Horman wrote:
> > I see someone at
> > https://github.com/openssl/openssl/issues/13382#issuecomment-1181577183
> > with a similar concern suggested -macopt keyfile:file
The requested feature (explicit keyfile option)
On 5/30/24 11:15, Michael Wojcik via openssl-users wrote:
From: openssl-users On Behalf Of Dennis
Clarke via openssl-users
Sent: Thursday, 30 May, 2024 07:29
OKay, thank you. I guess today is a good day to test on a few oddball
system architectures. I suspect there are very very few people out
On 6/8/2024 5:12 AM, Neil Horman wrote:
printf '%s' "hello" | LD_LIBRARY_PATH=$PWD ./apps/openssl dgst -sha1
-hmac $(cat key.txt)
SHA1(stdin)= c3b424548c3dbd02161a9541d89287e689f076d7
That will expose the key in the process args, so is NOT secure.
--
Carson
the openssl-mac utility already contains such a option (though it doesn't
circumvent the issue as the option for the key is also passed on the
command line)
It seems some bash magic solves this problem though. By putting your key
in a file, you can use command substitution to solve
nd arguments)?
[...]
I see someone at
https://github.com/openssl/openssl/issues/13382#issuecomment-1181577183
with a similar concern suggested -macopt keyfile:file
--
Stephane
2022-08-07 18:20:56 +0200, Francois:
[...]
> I am reading some doc instructing me to run
>
> printf '%s' "${challenge}" | openssl dgst -sha1 -hmac ${APP_TOKEN}
>
> Doing so would leak the APP_TOKEN on the command line arguments (so a
> user running a &quo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
OpenSSL version 3.1.6 released
==
OpenSSL - The Open Source toolkit for SSL/TLS
https://www.openssl.org/
The OpenSSL project team is pleased to announce the release of
version 3.1.6 of our open source
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
OpenSSL version 3.0.14 released
===
OpenSSL - The Open Source toolkit for SSL/TLS
https://www.openssl.org/
The OpenSSL project team is pleased to announce the release of
version 3.0.14 of our open
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
OpenSSL version 3.3.1 released
==
OpenSSL - The Open Source toolkit for SSL/TLS
https://www.openssl.org/
The OpenSSL project team is pleased to announce the release of
version 3.3.1 of our open source
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
OpenSSL version 3.2.2 released
==
OpenSSL - The Open Source toolkit for SSL/TLS
https://www.openssl.org/
The OpenSSL project team is pleased to announce the release of
version 3.2.2 of our open source
General
-Original Message-
From: openssl-users On Behalf Of Viktor
Dukhovni
Sent: Friday, May 31, 2024 06:14 PM
To: openssl-users@openssl.org
Subject: Re: Issue in DH Algorithm Keys Generation in OpenSSL 3.3.0
[External email: Use caution with links and attachments
Hello everyone, I want to contribute my source code to openssl, But I am in
trouble:
When building openssl with MinGW64, make test is hung up
<https://github.com/openssl/openssl/issues/24436>.
For so many days, nobody has replied to me, I value your feedback.
On Fri, May 31, 2024 at 07:47:40AM +, Vishal Kevat via openssl-users wrote:
> Hi OpenSSL users,
>
> I am using OpenSSL source version 3.3.0 and facing an issue in key generation
> part of Diffie Hellman (DH) Algorithm. Below are the APIs I am using for
> generating Public a
On Fri, May 31, 2024 at 12:39:12PM +, Vishal Kevat via openssl-users wrote:
> Is there any way to make this prime number work by doing some
> modifications in the openssl source code.
It ISN'T a *prime* number.
> Like bypassing the OpenSSL DH prime check?
Why do you want to use a
Hi Viktor,
Is there any way to make this prime number work by doing some modifications in
the openssl source code.
Like bypassing the OpenSSL DH prime check?
