111 Commits

Author SHA1 Message Date
sthen
ce8978925b set --openssldir=/etc/ssl so openssl ports can find cert.pem etc
found by phessler@
2022-11-19 22:26:53 +00:00
tb
3897871979 Update to openssl-1.1.1s
Bugfix release that supposedly also fixes the fixes that were in the
retracted openssl-1.1.1r.
2022-11-01 16:33:02 +00:00
tb
ac4be89012 Update to OpenSSL 3.0.7
Fixes X.509 Email Address Buffer Overflows (CVE-2022-3602, CVE-2022-3786).

In good OpenSSL tradition, they ship ~250 commits since OpenSSL 3.0.5, the
last non-retracted release.

One might wonder how a punycode decoder that overflows on an example string
from the RFC makes it into a cryptographic library released in '21. Compare
test_puny_overrun() with RFC 3492 7.1 (L)... In PR 9654 someone asked about
tests early on - this was dismissed since a handful of cert chains suffices
to exercise a tricky decoder. The review could then focus on more important
things like file placement, license comments, comment formatting and style.
Ignoring a request for turning a magic number into a constant, not even one
of the 127 items on the PR is on the scary code itself.

It is also questionable whether it was really necessary to classify this as
CRITICAL and generate that much panic. It's bad, but not eye-wateringly bad
(disregarding the development process that led to this fiasco.)

Good thing this was at least downgraded to HIGH in the final announcement.
No one will be surprised that there is more than one issue in this code, so
instead of one CRITICAL issues, we get two HIGH ones. Sounds fair.

https://www.openssl.org/news/secadv/20221101.txt
https://www.openssl.org/news/secadv/20221101b.txt
2022-11-01 16:00:10 +00:00
tb
aa353bde7e openssl/3.0: regen patch 2022-10-31 15:55:58 +00:00
tb
2a3e346bdb Bump REVISION of ports depending on security/openssl/{1.1,3.0} 2022-10-12 16:15:02 +00:00
tb
bde409afec Downgrade to OpenSSL 1.1.1q and 3.0.5. With help/ok sthen
The OpenSSL 1.1.1r and 3.0.6 releases have been withdrawn.  Apparently
there is a regression that isn't security relevant but bad enough for
them to recommend to downgrade. If failure to encrypt is LOW severity,
no-one knows how bad things actually are... What a mess.

https://marc.info/?l=openssl-announce&m=166558438331847&w=2
2022-10-12 16:14:01 +00:00
tb
2c9d6c5fa9 Security/bugfix update to OpenSSL 3.0.6
One low severity issue related to EVP_CIPHER_meth_new() was fixed.
https://www.openssl.org/news/secadv/20221011.txt
2022-10-11 14:59:39 +00:00
tb
ba9b09fe36 Bugfix update to OpenSSL 1.1.1r 2022-10-11 14:49:25 +00:00
tb
d5a9b0daee Update to OpenSSL 3.0.5
The OpenSSL 3.0.4 release introduced a serious bug in the RSA implementation
for X86_64 CPUs supporting the AVX512IFMA instructions.

https://www.openssl.org/news/secadv/20220705.txt
2022-07-05 10:57:27 +00:00
tb
cf31dfb8f6 Update to OpenSSL 1.1.1q
Fixed AES OCB failure to encrypt some bytes on 32-bit x86 platforms
https://www.openssl.org/news/vulnerabilities.html
2022-07-05 10:49:23 +00:00
sthen
7412d928a8 tweak comments (noop) 2022-06-28 10:09:24 +00:00
sthen
c559076ca3 add some comments to security/openssl Makefile.inc requesting that porters
1) don't use openssl unless really needed (either a port requires something
which is particularly openssl-specific, or there is some other special reason),
and 2) add some comments to the port explaining why libressl isn't used.

in the normal case ports should use libressl. don't just use openssl to avoid
a few patches because of stupid version detection ifdefs.
2022-06-26 14:06:51 +00:00
sthen
0125c21742 Add notes about why these ports use security/openssl 2022-06-26 13:40:59 +00:00
sthen
f9eb4fd22a postfix now uses this (static-linked) so add a reminder to bump postfix revision if updating 2022-06-23 13:22:48 +00:00
tb
283eba41b1 Update to OpenSSL 3.0.4
c_rehash needed more fixing:
https://www.openssl.org/news/secadv/20220621.txt
2022-06-21 14:47:13 +00:00
tb
34a9bdb049 Update to OpenSSL 1.1.1p
c_rehash needed more fixing:
https://www.openssl.org/news/secadv/20220621.txt
2022-06-21 14:46:14 +00:00
sthen
2034188a5b update to libretls-3.5.2 2022-05-14 13:56:36 +00:00
tb
678cbcf4a0 OpenSSL 3.0: missed minor bump due to addition of OPENSSL_str{,n}casecmp() 2022-05-03 15:45:56 +00:00
tb
6c8dd7382a OpenSSL 1.1: bump to be ahead of -stable 2022-05-03 15:28:19 +00:00
tb
4713b8f617 OpenSSL 3.0: bump to be ahead of -stable 2022-05-03 15:27:52 +00:00
tb
5d93a521de Update to OpenSSL 1.1.1o
c_rehash command injection
https://www.openssl.org/news/secadv/20220503.txt
2022-05-03 15:14:28 +00:00
tb
b35a7fb04e Update to openssl 3.0.3
c_rehash command injection, OCSP basic verify, and a few low severity
issues.

https://www.openssl.org/news/secadv/20220503.txt
2022-05-03 15:13:11 +00:00
tb
f612339fa2 openssl/3.0: bump to be ahead of -stable 2022-03-15 17:05:38 +00:00
tb
91d0ba5061 openssl/1.1: bump to be above -stable 2022-03-15 17:00:30 +00:00
tb
7c3d50d92e Update to OpenSSL 3.0.2
https://www.openssl.org/news/secadv/20220315.txt
Infinite loop in BN_mod_sqrt()
2022-03-15 16:39:33 +00:00
tb
144b5c6811 Update to OpenSSL 1.1.1n
https://www.openssl.org/news/secadv/20220315.txt
Infinite loop in BN_mod_sqrt()
2022-03-15 16:38:36 +00:00
naddy
8c0294c2fa drop RCS Ids 2022-03-11 19:53:16 +00:00
sthen
2b5e58302c update to libretls-3.5.0 2022-02-28 12:48:04 +00:00
sthen
8291d2b86a update to openssl-3.0.1
https://www.openssl.org/news/secadv/20211214.txt
Invalid handling of X509_verify_cert() internal errors in libssl (CVE-2021-4044)
2021-12-14 18:16:54 +00:00
sthen
435df47f92 update to openssl-1.1.1m 2021-12-14 17:40:08 +00:00
sthen
bce1babcfd update to libretls-3.4.2 2021-11-30 09:15:47 +00:00
sthen
9da66f6821 update to libretls-3.4.1 2021-10-16 07:44:36 +00:00
claudio
d341819ea8 Hook up libretls.
OK sthen@
2021-09-16 08:58:31 +00:00
claudio
1eb37824de Add libretls to the openssl libs. This allows to use OpenSSL 1.1 libs
with programs like rpki-client to test interop.
This port is for testing purposes only!
With help and OK sthen@
2021-09-13 09:51:31 +00:00
tb
48b65d28b4 Update to OpenSSL 3.0.0, ok sthen
Includes a format string fix for 64 bit time_t.
2021-09-07 21:27:30 +00:00
tb
32d608f037 openssl/sslscan: avoid printf %n, ok sthen
Note: OpenSSL still uses its own *printf() implementation, so this
would not result in a runtime failure.
2021-09-07 20:54:33 +00:00
tb
4e3345b2af update to openssl-1.1.1l, looked over by sthen 2021-08-25 03:48:01 +00:00
sthen
9787da174f add openssl 3.0.0-beta1 2021-07-07 23:50:58 +00:00
kn
0ecfad10d9 Enable s_client(1) and s_server(1) "-trace" option
Changes between 1.0.1l and 1.0.2 [22 Jan 2015]
...
*) SSL/TLS tracing code. This parses out SSL/TLS records using the
   message callback and prints the results. Needs compile time option
   "enable-ssl-trace". New options to s_client and s_server to enable
   tracing.
   [Steve Henson]

It is especially handy when looking at TLS handshakes, e.g. to try
figure out why nc(1)/libtls TLSv1.3 fails but openssl(1)/libssl doesn't.

LibreSSL's openssl(1) has
    -msg
        Show all protocol messages with hex dump.

but it is not as nearly insightful as OpenSSL's s_client(1)
    -trace
        Show verbose trace output of protocol messages. OpenSSL needs
        to be compiled with enable-ssl-trace for this option to work.


Upstream enabled "ssl-trace" by default as of 10.06.2021, see commit
726f92e016bac53175ed5d5321bce1ddf6b207d6.

Feedback sthen tb
OK tb
2021-06-24 15:26:09 +00:00
sthen
1e85553ac5 update to openssl-1.1.1k 2021-03-25 14:54:12 +00:00
sthen
6c0ddcb8e2 update to OpenSSL 1.1.1.j
- Fixed a NULL pointer deref in the X509_issuer_and_serial_hash()
function (CVE-2021-23841)

- Fixed the RSA_padding_check_SSLv23() function and the
RSA_SSLV23_PADDING padding mode to correctly check for rollback attacks

- Fixed an overflow in the EVP_CipherUpdate, EVP_EncryptUpdate and
EVP_DecryptUpdate functions (CVE-2021-23840)

- Fixed SRP_Calc_client_key so that it runs in constant time
2021-02-16 17:10:06 +00:00
tb
db0e16d257 security/openssl/1.0.2: fix alignment issue on sparc64
As diagnosed by kettenis, running the regress/lib/libssl/interop/openssl
test results in a SIGILL or SIGBUS due to an alignment issue. The reason
for this is that the configure magic fails to pick up -m64 which is
needed for the perlasm to generate the correct flavor of assembly.

None of the approaches for setting variables in the main port Makefile
worked.  Since we already patch out -O3 from Configure, I added -m64
there. The resulting binary seems to work well. The interop tests on
sparc64 pass with this patch.

Many thanks to kettenis for figuring this out and to sthen who helped
me save a lot of time with FLAVOR=no_man.

ok sthen
2021-01-07 21:55:33 +00:00
sthen
399e9c0aa0 add a no_man flavour to openssl packages, to speed testing of patches
etc (avoids pod2man of ~1700 files for 1.0 / ~4k files for 1.1)
2021-01-07 20:13:47 +00:00
sthen
f0fafcce6a skip generating html docs in the first place, rather than generating
them (with pod2html) and rm'ing.
2021-01-07 19:53:27 +00:00
sthen
9d5c13e71c update DESCR; warn about conflicts if the library is used with software
where other library dependencies use libressl.
2021-01-06 22:34:13 +00:00
sthen
ad9d69085d add a comment reminding to bump security/sslscan, suggested by phessler 2020-12-22 15:02:26 +00:00
sthen
5e5a0c45d7 update to openssl-1.1.1i, notable fixes:
- Fixed NULL pointer deref in the GENERAL_NAME_cmp function, CVE-2020-1971

- In 1.1.1h, an expired trusted (root) certificate was not anymore rejected
when validating a certificate path.
2020-12-08 14:57:47 +00:00
sthen
23f20bca78 doh, i fail at #ifdef. actually fix previous issue. 2020-12-03 11:58:48 +00:00
sthen
4e76066bb6 add a comment about the IPV6_V6ONLY patch:
On OpenBSD, setsockopt(sock, IPPROTO_IPV6, IPV6_V6ONLY, ...) only allows
setting to 1 (which is the default anyway). Setting to 0 results in EINVAL.

This doesn't fix everything, there are still some other problems with binds
to v6 addresses with OpenSSL 1.1 on OpenBSD.
2020-12-03 11:38:42 +00:00
sthen
0d261c0365 openssl/1.1: don't try using IPV6_V6ONLY which does EINVAL on OpenBSD
found while looking at https://marc.info/?t=160692394000004&r=1&w=2
issue in net/nagios/nsca-ng (but doesn't fix the problem)
2020-12-02 17:32:50 +00:00