{"id":73629,"date":"2017-05-09T11:54:01","date_gmt":"2017-05-09T18:54:01","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=73629"},"modified":"2025-06-08T19:19:47","modified_gmt":"2025-06-09T02:19:47","slug":"vulnerable-openssl-handshake-renegotiation-can-trigger-denial-service","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vulnerable-openssl-handshake-renegotiation-can-trigger-denial-service\/","title":{"rendered":"Vulnerable OpenSSL Handshake Renegotiation Can Trigger Denial of Service"},"content":{"rendered":"<p>OpenSSL, the popular general-purpose cryptographic library that implements SSL\/TLS protocols for web authentication, has recently suffered from several vulnerabilities. We have written about <a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/analyzing-cve-2017-3731-truncated-packets-can-cause-denial-service-openssl\/\">\u201cCVE-2017-3731: Truncated Packets Can Cause Denial of Service in OpenSSL\u201d<\/a> and <a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/ssl-death-alert-cve-2016-8610-can-cause-denial-of-service-to-openssl-servers\/\">\u201cSSL Death Alert (CVE-2016-8610) Can Cause Denial of Service to OpenSSL Servers\u201d<\/a> among others. Today we examine the high-severity bug CVE-2017-3733, the Encrypt-Then-MAC renegotiation crash that can cause a denial of service.<\/p>\n<p>Before SSL\/TLS encrypts data, it runs the Handshake and ChangeCipherSpec protocols.<\/p>\n<p>During the Handshake phase, the client and server decide which encryption algorithms to use. Once the negotiation is done, the client and the server send each other a ChangedCipherSpec message, after which the traffic is encrypted with the negotiated algorithms.<\/p>\n<p>Encrypted data is sent in one of two ways along with the message authentication code (MAC) in SSL\/TLS.<\/p>\n<ol>\n<li>MAC-then-encrypt: This method calculates the MAC of the plain text, concatenates it with the plain text, and runs the encryption algorithm over it.<\/li>\n<li>Encrypt-then-MAC: The cipher-text is generated by encrypting the plaintext and then appending a MAC of the encrypted plaintext.<\/li>\n<\/ol>\n<p>If the ClientHello message does not contain an Encrypt-Then-Mac extension, then the default is MAC-then-encrypt mode. If ClientHello has an Encrypt-Then-Mac extension, the server will compute the MAC after encrypting the data.<\/p>\n<p>If the client or server wish to change the algorithms used for encryption, they can renegotiate the Cipher_Suites that they have already agreed upon. This can occur any time during data transfer by initiating a new Handshake, which takes place over an existing SSL connection.<\/p>\n<h2><strong>Triggering the vulnerability<\/strong><\/h2>\n<p>OpenSSL offers this explanation:<\/p>\n<p>\u201cDuring a renegotiation handshake if the Encrypt-Then-Mac extension is negotiated where it was not in the original handshake (or vice-versa) then this can cause OpenSSL to crash (dependent on ciphersuite). Both clients and servers are affected.\u201d<\/p>\n<p>Say the client starts a TLS handshake with the server using the default MAC-then-encrypt mode. If the client later renegotiates with the Encrypt-then-MAC extension enabled and sends encrypted data in that mode before the ChangeCipherSpec message, the server will crash, causing a denial of service.<\/p>\n<p>When the client triggers this vulnerability, the server crashes at the ssl3_get_record function, in the ssl3_record.c file:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170504-OpenSSL-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-73630 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170504-OpenSSL-1.png\" alt=\"\" width=\"975\" height=\"285\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170504-OpenSSL-1.png 975w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170504-OpenSSL-1-300x88.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170504-OpenSSL-1-768x224.png 768w\" sizes=\"auto, (max-width: 975px) 100vw, 975px\" \/><\/a><\/p>\n<p>The crash occurs at line no. 352, when checking to see if mac_size is less than EVP_MAX_MD_SIZE (64 bytes):<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170504-OpenSSL-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-73631 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170504-OpenSSL-2.png\" alt=\"\" width=\"1220\" height=\"467\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170504-OpenSSL-2.png 1220w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170504-OpenSSL-2-300x115.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170504-OpenSSL-2-768x294.