Regards,
Vishal
General
-Original Message-
From: openssl-users On Behalf Of Viktor
Dukhovni
Sent: Friday, May 31, 2024 03:01
On Fri, May 31, 2024 at 07:47:40AM +, Vishal Kevat via openssl-users wrote:
> I am using OpenSSL source version 3.3.0 and facing an issue in key
> generation part of Diffie Hellman (DH) Algorithm. Below are the APIs I
> am using for generating Public and Private Keys:
>
>
Hi OpenSSL users,
I am using OpenSSL source version 3.3.0 and facing an issue in key generation
part of Diffie Hellman (DH) Algorithm. Below are the APIs I am using for
generating Public and Private Keys:
static unsigned char DH_PRIME_128[] = { /* 128 bit prime */
0xff, 0xff, 0xff, 0xff
> From: openssl-users On Behalf Of Dennis
> Clarke via openssl-users
> Sent: Thursday, 30 May, 2024 07:29
>
> OKay, thank you. I guess today is a good day to test on a few oddball
> system architectures. I suspect there are very very few people out there
> running actual
On 5/30/24 03:03, Tomas Mraz wrote:
You can just test the HEAD commits in the respective branches (openssl-
3.0, openssl-3.1, openssl-3.2 and openssl-3.3) in git. The repository
will be frozen today afternoon so there should be no further changes
apart from eventual regression fixes
You can just test the HEAD commits in the respective branches (openssl-
3.0, openssl-3.1, openssl-3.2 and openssl-3.3) in git. The repository
will be frozen today afternoon so there should be no further changes
apart from eventual regression fixes and the release commits.
Regards,
Tomas Mraz
On 5/28/24 08:51, Tomas Mraz wrote:
The OpenSSL project team would like to announce the upcoming release of
OpenSSL versions 3.3.1, 3.2.2, 3.1.6 and 3.0.14.
Will there be any release candidate tarballs for testing on various
systems? Perhaps there already exists some commit or &quo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
OpenSSL Security Advisory [28th May 2024]
=
Use After Free with SSL_free_buffers (CVE-2024-4741)
Severity: Low
Issue summary: Calling the OpenSSL API
The OpenSSL project team would like to announce the upcoming release of
OpenSSL versions 3.3.1, 3.2.2, 3.1.6 and 3.0.14.
We will be also releasing extended support OpenSSL version
1.1.1y which will be available to premium support customers.
These releases will be made available on Tuesday 4th
Hi,
I observed that openssl(3.2.1) currently doesn't provide a way(this is my
understanding :P) to do complete record processing in one go instead of
doing it in multiple APIs/functions. This record processing feature allows
for HW implementations to do complete SSL record processing without too
Hi!
Sorry, when I try to click the links, I am offered to download something.
Is it intentional?
On Tue, 21 May 2024, 19:48 Kajal Sapkota, wrote:
> *Hi All,*
>
>
>
>
>
>
>
>
> * We are pleased to announce our upcoming webinar, Getting Started with
> QU
**
*Hi All,*
*
We are pleased to announce our upcoming webinar, Getting Started with
QUIC and OpenSSL.
In this brief yet comprehensive session, we'll dive into the basics of
QUIC and guide you through implementing a simple client using the QUIC
OpenSSL API. By the end of this webinar
On 5/16/24 08:28, Neil Horman wrote:
Glad its working a bit better for you. If you are inclined, please feel
free to open a PR with your changes for review.
Well, the changes are *really* trivial. Necessary and trivial.
--
Dennis Clarke
RISC-V/SPARC/PPC/ARM/CISC
UNIX and Linux spoken
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
OpenSSL Security Advisory [16th May 2024]
=
Excessive time spent checking DSA keys and parameters (CVE-2024-4603)
=
Severity: Low
Issue
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
OpenSSL Security Advisory [16th May 2024]
=
Excessive time spent checking DSA keys and parameters (CVE-2023-3446)
=
Severity: Low
Issue
a prototype in
> > the quic_stream_map.h header, so as to avoid the unneeded symbol
> > resolution. You would have to lather rinse repeat with the other
> missing
> > symbols of course.
