X-Git-Url: https://git.openssl.org/gitweb/?p=openssl.git;a=blobdiff_plain;f=CHANGES;h=7c3722ee2862cc644e3a960852f9a5d09e7ebc25;hp=f6b293d3a187fc2c67fb04401a280cf170e3cfb6;hb=59b6836ab2cff27c9d7062699abcbf805350b8ad;hpb=9fc9b55237d3f8abb0f0efb2bf26bc58bcd234bb diff --git a/CHANGES b/CHANGES index f6b293d3a1..7c3722ee28 100644 --- a/CHANGES +++ b/CHANGES @@ -763,6 +763,28 @@ Changes between 0.9.7e and 0.9.7f [XX xxx XXXX] + *) Use (SSL_RANDOM_VALUE - 4) bytes of pseudo random data when generating + server and client random values. Previously + (SSL_RANDOM_VALUE - sizeof(time_t)) would be used which would result in + less random data when sizeof(time_t) > 4 (some 64 bit platforms). + + This change has negligible security impact because: + + 1. Server and client random values still have 24 bytes of pseudo random + data. + + 2. Server and client random values are sent in the clear in the initial + handshake. + + 3. The master secret is derived using the premaster secret (48 bytes in + size for static RSA ciphersuites) as well as client server and random + values. + + The OpenSSL team would like to thank the UK NISCC for bringing this issue + to our attention. + + [Stephen Henson, reported by UK NISCC] + *) Use Windows randomness collection on Cygwin. [Ulf Möller]