请输入您要查询的百科知识:

 

词条 OpenSSL
释义

  1. Project history

  2. Major version releases

  3. Algorithms

  4. FIPS 140-2 compliance

  5. Licensing

  6. Notable vulnerabilities

      Timing attacks on RSA Keys    Denial of Service ASN.1 parsing    OCSP stapling vulnerability    ASN.1 BIO vulnerability    SSL, TLS and DTLS Plaintext Recovery Attack    Predictable private keys (Debian-specific)    {{anchor|Heartbleed bug}}Heartbleed    {{anchor|CVE-2014-0224}}CCS Injection Vulnerability    {{anchor|CVE-2015-0291}}ClientHello sigalgs DoS    {{anchor|CVE-2016-0701}}Key Recovery Attack on Diffie Hellman small subgroups  

  7. Forks

      {{Anchor|assl}}Agglomerated SSL    LibreSSL    {{Anchor|BORINGSSL}}BoringSSL  

  8. See also

  9. References

  10. External links

{{Distinguish|OpenSSH}}{{Infobox software
| name = OpenSSL
| logo = OpenSSL logo.png
| developer = The OpenSSL Project
| released = 1998
| operating_system =
| programming_language = C, assembly, Perl
| genre = Cryptography library
| license = Apache License v2.0[1]
| website = {{URL|https://www.openssl.org/}}
}}

OpenSSL is a software library for applications that secure communications over computer networks against eavesdropping or need to identify the party at the other end. It is widely used in Internet web servers, serving a majority of all web sites.

OpenSSL contains an open-source implementation of the SSL and TLS protocols. The core library, written in the C programming language, implements basic cryptographic functions and provides various utility functions. Wrappers allowing the use of the OpenSSL library in a variety of computer languages are available.

The OpenSSL Software Foundation (OSF) represents the OpenSSL project in most legal capacities including contributor license agreements, managing donations, and so on. OpenSSL Software Services (OSS) also represents the OpenSSL project, for Support Contracts.

Versions are available for most Unix and Unix-like operating systems (including Solaris, Linux, macOS, QNX, and the various open-source BSD operating systems), OpenVMS and Microsoft Windows.

Project history

The OpenSSL project was founded in 1998 to provide a free set of encryption tools for the code used on the Internet. It is based on a fork of SSLeay by Eric Andrew Young and Tim Hudson, which unofficially ended development on December 17, 1998, when Young and Hudson both went to work for RSA Security. The initial founding members were Mark Cox, Ralf Engelschall, Stephen Henson, Ben Laurie, and Paul Sutton.[2]

The OpenSSL management committee currently consists of 7 people.[3]

There are 13 developers[4] with commit access (many of whom are also part of the OpenSSL management committee).

There are only two full-time employees (fellows) and the remainder are volunteers.

The project has a budget of less than one million USD per year and relies primarily on donations. Development of TLS 1.3 is sponsored by Akamai.[5]