> >
> > As to your prior question about how long the ability to support SunOS
r unadpoted platform list:
https://www.openssl.org/policies/general-supplemental/platforms.html
And while we endeavor to keep openssl building on as many platforms as
possible, its not feasible to cover all the currently
unmaintained platforms. You do have some agency here however. If you are
wi
e endeavor to keep openssl building on as many platforms as
possible, its not feasible to cover all the currently
unmaintained platforms. You do have some agency here however. If you are
willing and interested, you could volunteer to be a community platform
maintainer for your target platform.
ble to get a good
result if I go with "no-quic" in the config :
hubble $ $PERL ./Configure solaris64-sparcv9-cc \
> --prefix=/opt/bw no-asm no-engine shared zlib-dynamic \
> no-quic enable-weak-ssl-ciphers -DPEDANTIC 2>&1
Configuring OpenSSL version 3.3.0 for target solaris64-
Hello openssl-users,
My team and I have identified some Minerva attack[1] side channels in
various architectures. We are using statistical analysis to identify such
side channels. For each architecture we have tested and found out, it is
vulnerable we have created an upstream issue ( Intel[2
Clarke via openssl-users
mailto:openssl-users@openssl.org>> wrote:
On 4/9/24 08:56, OpenSSL wrote:
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
>
> OpenSSL version 3.3.0 released
> ==
>
there really is not any libatomic support. Well, there is
sort of but it is a hack. Given how portable the code is there must be a
configuration option somewhere to disable the need for those atomic ops.
Meanwhile, OpenSSL 3.0.x builds and tests flawlessly but ... how
long will that last
We added support for RCU locks in 3.3 which required the use of atomics (or
emulated atomic where they couldn't be supported), but those were in
libcrypro not liberal
On Sun, May 12, 2024, 7:26 PM Dennis Clarke via openssl-users <
openssl-users@openssl.org> wrote:
>
> On 4/9/24 08
On 4/9/24 08:56, OpenSSL wrote:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
OpenSSL version 3.3.0 released
==
Trying to compile this on an old Solaris 10 machine and over and over
and over I see these strange things as Undefined symbols
Is anyone out there building OpenSSL for a FreeRTOS system? If so, was it a
difficult port, and what are the main changes that were necessary?
Thank you.
- Steve Wall
That is the master branch CHANGES.md. It will be synced later.
For the 3.1 changes please look at the CHANGES.md in the openssl-3.1
branch and/or inside the alpha tarball.
Tomas
On Thu, 2022-12-01 at 15:15 +, Kenneth Goldman wrote:
> The changes show a jump from 3.0 to 3.2
>
&
The changes show a jump from 3.0 to 3.2
https://github.com/openssl/openssl/blob/master/CHANGES.md
smime.p7s
Description: S/MIME cryptographic signature
e still applies and
> migration from 3.0 to 3.1 should be just seamless.
>
> Tomas
>
>
> On Thu, 2022-12-01 at 09:40 -0500, Felipe Gasper wrote:
>> AFAICT, the migration guide doesn’t actually seem to mention upgrades
>> to 3.1.
>>
>> -FG
>>
>&g
t;
> -FG
>
>
> > On Dec 1, 2022, at 09:00, OpenSSL wrote:
> >
> > -BEGIN PGP SIGNED MESSAGE-----
> > Hash: SHA256
> >
> >
> > OpenSSL version 3.1 alpha 1 released
> >
> >
> >
AFAICT, the migration guide doesn’t actually seem to mention upgrades to 3.1.
-FG
> On Dec 1, 2022, at 09:00, OpenSSL wrote:
>
> -BEGIN PGP SIGNED MESSAGE-
> Hash: SHA256
>
>
> OpenSSL version 3.1 alpha 1 released
> ====
&
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
OpenSSL version 3.1 alpha 1 released
OpenSSL - The Open Source toolkit for SSL/TLS
https://www.openssl.org/
OpenSSL 3.1 is currently in alpha.
OpenSSL 3.1 alpha 1 has now been made available
Hi team,
Do you know how to programmatically specify the path of fipsmodule.cnf and load
it in application without using openssl.cnf in OpenSSL 3.0?
Historically, my product uses customized OpenSSL and doesn't have an
openssl.cnf.
I need to use FIPS module, and I try to load it, it fails until I
> From: Steven_M.irc
> Sent: Thursday, November 24, 2022 21:21
> > This is not true in the general case. There are applications which are
> > available on Linux which do not use the
> > distribution's package manager. There are applications which use their own
>
Steven_M.irc via openssl-users wrote:
> Hi Michael, Thanks very much for replying to my e-mail/post. I
> apologize for the lateness of my reply.
