Date: Wed, 15 Jul 2015 00:03:12 +0200 From: Markus Vervier <markus.vervier@...xperts.de> To: oss-security@...ts.openwall.com Subject: Re: CVE Request: AWS s2n -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 On 14.07.2015 17:48, Kurt Seifried wrote: > Reminder: Client mode is disabled and won't be enabled until X509 validation is ready. But we can still make improvements and fixes in the meantime. > so I'm not sure this needs a CVE as the code is not yet enabled. Hi Kurt, that is a valid point from you and not for me to decide. Yet with default settings a binary is compiled (bin/s2nc) which will work in client mode when environment variable S2N_ENABLE_CLIENT_MODE=1 is set (as documented). So it is possible several people were tempted to use s2n in client mode already as the client mode code is actually compiled into the lib and useable by default. I guess it depends on your definition of "enabled". Markus -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQEcBAEBCAAGBQJVpYcNAAoJEK9u9A5+VXgeHR0H+wQnDAGMjFmug9ohQ4pibJyZ G2K5fVgQ9AGcjY8S7soimlW3aLiXFo4yhNXhoiJW47y1nOxcipOKc83Mr9j2PCNt X6FFVxFfKShRfDWnaonijbrgM0H/fvqMNtEohk7VFr3PbcRHIb67Xu7gzy0EAzU2 L611K7VMGP0x681+huSX8qNfxHiyvqxgXN4bV8VUj8BHvUyhRpyramOa5KPFtvs1 cFZYBxdEVNw83CRXOY7pmJ4CIiSLEiq900bI1glJpolAmjiP/wlPaakLc7Nq1+wt F9pXdnI+wkgi1OIajdl1CfenBlSI3SiYEQRDH52AiAUMumKpWVgdtQe4A5gTqUo= =rHk5 -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