Major version releases

OpenSSL release history[6][7]
Version Original release date Comment Last minor version
o |0.9.1}} December 23, 1998
  • Official start of the OpenSSL project
0.9.1c (December 23, 1998)
o |0.9.2}} March 22, 1999
  • Successor of 0.9.1c
0.9.2b (April 6, 1999)
o |0.9.3}} May 25, 1999
  • Successor of 0.9.2b
0.9.3a (May 27, 1999)
o |0.9.4}} August 9, 1999
  • Successor of 0.9.3a
0.9.4 (August 9, 1999)
o |0.9.5}} February 28, 2000
  • Successor of 0.9.4
0.9.5a (April 1, 2000)
o |0.9.6}} September 24, 2000
  • Successor of 0.9.5a
0.9.6m (March 17, 2004)
o |0.9.7}} December 31, 2002
  • Successor of 0.9.6m
0.9.7m (February 23, 2007)
o |0.9.8}} July 5, 2005
  • Successor of 0.9.7m
0.9.8zh (December 3, 2015)
o |1.0.0}} March 29, 2010
  • Successor of 0.9.8n
1.0.0t (December 3, 2015)
o |1.0.1}}[8] March 14, 2012
  • Successor of 1.0.0
  • Supported until December 31, 2016
  • RFC 6520 TLS/DTLS heartbeat support.
  • SCTP support.
  • RFC 5705 TLS key material exporter.
  • RFC 5764 DTLS-SRTP negotiation.
  • Next Protocol Negotiation.
  • PSS signatures in certificates, requests and certificate revocation lists (CRL)s.
  • Support for password based recipient info for CMS.
  • Support TLS v1.2 and TLS v1.1.
  • Preliminary FIPS capability for unvalidated 2.0 FIPS module.
  • Secure Remote Password protocol (SRP) support.
1.0.1u (September 22, 2016)
co |1.0.2}}[9] January 22, 2015
  • Successor of 1.0.1
  • Supported until December 31, 2019 (Long Term Support)
  • Suite B support for TLS 1.2 and DTLS 1.2
  • Support for DTLS 1.2
  • TLS automatic elliptic curve (EC) curve selection.
  • API to set TLS supported signature algorithms and curves
  • SSL_CONF configuration API.
  • TLS Brainpool support.
  • ALPN support.
  • CMS support for RSA-PSS, RSA-OAEP, ECDH and X9.42 DH.
1.0.2r (February 26, 2019)
co|1.1.0}}[10] August 25, 2016
  • Successor of 1.0.2h
  • Supported until ~September 2019 [11]
  • Support for BLAKE2 (RFC 7693)
  • Support for ChaCha20-Poly1305 (RFC 7539)
  • Support for X25519 (RFC 7748)
  • Support for DANE and Certificate Transparency
  • Support for CCM Ciphersuites
  • Support for extended master secret
  • SSLv2 removed
  • Kerberos ciphersuite support removed
  • RC4 and 3DES removed from DEFAULT ciphersuites in libssl
  • Remove DSS, SEED, IDEA, CAMELLIA, and AES-CCM from the DEFAULT cipherlist.
  • 40 and 56 bit cipher support removed from libssl
1.1.0j (November 20, 2018)
c|1.1.1}}[11] September 11, 2018
  • Supported "for at least five years" (circa September 2023)[12]
  • Support for TLS1.3.[13][14]
  • Support for SHA-3
  • Support for X448 and Ed448 (RFC 7748)
  • Support for SipHash
  • Support for ARIA
  • Support for multi-prime RSA (RFC 8017)
  • Support for SM2, SM3 and SM4
  • Heartbeat removed
  • QNX support removed
1.1.1b (February 26, 2019)
{{Version |l |show=111111}}

Algorithms

OpenSSL supports a number of different cryptographic algorithms:

//Cipher">Ciphers:

AES, Blowfish, Camellia, Chacha20, Poly1305, SEED, CAST-128, DES, IDEA, RC2, RC4, RC5, Triple DES, GOST 28147-89,[15] SM4

//Cryptographic hash function">Cryptographic hash functions:

MD5, MD4, MD2, SHA-1, SHA-2, SHA-3, RIPEMD-160, MDC-2, GOST R 34.11-94,[15] BLAKE2, Whirlpool,[16] SM3

//Public-key cryptography">Public-key cryptography:

RSA, DSA, Diffie–Hellman key exchange, Elliptic curve, X25519, Ed25519, X448, Ed448, GOST R 34.10-2001,[15] SM2

(Perfect forward secrecy is supported using elliptic curve Diffie–Hellman since version 1.0.[17])

FIPS 140-2 compliance

{{As of|2012|12}}, OpenSSL is one of two open source programs involved in validation under the FIPS 140-2 computer security standard by the National Institute of Standards and Technology's (NIST) Cryptographic Module Validation Program (CMVP).[18] (OpenSSL itself is not validated, but a component called the OpenSSL FIPS Object Module, based on OpenSSL, was created to provide many of the same capabilities).[19]

A certificate was first awarded in January 2006 but revoked in July 2006 "when questions were raised about the validated module's interaction with outside software." The certification was reinstated in February 2007.[20]

Licensing

OpenSSL is double licensed under the OpenSSL License and the SSLeay License, which means that the terms of both licenses apply.[21] The OpenSSL License is Apache License 1.0 and SSLeay License bears some similarity to a 4-clause BSD License.

As the OpenSSL License is Apache License 1.0, but not Apache License 2.0, it requires the phrase "this product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit" to appear in advertising material and any redistributions (Sections 3 and 6 of the OpenSSL License). Due to this restriction, the OpenSSL License and the Apache License 1.0 are incompatible with the GPL.[22]

Some GPL developers have added an OpenSSL exception to their licenses that specifically permits using OpenSSL with their system. GNU Wget and climm both use such exceptions.[23][24] Some packages (like Deluge) explicitly modify the GPL license by adding an extra section at the beginning of the license documenting the exception.[25] Other packages use the LGPL-licensed GnuTLS and MPL-licensed NSS, which both perform the same task.

OpenSSL announced in August 2015 that it would require most contributors to sign a Contributor License Agreement (CLA), and that OpenSSL would eventually be relicensed under the terms of Apache License 2.0.[26] This process commenced in March 2017.[27]

Notable vulnerabilities

Timing attacks on RSA Keys

On March 14, 2003, a timing attack on RSA keys was discovered, indicating a vulnerability within OpenSSL versions 0.9.7a and 0.9.6. This vulnerability was assigned the identifier CAN-2003-0147 by the Common Vulnerabilities and Exposures (CVE) project. RSA blinding was not turned on by default by OpenSSL, since it is not easily possible to when providing SSL or TLS using OpenSSL.

Denial of Service ASN.1 parsing

OpenSSL 0.9.6k had a bug where certain ASN.1 sequences triggered a large number of recursions on Windows machines, discovered on November 4, 2003. Windows could not handle large recursions correctly, so OpenSSL would crash as a result. Being able to send arbitrary large numbers of ASN.1 sequences would cause OpenSSL to crash as a result.

OCSP stapling vulnerability

When creating a handshake, the client could send an incorrectly formatted ClientHello message, leading to OpenSSL parsing more than the end of the message. Assigned the identifier CVE-2011-0014 by the CVE project, this affected all OpenSSL versions 0.9.8h to 0.9.8q and OpenSSL 1.0.0 to 1.0.0c. Since the parsing could lead to a read on an incorrect memory address, it was possible for the attacker to cause a DoS. It was also possible that some applications expose the contents of parsed OCSP extensions, leading to an attacker being able to read the contents of memory that came after the ClientHello.[28]

ASN.1 BIO vulnerability

When using Basic Input/Output (BIO)[29] or FILE based functions to read untrusted DER format data, OpenSSL is vulnerable. This vulnerability was discovered on April 19, 2012, and was assigned the CVE identifier CVE-2012-2110. While not directly affecting the SSL/TLS code of OpenSSL, any application that was using ASN.1 functions (particularly d2i_X509 and d2i_PKCS12) were also not affected.[30]

SSL, TLS and DTLS Plaintext Recovery Attack

In handling CBC cipher-suites in SSL, TLS, and DTLS, OpenSSL was found vulnerable to a timing attack during the MAC processing. Nadhem Alfardan and Kenny Paterson discovered the problem, and published their findings[31] on February 5, 2013. The vulnerability was assigned the CVE identifier CVE-2013-0169.

Predictable private keys (Debian-specific)

OpenSSL's pseudo-random number generator acquires entropy using complex programming methods. To keep the Valgrind analysis tool from issuing associated warnings, a maintainer of the Debian distribution applied a patch to the Debian's variant of the OpenSSL suite, which inadvertently broke its random number generator by limiting the overall number of private keys it could generate to 32,768.[32][33] The broken version was included in the Debian release of September 17, 2006 (version 0.9.8c-1), also compromising other Debian-based distributions, for example Ubuntu. Ready-to-use exploits are easily available.[34]

The error was reported by Debian on May 13, 2008. On the Debian 4.0 distribution (etch), these problems were fixed in version 0.9.8c-4etch3, while fixes for the Debian 5.0 distribution (lenny) were provided in version 0.9.8g-9.[35]

{{anchor|Heartbleed bug}}Heartbleed

{{Main article|Heartbleed}}

OpenSSL versions 1.0.1 through 1.0.1f had a severe memory handling bug in their implementation of the TLS Heartbeat Extension that could be used to reveal up to 64 KB of the application's memory with every heartbeat[36][37] (CVE-2014-0160). By reading the memory of the web server, attackers could access sensitive data, including the server's private key.[38] This could allow attackers to decode earlier eavesdropped communications if the encryption protocol used does not ensure perfect forward secrecy. Knowledge of the private key could also allow an attacker to mount a man-in-the-middle attack against any future communications.[39] The vulnerability might also reveal unencrypted parts of other users' sensitive requests and responses, including session cookies and passwords, which might allow attackers to hijack the identity of another user of the service.[40]

At its disclosure on April 7, 2014, around 17% or half a million of the Internet's secure web servers certified by trusted authorities were believed to have been vulnerable to the attack.[41] However, Heartbleed can affect both the server and client.

{{anchor|CVE-2014-0224}}CCS Injection Vulnerability

CCS Injection Vulnerability (CVE-2014-0224) is a security bypass vulnerability that exists in OpenSSL. The vulnerability is due to a weakness in OpenSSL methods used for keying material.[42]

This vulnerability can be exploited through the use of a man-in-the-middle attack,[43] where an attacker may be able to decrypt and modify traffic in transit. A remote unauthenticated attacker could exploit this vulnerability by using a specially crafted handshake to force the use of weak keying material. Successful exploitation could lead to a security bypass condition where an attacker could gain access to potentially sensitive information. The attack can only be performed between a vulnerable client and server.

OpenSSL clients are vulnerable in all versions of OpenSSL before the versions 0.9.8za, 1.0.0m and 1.0.1h. Servers are only known to be vulnerable in OpenSSL 1.0.1 and 1.0.2-beta1. Users of OpenSSL servers earlier than 1.0.1 are advised to upgrade as a precaution.[44]

{{anchor|CVE-2015-0291}}ClientHello sigalgs DoS

This vulnerability (CVE-2015-0291) allows anyone to take a certificate, read its contents and modify it accurately to abuse the vulnerability causing a certificate to crash a client or server. If a client connects to an OpenSSL 1.0.2 server and renegotiates with an invalid signature algorithms extension, a null-pointer dereference occurs. This can cause a DoS attack against the server.

A Stanford Security researcher, David Ramos, had a private exploit and presented it before the OpenSSL team where they patched the issue.

OpenSSL classified the bug as a high-severity issue, noting version 1.0.2 was found vulnerable.[45]

{{anchor|CVE-2016-0701}}Key Recovery Attack on Diffie Hellman small subgroups

This vulnerability (CVE-2016-0701) allows, when some particular circumstances are met, to recover the OpenSSL server's private Diffie–Hellman key. An Adobe System Security researcher, Antonio Sanso, privately reported the vulnerability.

OpenSSL classified the bug as a high-severity issue, noting only version 1.0.2 was found vulnerable.[46]

Forks

{{Anchor|assl}}Agglomerated SSL

In 2009, after frustrations with the original OpenSSL API, Marco Peereboom, an OpenBSD developer at the time, forked the original API by creating Agglomerated SSL (assl), which reuses OpenSSL API under the hood, but provides a much simpler external interface.[47] It has since been deprecated in light of the LibreSSL fork circa 2016.

LibreSSL

{{Main article|LibreSSL}}

In April 2014 in the wake of Heartbleed, members of the OpenBSD project forked OpenSSL starting with the 1.0.1g branch, to create a project named LibreSSL.[48] In the first week of pruning the OpenSSL's codebase, more than 90,000 lines of C code had been removed from the fork.[49]

{{Anchor|BORINGSSL}}BoringSSL

In June 2014, Google announced its own fork of OpenSSL dubbed BoringSSL.[50] Google plans to co-operate with OpenSSL and LibreSSL developers.[51][52][53]

See also

{{Portal|Free and open-source software|Cryptography}}
  • Comparison of TLS implementations
  • Comparison of cryptography libraries
  • LibreSSL
  • POSSE project
  • wolfSSL

References

1. ^{{cite web |title=Change license to the Apache License v2.0 · openssl/openssl@1513331 |url=https://github.com/openssl/openssl/commit/151333164ece49fdba3fe5c4bbdc3333cd9ae66d |website=GitHub |language=en}}
2. ^{{Cite mailing list |url=https://marc.info/?l=ssl-users&m=91566086807308&w=2 |title=ANNOUNCE: OpenSSL (Take 2) |website=marc.info |access-date=2018-10-29 |mailing-list=ssl-users |first=Ben |last=Laurie |date=1999-01-06}}
3. ^{{cite web|title=OpenSSL Management Committee|url=https://www.openssl.org/community/omc.html|publisher=OpenSSL Software Foundation|accessdate=2018-07-22}}
4. ^{{cite web|title=OpenSSL Committers|url=https://www.openssl.org/community/committers.html|publisher=OpenSSL Software Foundation|accessdate=2018-07-22}}
5. ^{{cite mailing list |title=Akamai sponsors TLS 1.3 |url=https://mta.openssl.org/pipermail/openssl-announce/2017-January/000090.html |mailing-list=openssl-announce |date=2017-01-19 |first=Steve |last=Marquess |access-date=2018-11-09}}
6. ^{{cite web|title=OpenSSL – Changelog|url=https://www.openssl.org/news/changelog.html|publisher=OpenSSL Software Foundation|accessdate=2016-09-26}}
7. ^{{cite web|title=OpenSSL – Release Strategy|url=https://www.openssl.org/policies/releasestrat.html|publisher=OpenSSL Software Foundation|accessdate=2016-09-26}}
8. ^{{cite web|url=https://www.openssl.org/news/openssl-1.0.1-notes.html|title=OpenSSL 1.0.1 Series Release Notes|accessdate=2017-02-20|deadurl=yes|archiveurl=https://web.archive.org/web/20150120120428/https://www.openssl.org/news/openssl-1.0.1-notes.html|archivedate=2015-01-20|df=}}
9. ^{{cite web|url=https://www.openssl.org/news/openssl-1.0.2-notes.html|title=OpenSSL 1.0.2 Series Release Notes|accessdate=2017-02-20}}
10. ^{{cite web|url=https://www.openssl.org/news/openssl-1.1.0-notes.html|title=OpenSSL 1.1.0 Series Release Notes|accessdate=2017-02-20}}
11. ^{{cite web|url=https://www.openssl.org/blog/blog/2018/09/11/release111/|title=OpenSSL 1.1.1 Is Released - OpenSSL Blog|first=OpenSSL Foundation,|last=Inc.|website=www.openssl.org}}
12. ^{{Cite web|url=https://www.openssl.org/blog/blog/2018/09/11/release111/|title=OpenSSL 1.1.1 Is Released - OpenSSL Blog|last=Caswell|first=Matt|date=2018-09-11|website=www.openssl.org|publisher=OpenSSL Foundation|language=en}}
13. ^{{Cite web|url=https://www.openssl.org/blog/blog/2018/02/08/tlsv1.3/|title=Using TLS1.3 With OpenSSL - OpenSSL Blog|last=Caswell|first=Matt|date=2018-02-08|website=www.openssl.org|publisher=OpenSSL Foundation|language=en}}
14. ^{{Cite web|url=https://www.openssl.org/blog/blog/2018/09/11/release111/|title=OpenSSL 1.1.1 Is Released|last=Caswell|first=Matt|date=2018-09-11|website=www.openssl.org|publisher=OpenSSL Foundation|language=en}}
15. ^{{cite web |url=http://cvs.openssl.org/fileview?f=openssl/engines/ccgost/README.gost |archive-url=https://archive.is/20130415122812/http://cvs.openssl.org/fileview?f=openssl/engines/ccgost/README.gost |dead-url=yes |archive-date=2013-04-15 |title=GOST engine OpenSSL 1.0.0 README |publisher=cvs.openssl.org }}
16. ^{{cite web|url=https://github.com/openssl/openssl/tree/master/crypto/whrlpool|title=OpenSSL source code, directory crypto/whrlpool|accessdate=2017-08-29}}
17. ^{{cite web|url=http://googleonlinesecurity.blogspot.com.au/2011/11/protecting-data-for-long-term-with.html|title=Protecting data for the long term with forward secrecy|accessdate=2012-11-05}}
18. ^Validated FIPS 140-1 and FIPS 140-2 Cryptographic Modules. NIST. Retrieved 2012-12-19.
19. ^{{cite web |url=https://www.openssl.org/docs/fips/fipsnotes.html |title=Important Notes about OpenSSL and FIPS 140-2 |publisher=openssl.org}}