>> This is not true in the general case. There are applications which are
>> available on Linux which do not use
On Friday, 25 November 2022 05:21:00 CET, Steven_M.irc via openssl-users
wrote:
Hi Michael,
Thanks very much for replying to my e-mail/post. I apologize
for the lateness of my reply.
This is not true in the general case. There are applications
which are available on Linux which do not use
Hi all,
I have created small server application ssl based Data sharing to
the Public. i faced Handling the incoming connection. if multiple
connections are arrived. i ready accept . if and creating the New thread
. data send backandforth . i facing issue if 2 or 3 client has arrived
, Job Cacka wrote:
> Michael's point should be asked and answered first for your environment.
>
> To find all of the OpenSSL bits used on a windows system you would use
> Powershell or a tool that flexes its use like PDQ Inventory. There is a
> steep learning curve and it is pro
their own OpenSSL build, possibly linked
> statically or linked into one of their own shared objects or with the OpenSSL
> shared objects renamed. Linux distributions have not magically solved the
> problem of keeping all software on the system current.
That's disheartening
Am 11.11.2022 um 17:44 schrieb Matt Caswell:
On 11/11/2022 12:41, f...@plutonium24.de wrote:
My apologies. I tested the code you supplied and of course it also fails with 1.1.1. The
code was changed without my knowledge when updating to 3.0 and the version that was
working used the
A good question.
In a nut shell: the 3.0.0 FIPS provider is designed to work with all
3.0.x releases. We actively test this as part of our CI loops and it's
the way to claim FIPS compliance when using OpenSSL 3.0.7. You need to
build 3.0.7 (with or without FIPS support) and the 3.0.0 FIPS
The OpenSSL project has obtained certificate #4282
<https://csrc.nist.gov/projects/cryptographic-module-validation-program/certificate/4282>
from NIST for the FIPS provider. Nice. However, the certificate and
accompanying security policy specifically list version 3.0.0 while the
current r
Michael's point should be asked and answered first for your environment.
To find all of the OpenSSL bits used on a windows system you would use
Powershell or a tool that flexes its use like PDQ Inventory. There is a
steep learning curve and it is probably off topic for this group
> From: openssl-users on behalf of
> Steven_M.irc via openssl-users
> Sent: Monday, November 21, 2022 15:56
> However, I am running Windows 10, and since (unlike Linux) every piece of
> software outside of Windows itself
> needs to be updated individually, I don't know
Hi All,
A few weeks ago I sent this e-mail to the group:
https://mta.openssl.org/pipermail/openssl-users/2022-November/015613.html I
received a couple of replies, but sadly I have been too busy to respond to
them. Regardless, I need a bit more information please.
In one of the replies, Viktor
Answering myself here. It appears this is pretty logical. Openssl 3.0 has a
"legacy" provider which is normally compiled as a separate legacy.so module
which is loaded on demand at run time. Now, when compiled with
-fvisibility=hidden, this does not work because neither side ca
Can someone please suggest if we can build OpenSSL 3.0 for iOS platform?
Don’t see iphoneos-cross under supported os/platform list.
Regards,
Madhu
Hello Jinze.
The issue doesn't come from OpenSSL. It comes from at least two buffer overruns.
In aesEncrypt:
>
> ret = EVP_EncryptInit_ex(ctx, EVP_aes_128_ecb(), NULL, (const unsigned
> char*)key.c_str(), NULL);
You use key.c_str() to set the key. However, key here
Dear OpenSSL Group,
Greetings. I was working on writing simple aes encrypt/decrypt wrapper
function in c++ and running into a strange problem. The minimal reproducible
examples in gist seems working fine but when i uncomment lines 90-92, it will
fail to decrypt randomly. Can someone help me
On 11/11/2022 12:41, f...@plutonium24.de wrote:
My apologies. I tested the code you supplied and of course it also fails
with 1.1.1. The code was changed without my knowledge when updating to
3.0 and the version that was working used the deprecated
"EC_POINT_point2oct". During my test I
On 11/11/2022 00:49, James Muir wrote:
On 2022-11-10 18:35, f...@plutonium24.de wrote:
I have been using EVP_PKEY_get_raw_public_key with OpenSSL 1.1.1
without any problems to extract a raw public key (secp521r1, NIST
curve P-521). With OpenSSL 3.0 this fails. I'm using this call to get
On 2022-11-10 18:35, f...@plutonium24.de wrote:
I have been using EVP_PKEY_get_raw_public_key with OpenSSL 1.1.1 without
any problems to extract a raw public key (secp521r1, NIST curve P-521).
