mod_ssl timing based attack
A timing attack on RSA keys exists, to which OpenSSL is vulnerable, unless RSA
blinding has been turned on. With this package, mod_ssl is secured even if OpenSSL is
not.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
[slackware-security] mod_ssl RSA blinding fixes (SSA:2003-141-05)
An upgrade for mod_ssl to version 2.8.14_1.3.27 is now available.
This version provides RSA blinding by default which prevents an
extended timing analysis from revealing details of the secret key
to an attacker. Note that this problem was already fixed within
OpenSSL, so this is a "double fix". With this package, mod_ssl
is secured even if OpenSSL is not.
We recommend sites using mod_ssl upgrade to this new package.
Here are the details from the Slackware 9.0 ChangeLog:
+--------------------------+
Tue May 20 2009 PDT 2003
patches/packages/mod_ssl-2.8.14_1.3.27-i386-1.tgz: Upgraded to
mod_ssl-2.8.14_1.3.27. Includes RSA blinding fixes.
(* Security fix *)
+--------------------------+
WHERE TO FIND THE NEW PACKAGES:
+-----------------------------+
Updated package for Slackware 9.0:
ftp://ftp.slackware.com/pub/slackwar....27-i386-1.tgz
MD5 SIGNATURES:
+-------------+
Slackware 9.0 package:
2888ecec5e2116be81b5295fc477869b mod_ssl-2.8.14_1.3.27-i386-1.tgz
INSTALLATION INSTRUCTIONS:
+------------------------+
First, shut down your web server:
# apachectl stop
Then upgrade using upgradepkg (as root):
upgradepkg mod_ssl-2.8.14_1.3.27-i386-1.tgz
Finally, restart secure web services:
# apachectl startssl
+-----+
Slackware Linux Security Team
http://slackware.com/gpg-key
[email protected]
+------------------------------------------------------------------------+
| HOW TO REMOVE YOURSELF FROM THIS MAILING LIST: |
+------------------------------------------------------------------------+
| Send an email to [email protected] with this text in the body of |
| the email message: |
| |
| unsubscribe slackware-security |
| |
| You will get a confirmation message back. Follow the instructions to |
| complete the unsub******ion. Do not reply to this message to |
| unsubscribe! |
+------------------------------------------------------------------------+
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)
iD8DBQE+zBCIakRjwEAQIjMRApK5AJ9MQaXY1zM+sB65F+01L3 1jBY+WEwCdHt5q
MNjPi+EFkCpcS4ba0qwZZHg=
=HMFX
-----END PGP SIGNATURE-----
A timing attack on RSA keys exists, to which OpenSSL is vulnerable, unless RSA
blinding has been turned on. With this package, mod_ssl is secured even if OpenSSL is
not.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
[slackware-security] mod_ssl RSA blinding fixes (SSA:2003-141-05)
An upgrade for mod_ssl to version 2.8.14_1.3.27 is now available.
This version provides RSA blinding by default which prevents an
extended timing analysis from revealing details of the secret key
to an attacker. Note that this problem was already fixed within
OpenSSL, so this is a "double fix". With this package, mod_ssl
is secured even if OpenSSL is not.
We recommend sites using mod_ssl upgrade to this new package.
Here are the details from the Slackware 9.0 ChangeLog:
+--------------------------+
Tue May 20 2009 PDT 2003
patches/packages/mod_ssl-2.8.14_1.3.27-i386-1.tgz: Upgraded to
mod_ssl-2.8.14_1.3.27. Includes RSA blinding fixes.
(* Security fix *)
+--------------------------+
WHERE TO FIND THE NEW PACKAGES:
+-----------------------------+
Updated package for Slackware 9.0:
ftp://ftp.slackware.com/pub/slackwar....27-i386-1.tgz
MD5 SIGNATURES:
+-------------+
Slackware 9.0 package:
2888ecec5e2116be81b5295fc477869b mod_ssl-2.8.14_1.3.27-i386-1.tgz
INSTALLATION INSTRUCTIONS:
+------------------------+
First, shut down your web server:
# apachectl stop
Then upgrade using upgradepkg (as root):
upgradepkg mod_ssl-2.8.14_1.3.27-i386-1.tgz
Finally, restart secure web services:
# apachectl startssl
+-----+
Slackware Linux Security Team
http://slackware.com/gpg-key
[email protected]
+------------------------------------------------------------------------+
| HOW TO REMOVE YOURSELF FROM THIS MAILING LIST: |
+------------------------------------------------------------------------+
| Send an email to [email protected] with this text in the body of |
| the email message: |
| |
| unsubscribe slackware-security |
| |
| You will get a confirmation message back. Follow the instructions to |
| complete the unsub******ion. Do not reply to this message to |
| unsubscribe! |
+------------------------------------------------------------------------+
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)
iD8DBQE+zBCIakRjwEAQIjMRApK5AJ9MQaXY1zM+sB65F+01L3 1jBY+WEwCdHt5q
MNjPi+EFkCpcS4ba0qwZZHg=
=HMFX
-----END PGP SIGNATURE-----
Comment