summaryrefslogtreecommitdiff
path: root/CHANGES
diff options
context:
space:
mode:
authorBodo Möller <bodo@openssl.org>2003-04-11 15:03:12 +0000
committerBodo Möller <bodo@openssl.org>2003-04-11 15:03:12 +0000
commit7a04fdd87f544cef6aa08d54f7b9ff6b1eb4e7ab (patch)
tree099a6ab4077f6cb157f2a927b6cd5edad01c7dd4 /CHANGES
parent138f970e6ea32914eac3d9216dabc8511088ad71 (diff)
downloadopenssl-new-7a04fdd87f544cef6aa08d54f7b9ff6b1eb4e7ab.tar.gz
include 'Changes between 0.9.6i and 0.9.6j'
Diffstat (limited to 'CHANGES')
-rw-r--r--CHANGES25
1 files changed, 25 insertions, 0 deletions
diff --git a/CHANGES b/CHANGES
index 66870e6c87..6b1d73c5ef 100644
--- a/CHANGES
+++ b/CHANGES
@@ -2424,6 +2424,31 @@ des-cbc 3624.96k 5258.21k 5530.91k 5624.30k 5628.26k
*) Clean old EAY MD5 hack from e_os.h.
[Richard Levitte]
+ Changes between 0.9.6i and 0.9.6j [10 Apr 2003]
+
+ *) Countermeasure against the Klima-Pokorny-Rosa extension of
+ Bleichbacher's attack on PKCS #1 v1.5 padding: treat
+ a protocol version number mismatch like a decryption error
+ in ssl3_get_client_key_exchange (ssl/s3_srvr.c).
+ [Bodo Moeller]
+
+ *) Turn on RSA blinding by default in the default implementation
+ to avoid a timing attack. Applications that don't want it can call
+ RSA_blinding_off() or use the new flag RSA_FLAG_NO_BLINDING.
+ They would be ill-advised to do so in most cases.
+ [Ben Laurie, Steve Henson, Geoff Thorpe, Bodo Moeller]
+
+ *) Change RSA blinding code so that it works when the PRNG is not
+ seeded (in this case, the secret RSA exponent is abused as
+ an unpredictable seed -- if it is not unpredictable, there
+ is no point in blinding anyway). Make RSA blinding thread-safe
+ by remembering the creator's thread ID in rsa->blinding and
+ having all other threads use local one-time blinding factors
+ (this requires more computation than sharing rsa->blinding, but
+ avoids excessive locking; and if an RSA object is not shared
+ between threads, blinding will still be very fast).
+ [Bodo Moeller]
+
Changes between 0.9.6h and 0.9.6i [19 Feb 2003]
*) In ssl3_get_record (ssl/s3_pkt.c), minimize information leaked