OpenSSL is a software library for applications that provide secure communications over computer networks against eavesdropping, and identify the party at the other end. It is widely used by Internetservers, including the majority of HTTPSwebsites.
OpenSSL contains an open-source implementation of the SSL and TLS protocols. The core library, written in the C programming language, implements basic cryptographic functions and provides various utility functions. Wrappers allowing the use of the OpenSSL library in a variety of computer languages are available.
The OpenSSL Software Foundation (OSF) represents the OpenSSL project in most legal capacities including contributor license agreements, managing donations, and so on. OpenSSL Software Services (OSS) also represents the OpenSSL project for support contracts.
The OpenSSL project was founded in 1998 to provide a free set of encryption tools for the code used on the Internet. It is based on a fork of SSLeay by Eric Andrew Young and Tim Hudson, which unofficially ended development on December 17, 1998, when Young and Hudson both went to work for RSA Security. The initial founding members were Mark Cox, Ralf Engelschall, Stephen Henson, Ben Laurie, and Paul Sutton.[4]
In 2018 OpenSSL version numbering skipped from 1.1.1 to 3.0.0, omitting 2 as a major version number to avoid a conflict with one of OpenSSL's modules. Version 3.0.0 was the first to use the Apache License.
As of May 2019[update],[5] the OpenSSL management committee consisted of seven people[6] and there are seventeen developers[7] with commit access (many of whom are also part of the OpenSSL management committee). There are only two full-time employees (fellows) and the remainder are volunteers.
The project has a budget of less than $1 million USD per year and relies primarily on donations. Development of TLS 1.3 was sponsored by Akamai.[8]
FIPS 140 is a U.S. Federal program for the testing and certification of cryptographic modules. An early FIPS 140-1 certificate for OpenSSL's FOM 1.0 was revoked in July 2006 "when questions were raised about the validated module's interaction with outside software." The module was re-certified in February 2007 before giving way to FIPS 140-2.[42] OpenSSL 1.0.2 supported the use of the OpenSSL FIPS Object Module (FOM), which was built to deliver FIPS approved algorithms in a FIPS 140-2 validated environment.[43][44] OpenSSL controversially decided to categorize the 1.0.2 architecture as 'end of life' or 'EOL', effective December 31, 2019, despite objections that it was the only version of OpenSSL that was currently available with support for FIPS mode.[45] As a result of the EOL, many users were unable to properly deploy the FOM 2.0 and fell out of compliance because they did not secure extended support for the 1.0.2 architecture, although the FOM itself remained validated for eight months further.
The FIPS Object Module 2.0 remained FIPS 140-2 validated in several formats until September 1, 2020, when NIST deprecated the usage of FIPS 186-2 for Digital Signature Standard and designated all non-compliant modules as 'Historical'. This designation includes a caution to federal agencies that they should not include the module in any new procurements. All three of the OpenSSL validations were included in the deprecation – the OpenSSL FIPS Object Module (certificate #1747),[46] OpenSSL FIPS Object Module SE (certificate #2398),[47] and OpenSSL FIPS Object Module RE (certificate #2473).[48] Many 'private label' OpenSSL-based validations and clones created by consultants were also moved to the Historical List, although some FIPS validated modules with replacement compatibility avoided the deprecation, such as BoringCrypto from Google[49] and CryptoComply from SafeLogic.[50]
The OpenSSL Management Committee announced a change in the versioning scheme.
Due to this change, the major number of the next major version would have been doubled, since the OpenSSL FIPS module already occupied this number. Therefore the decision was made to skip the OpenSSL 2.0 version number and continue with OpenSSL 3.0 .
OpenSSL 3.0 restored FIPS mode and underwent FIPS 140-2 testing, but with significant delays: The effort was first kicked off in 2016 with support from SafeLogic[51][52][53] and further support from Oracle in 2017,[54][55] but the process has been challenging.[56]
On October 20, 2020, the OpenSSL FIPS Provider 3.0 was added to the CMVP Implementation Under Test List, which reflected an official engagement with a testing lab to proceed with a FIPS 140-2 validation. This resulted in a slew of certifications in the following months.[57]
Licensing
OpenSSL was dual-licensed under the OpenSSL License and the SSLeay License, which means that the terms of either licenses can be used.[58] The OpenSSL License is Apache License 1.0 and SSLeay License bears some similarity to a 4-clause BSD License.