With OpenSSL 3.0 this fails. I'm using this call to get the raw public
key and to compare
I have been using EVP_PKEY_get_raw_public_key with OpenSSL 1.1.1 without
any problems to extract a raw public key (secp521r1, NIST curve P-521).
With OpenSSL 3.0 this fails. I'm using this call to get the raw public
key and to compare it with a reference value I have and I also check
We have a Linux application which can load a lot of different .so modules at
runtime, which in turn might be contain various third-party libraries. In the
past we have seen the problems that there might appear different binarily
incompatible openssl versions in the process memory, which might
On Tuesday, 8 November 2022 08:51:32 CET, Matthias Apitz wrote:
El día martes, noviembre 08, 2022 a las 08:26:54a. m. +0100,
Tomas Mraz escribió:
Hi,
Red Hat patches its OpenSSL implementation with some additional API
calls. That means you cannot use builds from an unpatched upstream
OpenSSL
08, 2022 a las 08:26:54a. m. +0100, Tomas
> Mraz escribió:
>
> > Hi,
> >
> > Red Hat patches its OpenSSL implementation with some additional API
> > calls. That means you cannot use builds from an unpatched upstream
> > OpenSSL tarball in place of the sy
El día martes, noviembre 08, 2022 a las 08:26:54a. m. +0100, Tomas Mraz
escribió:
> Hi,
>
> Red Hat patches its OpenSSL implementation with some additional API
> calls. That means you cannot use builds from an unpatched upstream
> OpenSSL tarball in place of the system libcr
Hi,
Red Hat patches its OpenSSL implementation with some additional API
calls. That means you cannot use builds from an unpatched upstream
OpenSSL tarball in place of the system libcrypto and libssl libraries.
The proper way is to always obtain updated system packages from your
vendor, i.e., Red
Hello,
We compile openssl 1.1.1l from the sources and run on RedHat 8.6 into the
problem that the system shared lib /usr/lib64/libk5crypto.so.3 misses a
symbol from openssl:
# objdump -TC /usr/lib64/libk5crypto.so.3 | grep EVP_KDF
DF *UND* OPENSSL_1_1_1b
I'd like to use OpenSSL with KTLS for websocket protocol, mainly for
receiving but also transmit. I'm using the latest version of OpenSSL from
source, with Ubuntu 20.04 and 22.04.
I currently use the regular SSL_read() and SSL_write() functions to receive
and transmit bytes. I have not used BIO
On 2022-11-04 09:14, Michael Wojcik via openssl-users wrote:
Specifically, limits.h is part of the C standard library (see e.g. ISO
9899:1999 7.10). This is a GCC issue; there's something wrong with John's GCC
installation, or how his environment configures it.
GCC often appears to have
> From: openssl-users On Behalf Of Matt
> Caswell
> Sent: Friday, 4 November, 2022 06:43
>
> This looks like something environmental rather than a problem with
> OpenSSL itself. /usr/lib/gcc/x86_64-linux-gnu/8/include-fixed/limits.h
> is clearly a system include file, t
include/openssl/types.h:14,
from apps/include/app_libctx.h:13,
from apps/lib/app_libctx.c:9:
/usr/lib/gcc/x86_64-linux-gnu/8/include-fixed/limits.h:194:15: fatal
error: limits.h: No such file or directory
#include_next /* recurse down to the real one
It has been quite a while since I worked with OpenSSL and the first time
I have experienced a build failure.
This is some of the system info:
uname -a
Linux jdblt1 4.19.0-22-amd64 #1 SMP Debian 4.19.260-1 (2022-09-29)
thx86_64 GNU/Linux
The following is the output from the configure
On 11/2/22 23:08, Anupam Dutta via openssl-users wrote:
I want to upgrade the openssl version from 3.0.2 to 3.0.7. My OS
version is Ubuntu 22.04.1 LTS (Jammy Jellyfish). Please help .It is urgent
Ubuntu has already dealt with the new vulnerabilities. If you do the
normal package upgrade
> From: openssl-users On Behalf Of
> Steven_M.irc via openssl-users
> Sent: Wednesday, 2 November, 2022 17:18
>
> I'm really worried about the vulnerabilities recently found in OpenSSL
> versions 3.0.0 - 3.0.6.