20. ^{{cite web |url=http://www.gcn.com/online/vol1_no1/43142-1.html |title=NIST recertifies open source encryption module |publisher=gcn.com |deadurl=yes |archiveurl=https://web.archive.org/web/20071010000622/http://www.gcn.com/online/vol1_no1/43142-1.html |archivedate=2007-10-10 |df= }}
21. ^{{cite web |url=https://www.openssl.org/source/license.html |title=OpenSSL: Source, License |publisher=openssl.org}}
22. ^{{cite web |url=http://www.fsf.org/licensing/licenses |title=Licenses – Free Software Foundation |publisher=fsf.org}}
23. ^{{cite web |url=http://users.ugent.be/~bpuype/wget |title=WGET 1.10.2 for Windows (win32) |publisher=users.ugent.be |deadurl=yes |archiveurl=https://web.archive.org/web/20080102164139/http://users.ugent.be/~bpuype/wget/ |archivedate=2008-01-02 |df= }}
24. ^{{cite web |url=http://www.climm.org/download.shtml.en |title=Releases of source and binaries |publisher=climm.org |accessdate=30 November 2010 |deadurl=yes |archiveurl=https://web.archive.org/web/20110212024627/http://www.climm.org/download.shtml.en |archivedate=12 February 2011 |df= }}
25. ^{{cite web |url=http://git.deluge-torrent.org/deluge/plain/LICENSE |title=Deluge LICENSE file |publisher=deluge-torrent.org |accessdate=24 January 2013}}
26. ^{{cite web | url = https://www.openssl.org/blog/blog/2015/08/01/cla/ | title = License Agreements and Changes Are Coming | date = 1 August 2015 | accessdate = 23 August 2015 | last = Salz | first = Rich | website = openssl.org}}
27. ^{{Cite web |url=https://www.coreinfrastructure.org/news/announcements/2017/03/openssl-re-licensing-apache-license-v-20-encourage-broader-use-other-foss |title=OpenSSL Re-licensing to Apache License v. 2.0 To Encourage Broader Use with Other FOSS Projects and Products |date=2017-03-23 |access-date=2018-08-06 |archive-url=https://web.archive.org/web/20170718040958/https://www.coreinfrastructure.org/news/announcements/2017/03/openssl-re-licensing-apache-license-v-20-encourage-broader-use-other-foss |archive-date=2018-07-18}}
28. ^{{cite web|title=OpenSSL Updates Fix Critical Security Vulnerabilities [09 Aug 2014]|url=https://blogs.comodo.com/it-security/openssl-updates-fix-critical-security-vulnerabilities/|accessdate=25 Aug 2014}}
29. ^{{cite web |url=https://tools.cisco.com/security/center/viewAlert.x?alertId=25706 |title=OpenSSL ASN.1 asn1_d2i_read_bio() Heap Overflow Vulnerability |publisher=Cisco}}
30. ^{{cite web |url=https://www.openssl.org/news/secadv_20120419.txt |title=ASN1 BIO vulnerability |publisher=OpenSSL}}
31. ^{{cite web|url=http://www.isg.rhul.ac.uk/tls/|title=On the Security of RC4 in TLS|website=www.isg.rhul.ac.uk}}
32. ^{{Cite web |title=research!rsc: Lessons from the Debian/OpenSSL Fiasco |url=http://research.swtch.com/openssl |website=research.swtch.com |accessdate=2015-08-12}}
33. ^{{Cite web |title=SSLkeys - Debian Wiki |url=https://wiki.debian.org/SSLkeys |website=debian.org |accessdate=2015-06-19}}
34. ^{{Cite web |title=Debian OpenSSL – Predictable PRNG Bruteforce SSH Exploit Python – Exploits Database |url=https://www.exploit-db.com/exploits/5720/ |website=exploit-db.com |accessdate=2015-08-12}}
35. ^{{cite web |title=DSA-1571-1 openssl – predictable random number generator |url=http://www.debian.org/security/2008/dsa-1571 |publisher=Debian |date=May 13, 2008 }}
36. ^{{cite web|title=OpenSSL Security Advisory [07 Apr 2014]|url=https://www.openssl.org/news/secadv_20140407.txt|author=OpenSSL.org|accessdate=9 April 2014|date=7 April 2014}}
37. ^{{Cite web| last = OpenSSL| title = TLS heartbeat read overrun (CVE-2014-0160)| accessdate = 2014-04-08| date = 2014-04-07| url = https://www.openssl.org/news/secadv_20140407.txt}}
38. ^{{Cite web| last = Codenomicon Ltd| title = Heartbleed Bug| accessdate = 2014-04-08| date = 2014-04-08| url = http://heartbleed.com/}}