As the OpenSSL License was Apache License 1.0, but not Apache License 2.0, it requires the phrase "this product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit" to appear in advertising material and any redistributions (Sections 3 and 6 of the OpenSSL License). Due to this restriction, the OpenSSL License and the Apache License 1.0 are incompatible with the GNU GPL.[59]
Some GPL developers have added an OpenSSL exception to their licenses that specifically permits using OpenSSL with their system. GNU Wget and climm both use such exceptions.[60][61] Some packages (like Deluge) explicitly modify the GPL license by adding an extra section at the beginning of the license documenting the exception.[62] Other packages use the LGPL-licensed GnuTLS, BSD-licensed Botan, or MPL-licensed NSS, which perform the same task.
OpenSSL announced in August 2015 that it would require most contributors to sign a Contributor License Agreement (CLA), and that OpenSSL would eventually be relicensed under the terms of Apache License 2.0.[63] This process commenced in March 2017,[64] and was complete in 2018.[65]
On 7 September 2021, OpenSSL 3.0.0 was released under the Apache License 2.0.[66]
Notable vulnerabilities
Denial of service: ASN.1 parsing
OpenSSL 0.9.6k has a bug where certain ASN.1 sequences triggered a large number of recursions on Windows machines, discovered on November 4, 2003. Windows could not handle large recursions correctly, so OpenSSL would crash as a result. Being able to send arbitrary large numbers of ASN.1 sequences would cause OpenSSL to crash as a result.
OCSP stapling vulnerability
When creating a handshake, the client could send an incorrectly formatted ClientHello message, leading to OpenSSL parsing more than the end of the message. Assigned the identifier CVE-2011-0014 by the CVE project, this affected all OpenSSL versions 0.9.8h to 0.9.8q and OpenSSL 1.0.0 to 1.0.0c. Since the parsing could lead to a read on an incorrect memory address, it was possible for the attacker to cause a DoS. It was also possible that some applications expose the contents of parsed OCSP extensions, leading to an attacker being able to read the contents of memory that came after the ClientHello.[67]
ASN.1 BIO vulnerability
When using Basic Input/Output (BIO)[68] or FILE based functions to read untrusted DER format data, OpenSSL is vulnerable. This vulnerability was discovered on April 19, 2012, and was assigned the CVE identifier CVE-2012-2110. While not directly affecting the SSL/TLS code of OpenSSL, any application that was using ASN.1 functions (particularly d2i_X509 and d2i_PKCS12) were also not affected.[69]
SSL, TLS and DTLS plaintext recovery attack
In handling CBC cipher-suites in SSL, TLS, and DTLS, OpenSSL was found vulnerable to a timing attack during the MAC processing. Nadhem Alfardan and Kenny Paterson discovered the problem, and published their findings[70] on February 5, 2013. The vulnerability was assigned the CVE identifier CVE-2013-0169.
Predictable private keys (Debian-specific)
OpenSSL's pseudo-random number generator acquires entropy using complex programming methods. To keep the Valgrind analysis tool from issuing associated warnings, a maintainer of the Debian distribution applied a patch to Debian's variant of the OpenSSL suite, which inadvertently broke its random number generator by limiting the overall number of private keys it could generate to 32,768.[71][72] The broken version was included in the Debian release of September 17, 2006 (version 0.9.8c-1), also compromising other Debian-based distributions, for example Ubuntu. Ready-to-use exploits are easily available.[73]
The error was reported by Debian on May 13, 2008. On the Debian 4.0 distribution (etch), these problems were fixed in version 0.9.8c-4etch3, while fixes for the Debian 5.0 distribution (lenny) were provided in version 0.9.8g-9.[74]
OpenSSL versions 1.0.1 through 1.0.1f have a severe memory handling bug in their implementation of the TLS Heartbeat Extension that could be used to reveal up to 64 KB of the application's memory with every heartbeat[75][76] (CVE-2014-0160). By reading the memory of the web server, attackers could access sensitive data, including the server's private key.[77] This could allow attackers to decode earlier eavesdropped communications if the encryption protocol used does not ensure perfect forward secrecy. Knowledge of the private key could also allow an attacker to mount a man-in-the-middle attack against any future communications.[citation needed] The vulnerability might also reveal unencrypted parts of other users' sensitive requests and responses, including session cookies and passwords, which might allow attackers to hijack the identity of another user of the service.[78]
At its disclosure on April 7, 2014, around 17% or half a million of the Internet's secure web servers certified by trusted authorities were believed to have been vulnerable to the attack.[79] However, Heartbleed can affect both the server and client.
