1. 28 Jan, 2016 2 commits
    • Matt Caswell's avatar
      Prevent small subgroup attacks on DH/DHE · 878e2c5b
      Matt Caswell authored
      
      
      Historically OpenSSL only ever generated DH parameters based on "safe"
      primes. More recently (in version 1.0.2) support was provided for
      generating X9.42 style parameter files such as those required for RFC
      5114 support. The primes used in such files may not be "safe". Where an
      application is using DH configured with parameters based on primes that
      are not "safe" then an attacker could use this fact to find a peer's
      private DH exponent. This attack requires that the attacker complete
      multiple handshakes in which the peer uses the same DH exponent.
      
      A simple mitigation is to ensure that y^q (mod p) == 1
      
      CVE-2016-0701 (fix part 1 of 2)
      
      Issue reported by Antonio Sanso.
      
      Reviewed-by: default avatarViktor Dukhovni <viktor@openssl.org>
      878e2c5b
    • Viktor Dukhovni's avatar
      Better SSLv2 cipher-suite enforcement · d81a1600
      Viktor Dukhovni authored
      
      
      Based on patch by: Nimrod Aviram <nimrod.aviram@gmail.com>
      
      CVE-2015-3197
      
      Reviewed-by: default avatarTim Hudson <tjh@openssl.org>
      Reviewed-by: default avatarRichard Levitte <levitte@openssl.org>
      d81a1600
  2. 22 Jan, 2016 1 commit
  3. 21 Jan, 2016 1 commit
  4. 20 Jan, 2016 2 commits
  5. 19 Jan, 2016 3 commits
  6. 18 Jan, 2016 1 commit
  7. 17 Jan, 2016 1 commit
  8. 15 Jan, 2016 1 commit
  9. 14 Jan, 2016 1 commit
  10. 13 Jan, 2016 6 commits
  11. 12 Jan, 2016 1 commit
  12. 10 Jan, 2016 2 commits
  13. 02 Jan, 2016 1 commit
  14. 28 Dec, 2015 1 commit
  15. 27 Dec, 2015 3 commits
  16. 23 Dec, 2015 1 commit
  17. 22 Dec, 2015 1 commit
  18. 20 Dec, 2015 1 commit
  19. 19 Dec, 2015 6 commits
  20. 18 Dec, 2015 1 commit
  21. 16 Dec, 2015 1 commit
  22. 14 Dec, 2015 2 commits