Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 15 Jul 2015 00:03:12 +0200
From: Markus Vervier <markus.vervier@...xperts.de>
To: oss-security@...ts.openwall.com
Subject: Re: CVE Request: AWS s2n


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

On 14.07.2015 17:48, Kurt Seifried wrote:
> Reminder: Client mode is disabled and won't be enabled until X509 validation is ready. But we
can still make improvements and fixes in the meantime.
> so I'm not sure this needs a CVE as the code is not yet enabled.
Hi Kurt,

that is a valid point from you and not for me to decide.
Yet with default settings a binary is compiled (bin/s2nc) which will
work in client mode when environment variable S2N_ENABLE_CLIENT_MODE=1
is set (as documented). So it is possible several people were tempted to
use s2n in client mode already as the client mode code is actually
compiled into the lib and useable by default.
I guess it depends on your definition of "enabled".

Markus
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQEcBAEBCAAGBQJVpYcNAAoJEK9u9A5+VXgeHR0H+wQnDAGMjFmug9ohQ4pibJyZ
G2K5fVgQ9AGcjY8S7soimlW3aLiXFo4yhNXhoiJW47y1nOxcipOKc83Mr9j2PCNt
X6FFVxFfKShRfDWnaonijbrgM0H/fvqMNtEohk7VFr3PbcRHIb67Xu7gzy0EAzU2
L611K7VMGP0x681+huSX8qNfxHiyvqxgXN4bV8VUj8BHvUyhRpyramOa5KPFtvs1
cFZYBxdEVNw83CRXOY7pmJ4CIiSLEiq900bI1glJpolAmjiP/wlPaakLc7Nq1+wt
F9pXdnI+wkgi1OIajdl1CfenBlSI3SiYEQRDH52AiAUMumKpWVgdtQe4A5gTqUo=
=rHk5
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