summaryrefslogtreecommitdiff
path: root/security/openssl
AgeCommit message (Collapse)AuthorFilesLines
2003-10-04Add support for BSD/OS.reed1-0/+7
2003-10-02Update to 0.9.6k:jschauma13-269/+52
Changes between 0.9.6j and 0.9.6k [30 Sep 2003] *) Fix various bugs revealed by running the NISCC test suite: Stop out of bounds reads in the ASN1 code when presented with invalid tags (CAN-2003-0543 and CAN-2003-0544). If verify callback ignores invalid public key errors don't try to check certificate signature with the NULL public key. [Steve Henson] *) In ssl3_accept() (ssl/s3_srvr.c) only accept a client certificate if the server requested one: as stated in TLS 1.0 and SSL 3.0 specifications. [Steve Henson] *) In ssl3_get_client_hello() (ssl/s3_srvr.c), tolerate additional extra data after the compression methods not only for TLS 1.0 but also for SSL 3.0 (as required by the specification). [Bodo Moeller; problem pointed out by Matthias Loepfe] *) Change X509_certificate_type() to mark the key as exported/exportable when it's 512 *bits* long, not 512 bytes. [Richard Levitte] Changes between 0.9.6i and 0.9.6j [10 Apr 2003] *) Countermeasure against the Klima-Pokorny-Rosa extension of Bleichbacher's attack on PKCS #1 v1.5 padding: treat a protocol version number mismatch like a decryption error in ssl3_get_client_key_exchange (ssl/s3_srvr.c). [Bodo Moeller] *) Turn on RSA blinding by default in the default implementation to avoid a timing attack. Applications that don't want it can call RSA_blinding_off() or use the new flag RSA_FLAG_NO_BLINDING. They would be ill-advised to do so in most cases. [Ben Laurie, Steve Henson, Geoff Thorpe, Bodo Moeller] *) Change RSA blinding code so that it works when the PRNG is not seeded (in this case, the secret RSA exponent is abused as an unpredictable seed -- if it is not unpredictable, there is no point in blinding anyway). Make RSA blinding thread-safe by remembering the creator's thread ID in rsa->blinding and having all other threads use local one-time blinding factors (this requires more computation than sharing rsa->blinding, but avoids excessive locking; and if an RSA object is not shared between threads, blinding will still be very fast). [Bodo Moeller] Changes between 0.9.6h and 0.9.6i [19 Feb 2003] *) In ssl3_get_record (ssl/s3_pkt.c), minimize information leaked via timing by performing a MAC computation even if incorrrect block cipher padding has been found. This is a countermeasure against active attacks where the attacker has to distinguish between bad padding and a MAC verification error. (CAN-2003-0078) [Bodo Moeller; problem pointed out by Brice Canvel (EPFL), Alain Hiltgen (UBS), Serge Vaudenay (EPFL), and Martin Vuagnoux (EPFL, Ilion)] Changes between 0.9.6g and 0.9.6h [5 Dec 2002] *) New function OPENSSL_cleanse(), which is used to cleanse a section of memory from it's contents. This is done with a counter that will place alternating values in each byte. This can be used to solve two issues: 1) the removal of calls to memset() by highly optimizing compilers, and 2) cleansing with other values than 0, since those can be read through on certain media, for example a swap space on disk. [Geoff Thorpe] *) Bugfix: client side session caching did not work with external caching, because the session->cipher setting was not restored when reloading from the external cache. This problem was masked, when SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG (part of SSL_OP_ALL) was set. (Found by Steve Haslam <steve@araqnid.ddts.net>.) [Lutz Jaenicke] *) Fix client_certificate (ssl/s2_clnt.c): The permissible total length of the REQUEST-CERTIFICATE message is 18 .. 34, not 17 .. 33. [Zeev Lieber <zeev-l@yahoo.com>] *) Undo an undocumented change introduced in 0.9.6e which caused repeated calls to OpenSSL_add_all_ciphers() and OpenSSL_add_all_digests() to be ignored, even after calling EVP_cleanup(). [Richard Levitte] *) Change the default configuration reader to deal with last line not being properly terminated. [Richard Levitte] *) Change X509_NAME_cmp() so it applies the special rules on handling DN values that are of type PrintableString, as well as RDNs of type emailAddress where the value has the type ia5String. [stefank@valicert.com via Richard Levitte] *) Add a SSL_SESS_CACHE_NO_INTERNAL_STORE flag to take over half the job SSL_SESS_CACHE_NO_INTERNAL_LOOKUP was inconsistently doing, define a new flag (SSL_SESS_CACHE_NO_INTERNAL) to be the bitwise-OR of the two for use by the majority of applications wanting this behaviour, and update the docs. The documented behaviour and actual behaviour were inconsistent and had been changing anyway, so this is more a bug-fix than a behavioural change. [Geoff Thorpe, diagnosed by Nadav Har'El] *) Don't impose a 16-byte length minimum on session IDs in ssl/s3_clnt.c (the SSL 3.0 and TLS 1.0 specifications allow any length up to 32 bytes). [Bodo Moeller] *) Fix initialization code race conditions in SSLv23_method(), SSLv23_client_method(), SSLv23_server_method(), SSLv2_method(), SSLv2_client_method(), SSLv2_server_method(), SSLv3_method(), SSLv3_client_method(), SSLv3_server_method(), TLSv1_method(), TLSv1_client_method(), TLSv1_server_method(), ssl2_get_cipher_by_char(), ssl3_get_cipher_by_char(). [Patrick McCormick <patrick@tellme.com>, Bodo Moeller] *) Reorder cleanup sequence in SSL_CTX_free(): only remove the ex_data after the cached sessions are flushed, as the remove_cb() might use ex_data contents. Bug found by Sam Varshavchik <mrsam@courier-mta.com> (see [openssl.org #212]). [Geoff Thorpe, Lutz Jaenicke] *) Fix typo in OBJ_txt2obj which incorrectly passed the content length, instead of the encoding length to d2i_ASN1_OBJECT. [Steve Henson]
2003-09-22style nitsgrant1-3/+2
2003-09-22formatting nitsgrant1-4/+5
2003-09-11Rewrite this file so that we can specify the version of OpenSSL that wejlam1-94/+112
need by simply setting BUILDLINK_DEPENDS.openssl. This buildlink2.mk file now functions just like any other typical buildlink2.mk file.
2003-09-10Note version numbers for 0.9.6[hij].jlam1-1/+4
2003-09-10Only check if we need to add the rsaref dependency if we need the pkgsrcjlam1-3/+5
openssl.
2003-09-10Use the built-in HAS_CONFIGURE and TEST_TARGET infrastructure to do thejlam1-44/+37
configure and test phases.
2003-09-10Honor CFLAGS/LDFLAGS from the environment.jlam3-7/+18
2003-09-10Back out the make -> @MAKE@ -> ${MAKE} changes since we workaround thejlam8-86/+12
bare "make" problem using tools.mk.
2003-08-25Several of the Makefile used in this package call 'make' directly. Ifjschauma8-25/+102
an operating system does not have a 'make' (ie only bmake), or if the OS supplied 'make' is sufficiently broken (Irix), this will cause the build to fail (interestingly enough apparently only if build as a dependency, not if build from this directory). Patch Makefiles to use @MAKE@, which then, after patching, is substituted with the actual ${MAKE} (can't use "MAKE= ${MAKE} -f Makefile.ssl"). While here, tweak Irix configure a bit.
2003-08-04If 0.9.7a or 0.9.7b are required and not otherwise installed on the systemjmc1-1/+15
set PKG_SKIP_REASON and move on. The package only supports to 0.9.6g currently otherwise.
2003-07-29add openssl 0.9.7a, as found in Slackware Linux 9.grant1-1/+9
XXX there really must be a better way to (not have to) do this.
