1. 31 1月, 2016 8 次提交
  2. 30 1月, 2016 14 次提交
  3. 29 1月, 2016 15 次提交
  4. 28 1月, 2016 3 次提交
    • M
      CHANGES and NEWS updates for release · 502bed22
      Matt Caswell 提交于
      Add details about the latest issues fixed in the forthcoming release.
      Reviewed-by: NRich Salz <rsalz@openssl.org>
      502bed22
    • M
      Add a test for small subgroup attacks on DH/DHE · e729aac1
      Matt Caswell 提交于
      Following on from the previous commit, add a test to ensure that
      DH_compute_key correctly fails if passed a bad y such that:
      
      y^q (mod p) != 1
      Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
      e729aac1
    • M
      Prevent small subgroup attacks on DH/DHE · b128abc3
      Matt Caswell 提交于
      Historically OpenSSL only ever generated DH parameters based on "safe"
      primes. More recently (in version 1.0.2) support was provided for
      generating X9.42 style parameter files such as those required for RFC
      5114 support. The primes used in such files may not be "safe". Where an
      application is using DH configured with parameters based on primes that
      are not "safe" then an attacker could use this fact to find a peer's
      private DH exponent. This attack requires that the attacker complete
      multiple handshakes in which the peer uses the same DH exponent.
      
      A simple mitigation is to ensure that y^q (mod p) == 1
      
      CVE-2016-0701
      
      Issue reported by Antonio Sanso.
      Reviewed-by: NViktor Dukhovni <viktor@openssl.org>
      b128abc3