The OpenSSL Management Committee (OMC) and the OpenSSL Technical Committee
(OTC) are glad to announce our first beta release of OpenSSL 3.1. We consider
this to be a release candidate and as such encourage all OpenSSL users to build
and test against this beta release and provide feedback.
Today we published an
advisory about CVE-2022-3786
(“X.509 Email Address Variable Length Buffer Overflow”) and
CVE-2022-3602 (“X.509 Email Address 4-byte Buffer Overflow”).
Please read the advisory for specific details about these CVEs and how they
might impact you. This blog post will address some common questions that we
expect to be asked about these CVEs.
The configuration of supported groups in TLS servers is important to limit
the resource consumption of the TLS handshakes performed by the server.
This blog post should give system administrators a few useful hints
on how to configure the OpenSSL library and two of the most used
open source HTTP servers which use the OpenSSL library for supporting
the HTTPS protocol.
UPDATE: The post was updated to mention the new CVE-2022-40735 vulnerability.
With the release of OpenSSL 3.0 and the new provider architecture,
some algorithms that were considered legacy by the OpenSSL team at the
time were moved to the legacy provider, to be loaded optionally by
those wishing to still use any of said algorithms.
The OpenSSL Management Committee (OMC) on behalf of the OpenSSL Project
is pleased to announce that the project is partnering with KeyPair Consulting
and Acumen Security to validate OpenSSL to meet the requirements
of the FIPS 140-3 standard.
After 2 years of forced covid break, OpenSSL once again presented at the ICMC22
conference. The conference was a very pleasant meet-up of the community around
cryptography and cryptographic modules. There were a lot of insights, feedback,
and discussions around IT security. OpenSSL gave a talk on the Current Status of
OpenSSL.
OpenSSL is celebrating our FIPS 140-2 certification with a special offer for
our Premium Support Customers by providing access to a free rebranding of the
OpenSSL 3.0 FIPS 140-2 certificate.
The OpenSSL Management Committee on behalf of the OpenSSL Project is pleased to
announce that the OpenSSL 3.0 FIPS Provider has had its FIPS 140-2 validation
certificate
issued by NIST & CSE.
The OpenSSL Technical Committee (OTC) was recently made aware of
several potential attacks against the OpenSSL libraries which might
permit information leakage via the Spectre attack.1 Although there
are currently no known exploits for the Spectre attacks identified,
it is plausible that some of them might be exploitable.
Local side channel attacks, such as these, are outside the scope of
our security policy, however the project generally does introduce
mitigations when they are discovered. In this case, the OTC has decided
that these attacks will not be mitigated by changes to the OpenSSL
code base. The full reasoning behind this is given below.