DROWN (CVE-2016-0800)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



> From: openssl-users [mailto:openssl-users-bounces at openssl.org] On Behalf
> Of Scott Neugroschl
> Sent: Wednesday, March 02, 2016 14:11
> To: openssl-users at openssl.org
> Subject: Re: [openssl-users] DROWN (CVE-2016-0800)
> 
> From the linked document:
> 
> "All client sessions are vulnerable if the target server still supports SSLv2
> today, irrespective of whether the client ever supported it"
> 
> I'm trying to understand this.  I am using a custom build of OpenSSL as a
> client, which was configured no-ssl2 and no-ssl3.  My code is
> client-only.  So I am still vulnerable to this if my customer's server is not up to
> date?

*You* are not vulnerable. The *server* may be vulnerable. Sessions between your client and a vulnerable server are vulnerable.

DROWN is an attack on servers that use RSA keys and support SSLv2.

The client cannot prevent this attack - it has to be mitigated at the server end.

-- 
Michael Wojcik
Technology Specialist, Micro Focus




[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux