OpenSSL Bug
OpenSSL Bug
Because of a security bug in OpenSSL, I updated the version in hMailServer to 1.1.1g and it works.
http://wiki.overbyte.eu/arch/openssl-1.1.1g-win32.zip
I have used this version and replaced the DLLs. I also saw that there were old OpenSSL DLLs with other names which I deleted.
http://wiki.overbyte.eu/arch/openssl-1.1.1g-win32.zip
I have used this version and replaced the DLLs. I also saw that there were old OpenSSL DLLs with other names which I deleted.
Re: OpenSSL Bug
Apparently the openSSL developers do not update the changelogs anymore, makes you wonder what they are doing.... 17 Mar 2020 1.1.1e , 18 Mar 2020 1.1.1f and now 1.1.1g 

CIDR to RegEx: d-fault.nl/CIDRtoRegEx
DNS Lookup: d-fault.nl/DNSTools
DNSBL Lookup: d-fault.nl/DNSBLLookup
GEOIP Lookup: d-fault.nl/GeoipLookup
DNS Lookup: d-fault.nl/DNSTools
DNSBL Lookup: d-fault.nl/DNSBLLookup
GEOIP Lookup: d-fault.nl/GeoipLookup
Re: OpenSSL Bug
Exactly what i meant, you might at least read before you post something.... where the changes from 1.1.1e > 1.1.1f and 1.1.1f to 1.1.1g?
CIDR to RegEx: d-fault.nl/CIDRtoRegEx
DNS Lookup: d-fault.nl/DNSTools
DNSBL Lookup: d-fault.nl/DNSBLLookup
GEOIP Lookup: d-fault.nl/GeoipLookup
DNS Lookup: d-fault.nl/DNSTools
DNSBL Lookup: d-fault.nl/DNSBLLookup
GEOIP Lookup: d-fault.nl/GeoipLookup
Re: OpenSSL Bug
Something you should do yourself.
Ints in the CHANGES file if you download it, as mentioned on the OpenSSL Website.
Changes between 1.1.1f and 1.1.1g [21 Apr 2020]
*) Fixed segmentation fault in SSL_check_chain()
Server or client applications that call the SSL_check_chain() function
during or after a TLS 1.3 handshake may crash due to a NULL pointer
dereference as a result of incorrect handling of the
"signature_algorithms_cert" TLS extension. The crash occurs if an invalid
or unrecognised signature algorithm is received from the peer. This could
be exploited by a malicious peer in a Denial of Service attack.
(CVE-2020-1967)
[Benjamin Kaduk]
*) Added AES consttime code for no-asm configurations
an optional constant time support for AES was added
when building openssl for no-asm.
Enable with: ./config no-asm -DOPENSSL_AES_CONST_TIME
Disable with: ./config no-asm -DOPENSSL_NO_AES_CONST_TIME
At this time this feature is by default disabled.
It will be enabled by default in 3.0.
[Bernd Edlinger]
Changes between 1.1.1e and 1.1.1f [31 Mar 2020]
*) Revert the change of EOF detection while reading in libssl to avoid
regressions in applications depending on the current way of reporting
the EOF. As the existing method is not fully accurate the change to
reporting the EOF via SSL_ERROR_SSL is kept on the current development
branch and will be present in the 3.0 release.
[Tomas Mraz]
- jimimaseye
- Moderator
- Posts: 8864
- Joined: 2011-09-08 17:48
Re: OpenSSL Bug
The intro of the page says:
[Entered by mobile. Excuse my spelling.]
(details behind the link)For other branches, the changelogs are distributed with the source, but are also available here:1.1.1
[Entered by mobile. Excuse my spelling.]
5.7 on test.
SpamassassinForWindows 3.4.0 spamd service
AV: Clamwin + Clamd service + sanesecurity defs : https://www.hmailserver.com/forum/viewtopic.php?f=21&t=26829
SpamassassinForWindows 3.4.0 spamd service
AV: Clamwin + Clamd service + sanesecurity defs : https://www.hmailserver.com/forum/viewtopic.php?f=21&t=26829
