oss-sec mailing list archives

Re: Truly scary SSL 3.0 vuln to be revealed soon:


From: Krassimir Tzvetanov <maillists () krassi biz>
Date: Tue, 14 Oct 2014 23:32:20 -0700

If I have to complain about something (and this is a general concern not
poodle-centric) it would be that I will be good to get heads up on
vulnerable versions.
Even if no details are released at that time it would be good to have 4
hours heads up. In most circumstances this is not sufficient time to
reverse and start exploiting but would allow responders to enumerate the
products/systems affected and contact the owners.

In a production environment this might mean cancelling planned change
requests and in development environments this might mean preparing the
necessary engineering teams and test environments.

In some cases this will also make it easy for people from other time zones
to have the proper incident managers engaged (provided they have less
senior stuff or automation monitoring this list).

So if you are working with embargoed info consider encouraging the owners
to disclose affected versions prior to the full report.

Best,
Krassimir


On Tue, Oct 14, 2014 at 11:13 PM, mancha <mancha1 () zoho com> wrote:

On Wed, Oct 15, 2014 at 05:28:34AM +0000, Sona Sarmadi wrote:

Hanno was sharing already-public information.

Adam Langley tweeted it at Tue Oct 14 22:28:32 UTC 2014 [1] and Hanno
emailed the news to oss-sec 12 minutes and change later. I didn't check
to see if there were even earlier public disclosures than agl's.

Someone is owed an apology.

--mancha

[1] https://twitter.com/agl__/status/522151998502617088

PS Ugh, top-posting.

Thanks Hanno,

A reflection: Maybe we shouldn't post  information like this here or
somewhere else which is not published yet even if the information has
leak out? Although all members here are reliable but it is still an
open mailing list and we should be careful and act more responsible.

Cheers Sona

It's out:

https://www.openssl.org/~bodo/ssl-poodle.pdf
http://googleonlinesecurity.blogspot.de/2014/10/this-poodle-bites-
exploiting-ssl-30.html

My conclusion stays the same: Disable SSLv3.

-- Hanno Böck http://hboeck.de/

mail/jabber: hanno () hboeck de GPG: BBB51E42


Current thread: