Go to file
David Benjamin 8545051c36 Guard against DoS in name constraints handling.
This guards against the name constraints check consuming large amounts
of CPU time when certificates in the presented chain contain an
excessive number of names (specifically subject email names or subject
alternative DNS names) and/or name constraints.

Name constraints checking compares the names presented in a certificate
against the name constraints included in a certificate higher up in the
chain using two nested for loops.

Move the name constraints check so that it happens after signature
verification so peers cannot exploit this using a chain with invalid
signatures. Also impose a hard limit on the number of name constraints
check loop iterations to further mitigate the issue.

Thanks to NCC for finding this issue. Fix written by Martin Kreichgauer.

Reviewed-by: Rich Salz <rsalz@openssl.org>
Reviewed-by: Andy Polyakov <appro@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/4393)
2017-09-22 22:00:55 +02:00
.github
Configurations Configure: unify clang's -Qunused-arguments option treatment. 2017-09-21 22:33:46 +02:00
VMS Simplify the handling of shared library version numbers 2017-07-26 22:53:03 +02:00
apps Reenable s_server -dhparam option 2017-09-21 07:44:24 -05:00
boringssl@2070f8ad91
crypto Guard against DoS in name constraints handling. 2017-09-22 22:00:55 +02:00
demos Demo style fixes and modernisation. 2017-07-13 07:34:40 +10:00
doc Provide getters for min/max proto version 2017-09-15 10:04:47 -05:00
engines Add predicatable RAND_METHOD to test ENGINE 2017-08-06 19:24:32 +01:00
external/perl
fuzz Stack sorting safety 2017-09-18 12:17:18 +10:00
include Provide getters for min/max proto version 2017-09-15 10:04:47 -05:00
krb5@b9ad6c4950
ms
os-dep
pyca-cryptography@c1f8e46033 Update pyca-cryptography to latest commit 2017-08-11 11:16:44 +10:00
ssl Cleanup whitespace in ssl_lib.c (tabs to spaces) 2017-09-21 23:42:10 +02:00
test Guard against DoS in name constraints handling. 2017-09-22 22:00:55 +02:00
tools
util Provide getters for min/max proto version 2017-09-15 10:04:47 -05:00
.gitattributes
.gitignore
.gitmodules
.travis-apt-pin.preferences
.travis-create-release.sh
.travis.yml Add echo for end of each build phase 2017-07-04 16:23:59 -04:00
ACKNOWLEDGEMENTS
AUTHORS
CHANGES Implement Aria GCM/CCM Modes and TLS cipher suites 2017-08-30 12:33:53 +02:00
CONTRIBUTING
Configure Configure: unify clang's -Qunused-arguments option treatment. 2017-09-21 22:33:46 +02:00
FAQ
INSTALL Fix description of how to report a bug in INSTALL 2017-08-25 14:16:20 +01:00
LICENSE
Makefile.shared Makefile.shared: Make link_shlib.linux-shared less verbose again 2017-07-24 11:57:44 +02:00
NEWS STORE: Add an entry in NEWS and CHANGES 2017-06-29 11:55:33 +02:00
NOTES.DJGPP
NOTES.PERL
NOTES.UNIX
NOTES.VMS
NOTES.WIN Various doc fixes. 2017-07-26 23:09:40 -04:00
README
README.ECC
README.ENGINE
README.FIPS
appveyor.yml
build.info Simplify the handling of shared library version numbers 2017-07-26 22:53:03 +02:00
config config: get "stty technique" working again on MacOS X. 2017-09-02 20:49:47 +02:00
config.com
e_os.h struct timeval include guards 2017-09-01 09:55:43 +10:00

README

 OpenSSL 1.1.1-dev

 Copyright (c) 1998-2016 The OpenSSL Project
 Copyright (c) 1995-1998 Eric A. Young, Tim J. Hudson
 All rights reserved.

 DESCRIPTION
 -----------

 The OpenSSL Project is a collaborative effort to develop a robust,
 commercial-grade, fully featured, and Open Source toolkit implementing the
 Transport Layer Security (TLS) protocols (including SSLv3) as well as a
 full-strength general purpose cryptographic library.

 OpenSSL is descended from the SSLeay library developed by Eric A. Young
 and Tim J. Hudson.  The OpenSSL toolkit is licensed under a dual-license (the
 OpenSSL license plus the SSLeay license), which means that you are free to
 get and use it for commercial and non-commercial purposes as long as you
 fulfill the conditions of both licenses.

 OVERVIEW
 --------

 The OpenSSL toolkit includes:

 libssl (with platform specific naming):
     Provides the client and server-side implementations for SSLv3 and TLS.

 libcrypto (with platform specific naming):
     Provides general cryptographic and X.509 support needed by SSL/TLS but
     not logically part of it.

 openssl:
     A command line tool that can be used for:
        Creation of key parameters
        Creation of X.509 certificates, CSRs and CRLs
        Calculation of message digests
        Encryption and decryption
        SSL/TLS client and server tests
        Handling of S/MIME signed or encrypted mail
        And more...

 INSTALLATION
 ------------

 See the appropriate file:
        INSTALL         Linux, Unix, Windows, OpenVMS, ...
        NOTES.*         INSTALL addendums for different platforms

 SUPPORT
 -------

 See the OpenSSL website www.openssl.org for details on how to obtain
 commercial technical support. Free community support is available through the
 openssl-users email list (see
 https://www.openssl.org/community/mailinglists.html for further details).

 If you have any problems with OpenSSL then please take the following steps
 first:

    - Download the latest version from the repository
      to see if the problem has already been addressed
    - Configure with no-asm
    - Remove compiler optimisation flags

 If you wish to report a bug then please include the following information
 and create an issue on GitHub:

    - OpenSSL version: output of 'openssl version -a'
    - Any "Configure" options that you selected during compilation of the
      library if applicable (see INSTALL)
    - OS Name, Version, Hardware platform
    - Compiler Details (name, version)
    - Application Details (name, version)
    - Problem Description (steps that will reproduce the problem, if known)
    - Stack Traceback (if the application dumps core)

 Just because something doesn't work the way you expect does not mean it
 is necessarily a bug in OpenSSL. Use the openssl-users email list for this type
 of query.

 HOW TO CONTRIBUTE TO OpenSSL
 ----------------------------

 See CONTRIBUTING

 LEGALITIES
 ----------

 A number of nations restrict the use or export of cryptography. If you
 are potentially subject to such restrictions you should seek competent
 professional legal advice before attempting to develop or distribute
 cryptographic code.