Blame SOURCES/openssl-fips-0.9.8e-cve-2010-4180.patch

5820f5
*) Disable code workaround for ancient and obsolete Netscape browsers
5820f5
and servers: an attacker can use it in a ciphersuite downgrade attack.
5820f5
Thanks to Martin Rex for discovering this bug. CVE-2010-4180
5820f5
diff -up openssl-fips-0.9.8e/doc/ssl/SSL_CTX_set_options.pod.disable-nsbug openssl-fips-0.9.8e/doc/ssl/SSL_CTX_set_options.pod
5820f5
--- openssl-fips-0.9.8e/doc/ssl/SSL_CTX_set_options.pod.disable-nsbug	2010-12-07 17:45:32.000000000 +0100
5820f5
+++ openssl-fips-0.9.8e/doc/ssl/SSL_CTX_set_options.pod	2010-12-07 17:45:33.000000000 +0100
5820f5
@@ -78,18 +78,7 @@ this breaks this server so 16 bytes is t
5820f5
 
5820f5
 =item SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG
5820f5
 
5820f5
-ssl3.netscape.com:443, first a connection is established with RC4-MD5.
5820f5
-If it is then resumed, we end up using DES-CBC3-SHA.  It should be
5820f5
-RC4-MD5 according to 7.6.1.3, 'cipher_suite'.
5820f5
-
5820f5
-Netscape-Enterprise/2.01 (https://merchant.netscape.com) has this bug.
5820f5
-It only really shows up when connecting via SSLv2/v3 then reconnecting
5820f5
-via SSLv3. The cipher list changes....
5820f5
-
5820f5
-NEW INFORMATION.  Try connecting with a cipher list of just
5820f5
-DES-CBC-SHA:RC4-MD5.  For some weird reason, each new connection uses
5820f5
-RC4-MD5, but a re-connect tries to use DES-CBC-SHA.  So netscape, when
5820f5
-doing a re-connect, always takes the first cipher in the cipher list.
5820f5
+This option has no effect anymore.
5820f5
 
5820f5
 =item SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG
5820f5
 
5820f5
diff -up openssl-fips-0.9.8e/ssl/ssl.h.disable-nsbug openssl-fips-0.9.8e/ssl/ssl.h
5820f5
--- openssl-fips-0.9.8e/ssl/ssl.h.disable-nsbug	2010-12-07 17:45:32.000000000 +0100
5820f5
+++ openssl-fips-0.9.8e/ssl/ssl.h	2010-12-07 17:45:33.000000000 +0100
5820f5
@@ -482,7 +482,7 @@ typedef struct ssl_session_st
5820f5
 #define SSL_OP_NETSCAPE_CHALLENGE_BUG			0x00000002L
5820f5
 /* Allow initial connection to servers that don't support RI */
5820f5
 #define SSL_OP_LEGACY_SERVER_CONNECT			0x00000004L
5820f5
-#define SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG		0x00000008L /* can break some security expectations */
5820f5
+#define SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG		0x00000008L /* no effect anymore */
5820f5
 #define SSL_OP_SSLREF2_REUSE_CERT_TYPE_BUG		0x00000010L
5820f5
 #define SSL_OP_MICROSOFT_BIG_SSLV3_BUFFER		0x00000020L
5820f5
 #define SSL_OP_MSIE_SSLV2_RSA_PADDING			0x00000040L /* no effect since 0.9.7h and 0.9.8b */
5820f5
diff -up openssl-fips-0.9.8e/ssl/s3_clnt.c.disable-nsbug openssl-fips-0.9.8e/ssl/s3_clnt.c
5820f5
--- openssl-fips-0.9.8e/ssl/s3_clnt.c.disable-nsbug	2010-12-07 17:45:32.000000000 +0100
5820f5
+++ openssl-fips-0.9.8e/ssl/s3_clnt.c	2010-12-07 17:45:33.000000000 +0100
5820f5
@@ -752,8 +752,11 @@ int ssl3_get_server_hello(SSL *s)
5820f5
 		s->session->cipher_id = s->session->cipher->id;
5820f5
 	if (s->hit && (s->session->cipher_id != c->id))
5820f5
 		{
5820f5
+/* Workaround is now obsolete */
5820f5
+#if 0
5820f5
 		if (!(s->options &
5820f5
 			SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG))
5820f5
+#endif
5820f5
 			{
5820f5
 			al=SSL_AD_ILLEGAL_PARAMETER;
5820f5
 			SSLerr(SSL_F_SSL3_GET_SERVER_HELLO,SSL_R_OLD_SESSION_CIPHER_NOT_RETURNED);
5820f5
diff -up openssl-fips-0.9.8e/ssl/s3_srvr.c.disable-nsbug openssl-fips-0.9.8e/ssl/s3_srvr.c
5820f5
--- openssl-fips-0.9.8e/ssl/s3_srvr.c.disable-nsbug	2010-12-07 17:46:11.000000000 +0100
5820f5
+++ openssl-fips-0.9.8e/ssl/s3_srvr.c	2010-12-07 17:46:15.000000000 +0100
5820f5
@@ -870,12 +870,14 @@ int ssl3_get_client_hello(SSL *s)
5820f5
 			}
5820f5
 		if (j == 0)
5820f5
 			{
5820f5
+#if 0
5820f5
 			if ((s->options & SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG) && (sk_SSL_CIPHER_num(ciphers) == 1))
5820f5
 				{
5820f5
 				/* Very bad for multi-threading.... */
5820f5
 				s->session->cipher=sk_SSL_CIPHER_value(ciphers, 0);
5820f5
 				}
5820f5
 			else
5820f5
+#endif
5820f5
 				{
5820f5
 				/* we need to have the cipher in the cipher
5820f5
 				 * list if we are asked to reuse it */