CCS injection vulnerability
The CCS Injection Vulnerability (CVE-2014-0224) is a security bypass vulnerability that results from a weakness in OpenSSL methods used for keying material.[80]
This vulnerability can be exploited through the use of a man-in-the-middle attack,[81] where an attacker may be able to decrypt and modify traffic in transit. A remote unauthenticated attacker could exploit this vulnerability by using a specially crafted handshake to force the use of weak keying material. Successful exploitation could lead to a security bypass condition where an attacker could gain access to potentially sensitive information. The attack can only be performed between a vulnerable client and server.
OpenSSL clients are vulnerable in all versions of OpenSSL before the versions 0.9.8za, 1.0.0m and 1.0.1h. Servers are only known to be vulnerable in OpenSSL 1.0.1 and 1.0.2-beta1. Users of OpenSSL servers earlier than 1.0.1 are advised to upgrade as a precaution.[82]
ClientHello sigalgs DoS
This vulnerability (CVE-2015-0291) allows anyone to take a certificate, read its contents and modify it accurately to abuse the vulnerability causing a certificate to crash a client or server. If a client connects to an OpenSSL 1.0.2 server and renegotiates with an invalid signature algorithms extension, a null-pointer dereference occurs. This can cause a DoS attack against the server.
A Stanford Security researcher, David Ramos, had a private exploit and presented it to the OpenSSL team, which then patched the issue.
OpenSSL classified the bug as a high-severity issue, noting version 1.0.2 was found vulnerable.[83]
Key recovery attack on Diffie–Hellman small subgroups
This vulnerability (CVE-2016-0701) allows, when some particular circumstances are met, to recover the OpenSSL server's private Diffie–Hellman key. An Adobe System Security researcher, Antonio Sanso, privately reported the vulnerability.
OpenSSL classified the bug as a high-severity issue, noting only version 1.0.2 was found vulnerable.[84]
Forks
Agglomerated SSL
In 2009, after frustrations with the original OpenSSL API, Marco Peereboom, an OpenBSD developer at the time, forked the original API by creating Agglomerated SSL (assl),[85] which reuses OpenSSL API under the hood, but provides a much simpler external interface.[86] It has since been deprecated in light of the LibreSSL fork circa 2015.
In April 2014 in the wake of Heartbleed, members of the OpenBSD project forked OpenSSL starting with the 1.0.1g branch, to create a project named LibreSSL.[87] In the first week of pruning the OpenSSL's codebase, more than 90,000 lines of C code had been removed from the fork.[88]
BoringSSL
In June 2014, Google announced its own fork of OpenSSL dubbed BoringSSL.[89] Google plans to co-operate with OpenSSL and LibreSSL developers.[90][91][92] Google has since developed a new library, Tink, based on BoringSSL.[93]
AWS-LC
In September 2020, it was released as a general-purpose cryptographic library maintained by the AWS Cryptography team to be used in the AWS cloud computing platform. It іs based on code from the OpenSSL and BoringSSL projects.[94]
Criticisms
Backwards compatibility
Among developers communities, OpenSSL is often cited for introducing API compatibility breakage with each new major version,[95][96][97][98] which requires software adaptations that tend to delay new version adoptions.[99] This, combined with the fact that previous releases are generally maintained for no more than two years after a new major one is released[27] tends to force some vendors to anticipate software migrations very early while still having little time left[100] to update to a new release, sometimes at the risk of losing some compatibility with existing software[101][102] or risking regressions.[103][104]
Delay between releases
While long-term support (LTS) releases are maintained for 5 years,[11] accumulated delays in release time frames tend to force operating system vendors to stay on the last supported release longer, leaving less margin when the new version is available. For example OpenSSL 3.0 was initially expected for Q4 2019[45] and was finally issued 21 months later[27] without extending the expected end of support for previously supported version 1.1.1, and this despite the significant changes that required adaptations to existing software.
