On Thu, 7 May 1998, Theodore Hope wrote:
> The following appeared in my web server's SSL error log (newlines added
> for readability):
> 
>    [Fri May  1 07:08:20 1998]
>    error:0406406F:rsa routines:RSA_EAY_PRIVATE_DECRYPT:sslv3 rollback attack
> 
> I'm running Apache_1.2.4 + SSL_1.11  (using ssleay 0.8.1).

hmm... very interesting.

If a client connects, saying it can do SSLv3 and the server responds with
SSLv2, it then encodes the RSA pkcs1 padding in a special way.
The server, if it can do SSLv3, will check that this padding is not present
when doing SSLv2.  It is basically meant to check that SSLv3 capable servers
and browsers are talking the top protocol they can.

I know some browsers don't implemented this correctly (I seem to rememeber old
versions of MSIE are all over the place), and the check can be turned off by
using the SSL_OP_MSIE_SSLV2_RSA_PADDING option to the
SSL_CTX_set_options() call.

Ah! I knew I had it documented somewhere.  In
http://www.cryptsoft.com/ssleay/doc/vendor-bugs.html

  MICROSOFT SSLv2 PKCS#1 padding error
       MSIE 3.02, when doing SSLv2 (SSLv3 is turned off), all ways uses the
       SSLv2/v3 special PKS1 padding of 8 bytes of value 3. In it should not
       do so if it is talking only SSLv2 (SSLv2 hello message with a version
       of number of 2).

eric

+-------------------------------------------------------------------------+
| Administrative requests should be sent to [EMAIL PROTECTED] |
| List service provided by Open Software Associates, http://www.osa.com/  |
+-------------------------------------------------------------------------+

Reply via email to