Re: OpenSSL Bug
@DravionDravion wrote: ↑2020-04-22 15:58Something you should do yourself.
Ints in the CHANGES file if you download it, as mentioned on the OpenSSL Website.
Changes between 1.1.1f and 1.1.1g [21 Apr 2020]
*) Fixed segmentation fault in SSL_check_chain()
Server or client applications that call the SSL_check_chain() function
during or after a TLS 1.3 handshake may crash due to a NULL pointer
dereference as a result of incorrect handling of the
"signature_algorithms_cert" TLS extension. The crash occurs if an invalid
or unrecognised signature algorithm is received from the peer. This could
be exploited by a malicious peer in a Denial of Service attack.
(CVE-2020-1967)
[Benjamin Kaduk]
*) Added AES consttime code for no-asm configurations
an optional constant time support for AES was added
when building openssl for no-asm.
Enable with: ./config no-asm -DOPENSSL_AES_CONST_TIME
Disable with: ./config no-asm -DOPENSSL_NO_AES_CONST_TIME
At this time this feature is by default disabled.
It will be enabled by default in 3.0.
[Bernd Edlinger]
Changes between 1.1.1e and 1.1.1f [31 Mar 2020]
*) Revert the change of EOF detection while reading in libssl to avoid
regressions in applications depending on the current way of reporting
the EOF. As the existing method is not fully accurate the change to
reporting the EOF via SSL_ERROR_SSL is kept on the current development
branch and will be present in the 3.0 release.
[Tomas Mraz]
Sure, try to make a point by quoting contents of a different document, bravo!
@jimimaseye, thanks...overlooked that link
CIDR to RegEx: d-fault.nl/CIDRtoRegEx
DNS Lookup: d-fault.nl/DNSTools
DNSBL Lookup: d-fault.nl/DNSBLLookup
GEOIP Lookup: d-fault.nl/GeoipLookup
DNS Lookup: d-fault.nl/DNSTools
DNSBL Lookup: d-fault.nl/DNSBLLookup
GEOIP Lookup: d-fault.nl/GeoipLookup
Re: OpenSSL Bug
You looked for the latest Changelog and didn't find it.
You got help and now you are bitching like a little Girl, Nice.
You got help and now you are bitching like a little Girl, Nice.
Re: OpenSSL Bug
@Kelden
Martin has published build using the new openssl 1.1.1g, to be sure openssl libraries are build the proper way, get it here: https://build.hmailserver.com, login as guest and look under artifacts
Martin has published build using the new openssl 1.1.1g, to be sure openssl libraries are build the proper way, get it here: https://build.hmailserver.com, login as guest and look under artifacts
CIDR to RegEx: d-fault.nl/CIDRtoRegEx
DNS Lookup: d-fault.nl/DNSTools
DNSBL Lookup: d-fault.nl/DNSBLLookup
GEOIP Lookup: d-fault.nl/GeoipLookup
DNS Lookup: d-fault.nl/DNSTools
DNSBL Lookup: d-fault.nl/DNSBLLookup
GEOIP Lookup: d-fault.nl/GeoipLookup
Re: OpenSSL Bug
@RvdH & @Dravion
SørenR.
Algorithm (noun.)
Word used by programmers when they do not want to explain what they did.
Algorithm (noun.)
Word used by programmers when they do not want to explain what they did.
Re: OpenSSL Bug
LOL

Maybe you are right, this lockdown is taking far to long and it might start to act on my nerves (a little bit...i hope

CIDR to RegEx: d-fault.nl/CIDRtoRegEx
DNS Lookup: d-fault.nl/DNSTools
DNSBL Lookup: d-fault.nl/DNSBLLookup
GEOIP Lookup: d-fault.nl/GeoipLookup
DNS Lookup: d-fault.nl/DNSTools
DNSBL Lookup: d-fault.nl/DNSBLLookup
GEOIP Lookup: d-fault.nl/GeoipLookup