tech-security archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: SSL renegociation vulnerability



On Dec 4, 10:52pm, tls%panix.com@localhost (Thor Lancelot Simon) wrote:
-- Subject: Re: SSL renegociation vulnerability

| On Sat, Dec 05, 2009 at 03:30:57AM +0000, Christos Zoulas wrote:
| > In article <20091204162709.GA11270%panix.com@localhost>,
| > Thor Lancelot Simon  <tls%panix.com@localhost> wrote:
| > >On Fri, Dec 04, 2009 at 01:13:52AM -0500, Brian Seklecki wrote:
| > >> 
| > >> However, I can confirm that:
| > >> 
| > >>   http://security.FreeBSD.org/patches/SA-09:15/ssl.patch
| > >
| > >If this is the patch from OpenSSL 0.9.8l it should not be applied to
| > >NetBSD; it is broken and introduces both forward *and* backwards API
| > >and ABI incompatibility.
| > 
| > Unfortunately I have not seen anything in the head of the OpenSSL tree
| > that addresses this issue so I have applied a similar patch to FreeBSD
| > that disables renegotiation completely for now. I would like to have
| > a better solution, but I don't see one.
| 
| Actually, OpenSSL HEAD gets it pretty much right.
| 
| The problem with what OpenSSL 0.9.8l did is that it:
| 
|       1) Leaves the connection hung rather than closing it after the
|          renegotiation attempt.
| 
|       2) Uses a different API/ABI for renegotiation control than what
|          they did two days later in OpenSSL HEAD, without any backwards
|          compatibility!

I'll import head then.

christos


Home | Main Index | Thread Index | Old Index