Skip to content
  1. Dec 08, 2014
  2. Dec 04, 2014
  3. Nov 20, 2014
  4. Oct 28, 2014
    • Emilia Kasper's avatar
      Tighten session ticket handling · d663df23
      Emilia Kasper authored
      
      
      Tighten client-side session ticket handling during renegotiation:
      ensure that the client only accepts a session ticket if the server sends
      the extension anew in the ServerHello. Previously, a TLS client would
      reuse the old extension state and thus accept a session ticket if one was
      announced in the initial ServerHello.
      
      Reviewed-by: default avatarBodo Moeller <bodo@openssl.org>
      d663df23
  5. Oct 27, 2014
  6. Oct 22, 2014
  7. Oct 15, 2014
  8. Oct 02, 2014
  9. Sep 29, 2014
  10. Sep 23, 2014
  11. Sep 05, 2014
  12. Aug 15, 2014
  13. Aug 01, 2014
  14. Jul 22, 2014
  15. Jul 04, 2014
  16. Jun 01, 2014
  17. May 23, 2014
  18. Apr 26, 2014
  19. Apr 22, 2014
  20. Apr 07, 2014
    • Dr. Stephen Henson's avatar
      Add heartbeat extension bounds check. · 731f4314
      Dr. Stephen Henson authored
      A missing bounds check in the handling of the TLS heartbeat extension
      can be used to reveal up to 64k of memory to a connected client or
      server.
      
      Thanks for Neel Mehta of Google Security for discovering this bug and to
      Adam Langley <agl@chromium.org> and Bodo Moeller <bmoeller@acm.org> for
      preparing the fix (CVE-2014-0160)
      (cherry picked from commit 96db9023b881d7cd9f379b0c154650d6c108e9a3)
      731f4314
  21. Apr 05, 2014
  22. Apr 01, 2014
  23. Mar 12, 2014
    • Dr. Stephen Henson's avatar
      Fix for CVE-2014-0076 · f9b6c0ba
      Dr. Stephen Henson authored
      Fix for the attack described in the paper "Recovering OpenSSL
      ECDSA Nonces Using the FLUSH+RELOAD Cache Side-channel Attack"
      by Yuval Yarom and Naomi Benger. Details can be obtained from:
      http://eprint.iacr.org/2014/140
      
      Thanks to Yuval Yarom and Naomi Benger for discovering this
      flaw and to Yuval Yarom for supplying a fix.
      (cherry picked from commit 2198be3483259de374f91e57d247d0fc667aef29)
      
      Conflicts:
      
      	CHANGES
      f9b6c0ba
  24. Jan 03, 2014
  25. Dec 20, 2013
  26. Dec 13, 2013
  27. Nov 06, 2013
    • Dr. Stephen Henson's avatar
      Experimental workaround TLS filler (WTF) extension. · 0467ea68
      Dr. Stephen Henson authored
      Based on a suggested workaround for the "TLS hang bug" (see FAQ and PR#2771):
      if the TLS Client Hello record length value would otherwise be > 255 and less
      that 512 pad with a dummy extension containing zeroes so it is at least 512.
      
      To enable it use an unused extension number (for example 0x4242) using
      e.g. -DTLSEXT_TYPE_wtf=0x4242
      
      WARNING: EXPERIMENTAL, SUBJECT TO CHANGE.
      0467ea68
  28. Oct 22, 2013
  29. Sep 18, 2013