Significant performance regressions
The reduced support delay of version 1.1.1 mentioned above causes further concerns to users whose workloads are sensitive to performance. Some time after general availability of 3.0, some users started to report serious performance regressions affecting this version in multi-threaded environments, many citing the inefficient use of locks in frequent low-level operations, citing slowdowns from 80 to 400 times.[105][106][107][108][109][110][111][112] The OpenSSL team has created a meta-issue to try to centralize reports of such massive performance regressions.[113] About half of these reporters indicate the impossibility for them to upgrade to 3.0 from earlier versions, adding to the trouble caused by the limited support time left on previous version 1.1.1.
Consideration for users' requirements
While the QUIC transport layer was being worked on to support the third version of the HTTP protocol, it was proposed to use TLS to provide security,[114] and identified that some adaptations to TLS libraries would be needed. Such modifications were brought to BoringSSL[115] which was the library being primarily used by QUIC developers by then, and later ported to other libraries.[116] A port of this work was quickly proposed to OpenSSL.[117] While some discussion started the same day, it quickly stalled and was first blocked on license considerations,[117] then kept on hold once these concerns were cleared. Finally 10 months later the OpenSSL Management Committee announced on a blog post[118] that this patch set would not be adopted for 3.0 on the fear that the API would change over time. Finally more than one year after planned release of 3.0 which was still not coming, a team of volunteers from Akamai and Microsoft decided to fork the project as QuicTLS[119] and support these patches on top of the OpenSSL code in order to unblock QUIC development. This action was generally welcome by the community. Finally after OpenSSL 3.0 was finally released, the QUIC patch set was reconsidered and decided against,[120] causing tens to hundreds of reactions of disappointment among the community.[117] The pull request was closed, while users felt the need to publicly express their disappointment,[121] or beg operating system vendors to support the alternative QuicTLS fork,[122][123] or seek for alternative solutions.[124] Finally Rich Salz, co-founder of the QuicTLS fork, announced[124] his interest in seeing an Apache project forked from QuicTLS. As of 25 February 2023 there is still no QUIC-compatible long-term supported TLS library available by default in operating systems without requiring end-users to rebuild it themselves from sources.
^Lee, Victoria; Radcliffe, Mark; Stevenson, Chris (5 February 2019). "Top 10 FOSS legal developments of 2018". Opensource.com, Red Hat. Archived from the original on 5 February 2019. Retrieved 28 September 2019. The OpenSSL project announced that it had completed its shift from the OpenSSL/SSLeay license to the Apache Software License version 2 (ASLv2).
سينة برور سلطان قبر سینة برور سلطان بجانب نافورة فناء من مسجد أيوب سلطان في أيوب بإسطنبول. معلومات شخصية الميلاد سنة 1761 بلغاريا الوفاة 11 ديسمبر 1828 (66–67 سنة) إسطنبول مكان الدفن جامع أيوب سلطان مواطنة الدولة العثمانية الزوج عبد الحميد الأول ال
هذه المقالة يتيمة إذ تصل إليها مقالات أخرى قليلة جدًا. فضلًا، ساعد بإضافة وصلة إليها في مقالات متعلقة بها. (مايو 2016) متنزه حديقة بحيرات مونتبيلو الوطني IUCN التصنيف II (حديقة وطنية) البلد المكسيك الموقع تشياباس، المكسيك الإحداثيات 16°07′N 91°42′W / 16.117°N 91.700°W / 1...
2003 British filmLive ForeverUK theatrical poster by Damien HirstDirected byJohn DowerWritten byJohn DowerProduced byJohn BattsekStarringNoel GallagherLiam GallagherDamon AlbarnJarvis CockerEdited byJake MartinDistributed byBBCRelease date21 March 2003Running time82 minutesCountryUnited Kingdom Live Forever: The Rise and Fall of Brit Pop is a 2003 documentary film written and directed by John Dower. The documentary is a study of popular culture in the United Kingdom during the mid- to late 19...
