Skip to content
  1. Sep 07, 2019
    • Bernd Edlinger's avatar
      Remove x86/x86_64 BSAES and AES_ASM support · 87bea655
      Bernd Edlinger authored
      
      
      This leaves VPAES and AESNI support.
      The VPAES performance is comparable but BSAES is not
      completely constant time. There are table lookups
      using secret key data in AES_set_encrypt/decrypt_key
      and in ctr mode short data uses the non-constant
      time AES_encrypt function instead of bit-slicing.
      Furthermore the AES_ASM is by far outperformed
      by recent GCC versions.
      Since BSAES calls back to AES_ASM for short
      data blocks the performance on those is also
      worse than the pure software implementaion.
      
      Fixes: #9640
      
      Reviewed-by: default avatarRichard Levitte <levitte@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/9675)
      87bea655
    • Billy Brumley's avatar
      [crypto/ec] for ECC parameters with NULL or zero cofactor, compute it · 30c22fa8
      Billy Brumley authored
      
      
      The cofactor argument to EC_GROUP_set_generator is optional, and SCA
      mitigations for ECC currently use it. So the library currently falls
      back to very old SCA-vulnerable code if the cofactor is not present.
      
      This PR allows EC_GROUP_set_generator to compute the cofactor for all
      curves of cryptographic interest. Steering scalar multiplication to more
      SCA-robust code.
      
      This issue affects persisted private keys in explicit parameter form,
      where the (optional) cofactor field is zero or absent.
      
      It also affects curves not built-in to the library, but constructed
      programatically with explicit parameters, then calling
      EC_GROUP_set_generator with a nonsensical value (NULL, zero).
      
      The very old scalar multiplication code is known to be vulnerable to
      local uarch attacks, outside of the OpenSSL threat model. New results
      suggest the code path is also vulnerable to traditional wall clock
      timing attacks.
      
      CVE-2019-1547
      
      Reviewed-by: default avatarMatt Caswell <matt@openssl.org>
      Reviewed-by: default avatarTomas Mraz <tmraz@fedoraproject.org>
      Reviewed-by: default avatarNicola Tuveri <nic.tuv@gmail.com>
      (Merged from https://github.com/openssl/openssl/pull/9781)
      30c22fa8
  2. Sep 06, 2019
  3. Sep 05, 2019
  4. Aug 29, 2019
  5. Aug 27, 2019
  6. Aug 24, 2019
  7. Aug 20, 2019
    • Pauli's avatar
      Start up DEVRANDOM entropy improvement for older Linux devices. · 3ff98f55
      Pauli authored
      
      
      Improve handling of low entropy at start up from /dev/urandom by waiting for
      a read(2) call on /dev/random to succeed.  Once one such call has succeeded,
      a shared memory segment is created and persisted as an indicator to other
      processes that /dev/urandom is properly seeded.
      
      This does not fully prevent against attacks weakening the entropy source.
      An attacker who has control of the machine early in its boot sequence
      could create the shared memory segment preventing detection of low entropy
      conditions.  However, this is no worse than the current situation.
      
      An attacker would also be capable of removing the shared memory segment
      and causing seeding to reoccur resulting in a denial of service attack.
      This is partially mitigated by keeping the shared memory alive for the
      duration of the process's existence.  Thus, an attacker would not only need
      to have called call shmctl(2) with the IPC_RMID command but the system
      must subsequently enter a state where no instances of libcrypto exist in
      any process.  Even one long running process will prevent this attack.
      
      The System V shared memory calls used here go back at least as far as
      Linux kernel 2.0.  Linux kernels 4.8 and later, don't have a reliable way
      to detect that /dev/urandom has been properly seeded, so a failure is raised
      for this case (i.e. the getentropy(2) call has already failed).
      
      Reviewed-by: default avatarBernd Edlinger <bernd.edlinger@hotmail.de>
      (Merged from https://github.com/openssl/openssl/pull/9595)
      
      [manual merge]
      3ff98f55
  8. Aug 19, 2019
  9. Aug 18, 2019
  10. Aug 17, 2019
  11. Aug 15, 2019
  12. Aug 14, 2019
  13. Aug 13, 2019
  14. Aug 09, 2019
  15. Aug 08, 2019
  16. Aug 01, 2019
  17. Jul 31, 2019
  18. Jul 23, 2019
  19. Jul 24, 2019
  20. Jul 23, 2019
  21. Jul 21, 2019