untrusted comment: verify with openbsd-65-base.pub
RWSZaRmt1LEQT3TThgQiq2HdT7FAYv5cled4KUjgqIgZTO8TP4k0TyYknYO9o/X0LNPj6f7FAHY0j9s0zcyOGhzr35whT4ycNQs=
OpenBSD 6.5 errata 005, June 10, 2019:
TLS handshake fails if a client supporting TLS 1.3 tries to connect to
an OpenBSD server and sends a key share extension that does not include
X25519.
Apply by doing:
signify -Vep /etc/signify/openbsd-65-base.pub -x 005_libssl.patch.sig \
-m - | (cd /usr/src && patch -p0)
And then rebuild and install libssl:
cd /usr/src/lib/libssl
make obj
make
make install
Index: lib/libssl/ssl_tlsext.c
===================================================================
RCS file: /cvs/src/lib/libssl/ssl_tlsext.c,v
retrieving revision 1.44.2.1
diff -u -p -r1.44.2.1 ssl_tlsext.c
--- lib/libssl/ssl_tlsext.c 15 May 2019 19:25:15 -0000 1.44.2.1
+++ lib/libssl/ssl_tlsext.c 5 Jun 2019 14:26:13 -0000
@@ -1269,7 +1269,6 @@ tlsext_keyshare_server_parse(SSL *s, CBS
CBS key_exchange;
uint16_t group;
size_t out_len;
- int ret = 0;
if (!CBS_get_u16_length_prefixed(cbs, &client_shares))
goto err;
@@ -1301,11 +1300,9 @@ tlsext_keyshare_server_parse(SSL *s, CBS
if (!CBS_stow(&key_exchange, &S3I(s)->hs_tls13.x25519_peer_public,
&out_len))
goto err;
-
- ret = 1;
}
- return ret;
+ return 1;
err:
*alert = SSL_AD_DECODE_ERROR;