2003-07-24Add support for OpenSSL 0.9.7b shipped with NetBSD-current.tron1-1/+9
2003-07-22Remove fallout from ruby-openssl mis-reimport.wiz1-11/+0
2003-07-22Re-import security/ruby-openssl 0.1.4.1.taca2-10/+12
2003-07-17s/netbsd.org/NetBSD.org/grant1-2/+2
2003-07-12don't define test target directly, use do-test insteaddillo1-2/+2
2003-07-02style nits, join two .if's.grant1-8/+6
2003-07-02more brutally attack the CONFIGURE_ARGS target issue on Solaris.grant1-2/+6
force gcc if *gcc* - Sun's compiler is never going to be installed into a path with 'gcc' in it(!)
2003-06-27Make this work on IRIX64.jschauma1-1/+6
2003-06-10Rename PLIST.irix6 to PLIST.irix to match the others and set thejschauma2-3/+3
PLIST_SRC accordingly after we recently set LOWER_OPSYS on IRIX to what most applications seem to expect (ie irix6.5 rather than irix6).
2003-06-02Use tech-pkg@ in favor of packages@ as MAINTAINER for orphaned packages.jschauma1-2/+2
Should anybody feel like they could be the maintainer for any of thewe packages, please adjust.
2003-05-14Add freebsd specific parts. From Marc Recht in PR 21573.wiz1-0/+7
2003-04-17Remove a paragraph with the following comment:wiz2-50/+1
# This hack goes away, once we formally de-support NetBSD-1.4.x. We did that half a year ago.
2003-03-21* Add patch from http://www.openssl.org/news/secadv_20030317.txt:seb5-3/+132
Researchers have discovered a timing attack on RSA keys, to which OpenSSL is generally vulnerable, unless RSA blinding has been turned on. Typically, it will not have been, because it is not easily possible to do so when using OpenSSL to provide SSL or TLS. The enclosed patch switches blinding on by default. Applications that wish to can remove the blinding with RSA_blinding_off(), but this is not generally advised. It is also possible to disable it completely by defining OPENSSL_NO_FORCE_RSA_BLINDING at compile-time. The performance impact of blinding appears to be small (a few percent). This problem affects many applications using OpenSSL, in particular, almost all SSL-enabled Apaches. You should rebuild and reinstall OpenSSL, and all affected applications. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0147 to this issue. * Add patch from http://www.openssl.org/news/secadv_20030319.txt: Czech cryptologists Vlastimil Klima, Ondrej Pokorny, and Tomas Rosa have come up with an extension of the "Bleichenbacher attack" on RSA with PKCS #1 v1.5 padding as used in SSL 3.0 and TLS 1.0. Their attack requires the attacker to open millions of SSL/TLS connections to the server under attack; the server's behaviour when faced with specially made-up RSA ciphertexts can reveal information that in effect allows the attacker to perform a single RSA private key operation on a ciphertext of its choice using the server's RSA key. Note that the server's RSA key is not compromised in this attack. * Bump PKGREVISION.
2003-02-28tweak linking of libssl so it can find libcrypto.grant2-12/+75
2003-02-20Add patch from http://www.openssl.org/news/secadv_20030219.txt:wiz3-2/+105
In ssl3_get_record (ssl/s3_pkt.c), minimize information leaked via timing by performing a MAC computation even if incorrrect block cipher padding has been found. This is a countermeasure against active attacks where the attacker has to distinguish between bad padding and a MAC verification error. (CAN-2003-0078) Bump PKGREVISION.
2003-01-28Instead of including bsd.pkg.install.mk directly in a package Makefile,jlam1-2/+2
have it be automatically included by bsd.pkg.mk if USE_PKGINSTALL is set to "YES". This enforces the requirement that bsd.pkg.install.mk be included at the end of a package Makefile. Idea suggested by Julio M. Merino Vidal <jmmv at menta.net>.