Why? What's your threat model?
> If I understand things cor
Hi team,
I compile OpenSSL 3.0.5 and 3.0.7 on AIX 7100, make and make install succeed,
but make test failed at very beginning when doing "00-prep_fipsmodule_cnf.t".
This is my config options: ./Configure -Wl,-R,/.uvlibs1 aix64-cc enable-fips
enable-acvp-tests no-mdc2 no-idea shared
Hi Team,
I want to upgrade the openssl version from 3.0.2 to 3.0.7. My OS version is
Ubuntu 22.04.1 LTS (Jammy Jellyfish). Please help .It is urgent.
Regards,
Anupam
On Wed, Nov 02, 2022 at 11:17:31PM +, Steven_M.irc via openssl-users wrote:
> I'm really worried about the vulnerabilities recently found in OpenSSL
> versions 3.0.0 - 3.0.6.
Just upgrade any affected systems and you'll be fine.
> If I understand things correctly (and please do c
Hi All,
I'm really worried about the vulnerabilities recently found in OpenSSL versions
3.0.0 - 3.0.6. If I understand things correctly (and please do correct me if
I'm wrong), it doesn't matter which version of OpenSSL clients are running,
only which version of OpenSSL *servers* are running
On Wed, 2 Nov 2022 at 18:40, Jochen Bern wrote:
> On 02.11.22 07:48, Turritopsis Dohrnii Teo En Ming wrote:
> > I have 2 internet-facing CentOS 7.9 Linux servers in Europe.
> > Are the patches available already? How do I patch OpenSSL on my CentOS
> 7.9
> > Linux se
Anupam,
please don’t attempt to install an openssl version which you built yourself to
your Linux system, it might brake your applications. Your Linux distribution
(Ubuntu) installs their own compiled versions which you can upgrade using its
package manager (apt)
Regards,
Matthias
From
On 02.11.22 07:48, Turritopsis Dohrnii Teo En Ming wrote:
I have 2 internet-facing CentOS 7.9 Linux servers in Europe.
Are the patches available already? How do I patch OpenSSL on my CentOS 7.9
Linux servers?
CentOS 7 does not come with 3.0 versions of OpenSSL. (Not even available
from oft
Hi Team,
I want to upgrade openssl from 3.0.2 to 3.0.7. I have downloaded 3.0.7 from
https://www.openssl.org/source and installed successfully. But, still it is
showing version 3.0.2.Please help. It's urgent.
My OS: 22.04.1 LTS (Jammy Jellyfish)
Regards,
Anupam
On Wed, 2 Nov 2022 at 18:38, Tomas Mraz wrote:
> In general unless you've built and installed your own build of OpenSSL
> you need to refer to the vendor of your operating system for patches.
>
> In particular the openssl packages in CentOS 7.9 are not affected given
> they ar
In general unless you've built and installed your own build of OpenSSL
you need to refer to the vendor of your operating system for patches.
In particular the openssl packages in CentOS 7.9 are not affected given
they are 1.0.2 version and not 3.0.x version.
Tomas Mraz, OpenSSL
On Wed, 2022-11
Subject: CVE-2022-3602 and CVE-2022-3786 Critical OpenSSL 3.0.x security
vulnerabilities
Good day from Singapore,
I refer to the following posts.
[1] OpenSSL Gives Heads Up to Critical Vulnerability Disclosure, Check
Point Alerts Organizations to Prepare Now
Link:
https://blog.checkpoint.com
这是一封自动回复邮件。已经收到您的来信,我会尽快回复。
On Tue, Nov 01, 2022 at 06:08:10PM -0500, Ray Crumrine wrote:
> Oh my gosh! Thank you. I am a newbie when it comes to certificates. I
> am only using tls for outbound calls. I thought I shouldn't need a
> certificate when doing outbound only [a client] but was getting some
> weird error. After I
1 - 100 of 23583 matches
Mail list logo