tech-security archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: SSL renegociation vulnerability
On Sat, Dec 05, 2009 at 03:30:57AM +0000, Christos Zoulas wrote:
> In article <20091204162709.GA11270%panix.com@localhost>,
> Thor Lancelot Simon <tls%panix.com@localhost> wrote:
> >On Fri, Dec 04, 2009 at 01:13:52AM -0500, Brian Seklecki wrote:
> >>
> >> However, I can confirm that:
> >>
> >> http://security.FreeBSD.org/patches/SA-09:15/ssl.patch
> >
> >If this is the patch from OpenSSL 0.9.8l it should not be applied to
> >NetBSD; it is broken and introduces both forward *and* backwards API
> >and ABI incompatibility.
>
> Unfortunately I have not seen anything in the head of the OpenSSL tree
> that addresses this issue so I have applied a similar patch to FreeBSD
> that disables renegotiation completely for now. I would like to have
> a better solution, but I don't see one.
Actually, OpenSSL HEAD gets it pretty much right.
The problem with what OpenSSL 0.9.8l did is that it:
1) Leaves the connection hung rather than closing it after the
renegotiation attempt.
2) Uses a different API/ABI for renegotiation control than what
they did two days later in OpenSSL HEAD, without any backwards
compatibility!
Thor
Home |
Main Index |
Thread Index |
Old Index