2003-01-23strip leading path from $CC so we don't try to run Configure with argsgrant1-2/+2
eg. 'solaris-sparcv7-/usr/pkg/bin/gcc' :-)
2002-12-24Add PLIST for irix6. Same as netbsd and solaris -- maybe we can combine these?jschauma1-0/+7
2002-12-07Replace IGNORE with PKG_FAIL_REASON or PKG_SKIP_REASON as appropriate.schmonz1-2/+2
2002-12-03on Solaris, pass -Wl,-R ... (as per NetBSD targets) so that libssl cangrant2-6/+89
find libcrypto. fixes my PR pkg/19229.
2002-11-30Explicitly specify the path to Perl5 executable for configure script.uebayasi1-2/+2
Reported by Jonathan Perkin in PR19205.
2002-10-25Unused.wiz1-123/+0
2002-09-09The shared libraries are installed on Solaris now.markd1-1/+7
2002-09-07Use buildlink2 and pass an extra flag to the configure script so that ifjlam1-3/+4
RSAref is used, then the library may be found.
2002-09-05We don't need to symlink bin/openssl since we want the one in ${SSLBASE}.jlam1-3/+2
2002-08-25Merge changes in packages from the buildlink2 branch that havejlam15-14/+113
buildlink2.mk files back into the main trunk.
2002-08-19Let build on sparc v7.fredb2-4/+4
2002-08-19Fix a comment, and improve pattern to also work on netbsd-1-4.wiz1-3/+3
2002-08-19Compile no-shared on 1.4.x. This makes the package install and work for mewiz1-1/+6
on 1.4.2/i386. Approved by agc.
2002-08-16Provide a sensible default for BUILDLINK_DEPENDS.openssl - noticed whenagc1-1/+2
the in-tree openssl is < 0.9.6f, a previous package build has installed the openssl-0.9.6g package, but the BUILDLINK_DEPENDS.openssl value is not initialised, so that the package infrastructure tries to build and install the openssl-0.9.6g package again.
2002-08-15Revert Makefile,v.1.56, as the NetBSD patches were causing intractablefredb3-12/+20
problems for Solaris. Instead, handle patch for NetBSD-1.4.2 specially.
2002-08-15Really require 0.9.6g, if we require the package at all.fredb1-44/+10
2002-08-10It just occurred to me that the ${PATCHDIR} patches developed against thefredb1-4/+4
NetBSD-patched codebase won't apply cleanly (or at all) without the NetBSD patch. Therefore, remove the `.if ${OS}' condition for applying the patch, so Solaris and Darwin start with the same codebase. Fix as needed.
2002-08-10require 0.9.6f, at leastitojun1-5/+19
2002-08-10Update to 0.9.6g. The most significant change is this proof againstfredb6-32/+59
a stunning DoS vulnerability, fixed in 0.9.6f: *) Use proper error handling instead of 'assertions' in buffer overflow checks added in 0.9.6e. This prevents DoS (the assertions could call abort()). [Arne Ansper <arne@ats.cyber.ee>, Bodo Moeller] Regenerate the netbsd patch. This is now a clean diff against the vendor tag, with version-number-only changes elided. Partially revert "crypto/dist/openssl/crypto/rand/randfile.c", version 1.4 (via additional pkgsrc patch), to give this a shot to compile on NetBSD-1.4.2 and earlier, which had no strlcpy() or strlcat(). Assemble the shared library without "-Bsymbolic", mainly to give this a shot at linking on NetBSD-a.out (untested).
2002-08-09Correctly set the value of SSLCERTS depending on the environment and thejlam1-1/+7
platform.
2002-08-09* Change the perl paths in the various build scripts to ${PERL5} and notjlam2-16/+13
${LOCALBASE}/bin/perl. * Refer to the make program used to drive the build and installation as "${MAKE_PROGRAM}". * Instead of explicitly setting PKG_SYSCONFBASE=/etc, use the pkg-specific override PKG_SYSCONFDIR.openssl, and optionally set it so that the user still has the option of overriding its value. * Use bsd.pkg.install.mk to install the default config file (openssl.cnf) and to create and remove the extra config directories. This lets us reemove the extra lines in PLIST that do the same thing.