Why don't we release CVE numbers with pre-announcements?
It would be very convenient to name tools and write docs and open issues in advance. The point of CVEs is to get everyone talking about the vuln with the same name, and we are all talking about it already. #OpenSSL
Alright, configured a pretty vanilla Fly.io VM with OpenSSL 3.0.6 to act as a lab. Should be fun. #OpenSSL
This is the changelog: potential RCE or crash in name constraint checking. Happens after checking signatures, so requires the attacker to have a trusted certificate or the victim to skip verification.
Doesn't seem to affect servers that don't accept client certificates.
"Pre-announcements of CVE-2022-3602 described this issue as CRITICAL. Further analysis based on some of the mitigating factors described above have led this to be downgraded to HIGH." #OpenSSL
I believe Open Source will change one way or another, so I'm putting my (lack of) money where my mouth is, and doing what I think can best catalyze the change I want: becoming a professional, independent Open Source maintainer myself 👨💻💼
Concretely, it will mean pitching companies (maybe you!) on paying me as a contractor to keep doing Go cryptography, age, mkcert, and yubikey-agent work as an independent maintainer, and then being very very public about it 📢 words.filippo.io/pay-maintainer…
You might know @zx2c4 for making Wireguard (and getting it into Linux).
In case you missed it, the Linux CSPRNG is pretty good these days!
The extraction has been using ChaCha20 for a while. What just changes is that the entropy mixing will now use Blake2, which makes a lot of sense since it's the same core as ChaCha20.