39. ^{{cite web|title=Man in Middle Attacks [04 Jun 2014]|url=https://blogs.comodo.com/it-security/openssl-vulnerability-exploited-man-middle-attacks/|accessdate=25 Aug 2014}}
40. ^{{cite web |url=http://ipsec.pl/ssl-tls/2014/why-heartbleed-dangerous-exploiting-cve-2014-0160.html |title=Why Heartbleed is dangerous? Exploiting CVE-2014-0160 |year=2014 |publisher=IPSec.pl}}
41. ^{{cite web|last=Mutton|first=Paul|title=Half a million widely trusted websites vulnerable to Heartbleed bug|url=http://news.netcraft.com/archives/2014/04/08/half-a-million-widely-trusted-websites-vulnerable-to-heartbleed-bug.html|publisher=Netcraft Ltd.|accessdate=8 April 2014|date=8 April 2014}}
42. ^{{cite web |url=http://www.cyberoam.com/blog/openssl-continues-to-bleed-out-more-flaws-more-critical-vulnerabilities-found/ |title=OpenSSL continues to bleed out more flaws – more critical vulnerabilities found |year=2014 |publisher=Cyberoam Threat Research Labs}}
43. ^{{cite web |url=https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224 |title=CVE-2014-0224 |year=2014 |publisher=CVE}}
44. ^{{cite web |url=https://www.openssl.org/news/secadv_20140605.txt |title=OpenSSL Security Advisory [05 Jun 2014] |year=2014 |publisher=OpenSSL}}
45. ^{{cite web |url=http://freedomhacker.net/openssl-patches-severe-denial-of-service-vulnerability-3818/ |title=OpenSSL Patches Severe Denial-of-Service Vulnerability [20 March 2015] |year=2015 |publisher=Brandon Stosh}}
46. ^{{cite web |url=https://arstechnica.com/security/2016/01/high-severity-bug-in-openssl-allows-attackers-to-decrypt-https-traffic/ |title= High-severity bug in OpenSSL allows attackers to decrypt HTTPS traffic [28 Jan 2016] |year=2016}}
47. ^{{cite web |url= http://ports.su/security/assl |title= security/assl: assl-1.5.0p0v0 – hide awful SSL API in a sane interface |work= OpenBSD ports |date= 2014-05-22 |accessdate= 2015-02-10 }}
48. ^{{cite web |url=http://www.undeadly.org/cgi?action=article&sid=20140415093252&mode=expanded |title= OpenBSD has started a massive strip-down and cleanup of OpenSSL |date=2014-04-15| work=OpenBSD journal}}
49. ^{{cite web|title= OpenBSD forks, prunes, fixes OpenSSL |url=http://www.zdnet.com/openbsd-forks-prunes-fixes-openssl-7000028613/|publisher=ZDNet|accessdate=21 April 2014|date=21 April 2014}}
50. ^https://boringssl.googlesource.com/boringssl/ BoringSSL
51. ^{{cite web |title=Google unveils independent 'fork' of OpenSSL called 'BoringSSL' |date=2014-06-21 |work=Ars Technica |url=https://arstechnica.com/security/2014/06/google-unveils-independent-fork-of-openssl-called-boringssl/}}
52. ^{{cite web |title=BoringSSL|date=2014-06-20|work=Adam Langley's Weblog |url=https://www.imperialviolet.org/2014/06/20/boringssl.html}}
53. ^{{cite web|url=https://nakedsecurity.sophos.com/2014/06/24/boringssl-wants-kill-the-excitement-that-led-to-heartbleed/|title=BoringSSL wants to kill the excitement that led to Heartbleed|date=24 June 2014|publisher=Sophos}}

External links

{{Commons category}}
  • {{Official website|https://www.openssl.org/}}
  • [https://www.openssl.org/docs/manpages.html OpenSSL Manpages]
  • OpenSSL Programming Guide
  • [https://people.gnome.org/~markmc/openssl-and-the-gpl.html The OpenSSL License and the GPL] by Mark McLoughlin
  • [https://www.ibm.com/developerworks/linux/library/l-openssl/index.html OpenSSL programming tutorial]
  • [https://wiki.openssl.org/index.php/Main_Page OpenSSL Community Wiki]
{{Cryptographic software}}{{SSL/TLS}}{{DEFAULTSORT:Openssl}}

5 : 1998 software|C libraries|Cryptographic software|Free security software|Transport Layer Security implementation

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/9/28 3:30:51