-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Summary:
OpenVPN-NL is not vulnerable to the two 'high'-rated security issues in
the recently published mbed TLS security advisory [0].
Background:
Recently, mbed TLS issued new software versions accompanied by a
security advisory containing two 'high'-rated security issues:
1) Remote plaintext recovery on use of CBC-based cipher suites through a
timing side-channel
Researchers showed that the mitigations for the lucky13 attack
implemented by mbedtls were not working properly for cipher suites using
SHA384 (or SHA512, but those do not exist). This attack applies only
when using a TLS cipher suite that combines AES-CBC with SHA384.
OpenVPN-NL does not support such a cipher suite, and is therefor not
vulnerable.
2) Plaintext recovery on use of CBC-based cipher suites through a cache
based side-channel
Similar to the above, the implementation of the same cipher suites was
also vulnerable to cache-based side-channel attacks. OpenVPN-NL does
not support any of the affected cipher suites, and is therefor not
vulnerable.
[0]
https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-a
dvisory-2018-02
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
iQEcBAEBCAAGBQJbcaVdAAoJEEEwndWOY1w5t2gH/1RLAaSxQvNuk/DXLJ/20UAd
lMi4t21qnFoGIGkYUOVrVuW2qHEH3EJYZD+ioQ+tptAYVwm9j60vsLNStJVPhb+u
Qtn0cYcb4npQrF7VFJCDkMNAM8vQU+DZJ30zC/GOuewYi9/s2XoFrwEHIXFG4kCH
v4/+R72xEhMF2uJWjZ/ZReBmNM4BRdis+/IV92F7/86BacEuPH8LHSLb90B9gujL
L4nJF3kveOH9Tp5rXnoAoEUb47mSCQ5oAe6bf2k8ddxl9k7vIAaOT8jzgJycxbAz
CaHLG+WlTKLbpJ+W0xw1FkybkT31HRcpdn9jz9DS1CuHLweKWy8UhUPp3Tt5puQ=
=jCKW
-----END PGP SIGNATURE-----