Доставка скла джамбо-формату і вивантаження його з інлоудера Інлоудер (англ. inloader) чи флоатлайнер, чи (у просторічі) джамбовоз, — спеціальний транспорт, автомобіль-тягач плюс спеціалізований напівпричіп, необхідний для транспортування великих форматів листового скла (
كهران تقسيم إداري البلد إيران إحداثيات 32°48′21″N 52°23′32″E / 32.8058°N 52.3922°E / 32.8058; 52.3922 السكان التعداد السكاني 0 نسمة (إحصاء 2016) تعديل مصدري - تعديل كهران هي قرية في مقاطعة أصفهان، إيران.[1] يقدر عدد سكانها بـ 0 نسمة بحسب إحصاء 2016.[2] مراجع ^ تعداد سكان جمه
Politeknik AcehDidirikan22 Mei 2008LokasiBanda Aceh, Aceh, IndonesiaKampusUrbanSitus webwww.politeknikaceh.ac.id Politeknik Aceh adalah perguruan tinggi swasta yang terletak di Kota Banda Aceh. Perguruan ini merupakan lembaga pendidikan jenjang D-3 yang berorientasi praktis dalam bidang Teknik Elektronika, Teknik Komputer, Teknik Mekatronika, serta Akuntansi yang diselaraskan dengan kebutuhan kompetensi tenaga kerja industri. Perguruan ini didirikan atas prakarsa Pemerintah Kota Banda Aceh ya...
Motorways in Belgium In Belgium, the motorways (Dutch: autosnelwegen; French: autoroutes; German: Autobahnen) are indicated by an A and an E (for European) number. The E numbers are used most often. Roads that are (part of) a ring road around a town or city are mostly indicated by an R number. Since 1989, all highways are built and maintained by the governments of the three regions (Flanders, Wallonia and Brussels). For safety on motorways in Belgium, 60% of killed travelers did not wear thei...
Governor of Uttar PradeshEmblem of Uttar PradeshIncumbentAnandiben Patelsince 29 July 2019StyleHer ExcellencyResidenceRaj Bhavan; LucknowAppointerPresident of IndiaTerm length5 YearsInaugural holderSarojini Naidu (Independent India) Sir Harcourt Butler (Pre-Independent India)Formation3 January 1921; 102 years ago (1921-01-03)WebsiteGovernor of Uttar Pradesh The governor of Uttar Pradesh is the constitutional head and representative of the president of India in the state...
Nama ini menggunakan cara penamaan Spanyol: nama keluarga pertama atau paternalnya adalah Quiñones dan nama keluarga kedua atau maternalnya adalah August. Denise QuiñonesDenise Quiñones pada tahun 2001LahirDenise Marie Quiñones August9 September 1980 (umur 43)Ponce, Puerto RicoTinggi5 ft 10 in (1,78 m)Pemenang kontes kecantikanGelarMiss Puerto Rico Universe 2001 Miss Universe 2001Warna rambutCokelatWarna mataCokelatKompetisiutamaMiss Puerto Rico Universe 2001(Peme...
För andra betydelser, se Den blodiga söndagen. Blodiga söndagen Minnesmärke över de döda i Derry.PlatsDerry, Nordirland, StorbritannienDatum30 januari 1972KaraktärMassakerPart IKatolska demonstranterPart IIStorbritanniens arméDöda14Skadade12 (skottskadade) Blodiga söndagen (engelska: Bloody Sunday, iriska: Domhnach na Fola) var en incident den 30 januari 1972, då många katoliker i Nordirland protesterade mot den brittiska politiken, varvid 13 civila demonstranter (män och p...
Freight terminal in Kitakyushu, Japan This article relies largely or entirely on a single source. Relevant discussion may be found on the talk page. Please help improve this article by introducing citations to additional sources.Find sources: Higashi-Kokura Freight Terminal – news · newspapers · books · scholar · JSTOR (October 2021) Higashi-Kokura railway Higashi-Kokura Freight Terminal (東小倉駅, Higashi-Kokura-eki) is a freight terminal on the K...
1995–96 government led by Shimon Peres Second Peres Cabinet26th Cabinet of IsraelDate formed22 November 1995 (1995-11-22)Date dissolved18 June 1996 (1996-06-18)People and organisationsHead of stateEzer WeizmanHead of governmentShimon PeresMember partiesLaborMeretzYiudStatus in legislatureCoalition governmentOpposition partyLikudOpposition leaderBenjamin NetanyahuHistoryLegislature term(s)13th KnessetPredecessor25th cabinet of IsraelSuccessor27th cabinet of Isra...
American author, journalist, and attorney; daughter of Al and Tipper Gore Karenna GoreGore in 1997BornKarenna Aitcheson Gore (1973-08-06) August 6, 1973 (age 50)Nashville, Tennessee, U.S.EducationHarvard University (BA)Columbia University (JD)Union Theological Seminary (MA)Notable worksLighting the Way: Nine Women Who Shaped Modern AmericaSpouse Andrew Schiff (m. 1997; div. 2011)Children3ParentsAl Gore (father)Tipper Gore (mother)Relati...
The Gaelic American was an Irish nationalist newspaper published in the United States from 1903 to 1951 that was, along with the Irish Nation, owned by John Devoy.[1][2] It was re-launched as an online news publication in 2021.[3] Part of a series onIrish republicanism Concepts Abstentionism Anti-imperialism Armalite and ballot box strategy Dissident republican Éire Nua Irish nationalism Irish republican legitimism New Departure Radicalism Republicanism United Ireland...
Genus of fishes For the larger gouramis from Southeast Asia, see Trichopodus. Trichogaster Dwarf gourami (T. lalius) Scientific classification Domain: Eukaryota Kingdom: Animalia Phylum: Chordata Class: Actinopterygii Order: Anabantiformes Family: Osphronemidae Subfamily: TrichogastrinaeBleeker, 1879[1] Genus: TrichogasterBloch & J. G. Schneider, 1801 Type species Trichogaster fasciataBloch & J. G. Schneider, 1801[2] Synonyms[3] Colisa Cuvier, 1831 Polyacanthus...
Walsall Borough PoliceAgency overviewFormed1832 (1832)Preceding agencynoneDissolved31 March 1966 (1966-03-31)Superseding agencyWest Midlands ConstabularyJurisdictional structureOperations jurisdictionEngland Walsall Borough Police was a police force in the Borough of Walsall, then in Staffordshire, in England, from 1832–1966.[1][2] History WMP museum - Walsall Borough Police helmet badge in the West Midlands Police Museum The force was created on 6 July 1...
This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: Pinoy Weekly – news · newspapers · books · scholar · JSTOR (March 2018) (Learn how and when to remove this template message) Pinoy WeeklyTypeWeekly newspaperFormatTabloid, Online NewsmagazineOwner(s)PinoyMedia Center, Inc.Editor-in-chiefMarc Lino J. AbilaFounde...
Human settlement in EnglandSwaffham BulbeckThe Old AbbeySwaffham BulbeckLocation within CambridgeshirePopulation826 (2011 Census)[1]OS grid referenceTL559619DistrictEast CambridgeshireShire countyCambridgeshireRegionEastCountryEnglandSovereign stateUnited KingdomPost townCAMBRIDGEPostcode districtCB25Dialling code01223 List of places UK England Cambridgeshire 52°14′N 0°17′E / 52.23°N 0.28°E / 52.23; 0.28 Village sign i...
Television station in New York, United StatesWVVH-CDSouthampton, New YorkUnited StatesChannelsDigital: 18 (UHF)Virtual: 18BrandingHamptons TelevisionProgrammingAffiliations18.1: YTA TV and Outside TV18.3 Shop LC18.4 HSN18.5 NTD America[1]OwnershipOwnerGreg and Ernie SchmizziHistoryFoundedOctober 13, 1983; 40 years ago (1983-10-13)First air date1988; 35 years ago (1988)Former call signsW23AA (1983–1994)WVVH-LP (1994-2008)WVVH-CA (2008-2011)Former c...