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170504-OpenSSL-2-1024x392.png 1024w\" sizes=\"auto, (max-width: 1220px) 100vw, 1220px\" \/><\/a><\/p>\n<p>The if statement preceding the assertion checks whether the Encypt-then-MAC flag is set in the server. The macro in the if condition:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170504-OpenSSL-3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-73632 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170504-OpenSSL-3.png\" alt=\"\" width=\"720\" height=\"44\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170504-OpenSSL-3.png 720w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170504-OpenSSL-3-300x18.png 300w\" sizes=\"auto, (max-width: 720px) 100vw, 720px\" \/><\/a><\/p>\n<p>The flag TLS1_FLAGS_ECRYPT_THEN_MAC is already set when the ClientHello packet is sent with the Encrypt-then-MAC extension at the time of renegotiation. So the control will go inside the if condition. But because the ChangeCipherSpec message has not yet passed to the server, it does not know it must use Encrypt-then-MAC.<\/p>\n<p>Putting a break point at line no. 352 and checking the mac_size variable shows us the value 0xffffffff, which is greater than EVP_MAX_MD_SIZE (64). Thus the assertion fails and the server crashes.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170504-OpenSSL-4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-73633 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170504-OpenSSL-4.png\" alt=\"\" width=\"1050\" height=\"325\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170504-OpenSSL-4.png 1050w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170504-OpenSSL-4-300x93.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170504-OpenSSL-4-768x238.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170504-OpenSSL-4-1024x317.png 1024w\" sizes=\"auto, (max-width: 1050px) 100vw, 1050px\" \/><\/a><\/p>\n<p>Let\u2019s go to the code and find how the mac_size variable gets the value 0xffffffff. The EVP_MD_CTX_size function calculates the mac_size.<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170504-OpenSSL-5.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-73634 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170504-OpenSSL-5.png\" alt=\"\" width=\"1056\" height=\"279\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170504-OpenSSL-5.png 1056w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170504-OpenSSL-5-300x79.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170504-OpenSSL-5-768x203.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170504-OpenSSL-5-1024x271.png 1024w\" sizes=\"auto, (max-width: 1056px) 100vw, 1056px\" \/><\/a><\/p>\n<p>It returns -1 when the message digest value is null. 0xffffffff is the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Two's_complement\">two\u2019s complement<\/a> of -1. This means \u201cs-&gt;read_hash\u201d returns null as the server tries to calculate the hash using the MAC-then-encrypt mode.<\/p>\n<p>Users of McAfee products are protected from this attack by signature 0x45c09700. All administrators should update OpenSSL to the latest version.<\/p>\n<p>&nbsp;<\/p>\n<p><em>Thanks to Hardik Shah for helping me with this post. <\/em><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>OpenSSL, the popular general-purpose cryptographic library that implements SSL\/TLS protocols for web authentication, has recently suffered from several vulnerabilities. We&#8230;<\/p>\n","protected":false},"author":910,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[1814,18,4827],"coauthors":[5002],"class_list":["post-73629","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-computer-security","tag-network-security","tag-vulnerability"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Vulnerable OpenSSL Handshake Renegotiation Can Trigger Denial of Service | McAfee Blog<\/title>\n<meta name=\"description\" content=\"OpenSSL, the popular general-purpose cryptographic library that implements SSL\/TLS protocols for web authentication, has recently suffered from several\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerable OpenSSL Handshake Renegotiation Can Trigger Denial of Service | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"OpenSSL, the popular general-purpose cryptographic library that implements SSL\/TLS protocols for web authentication, has recently suffered from several\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vulnerable-openssl-handshake-renegotiation-can-trigger-denial-service\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-09T18:54:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-09T02:19:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170504-OpenSSL-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"975\" \/>\n\t<meta property=\"og:image:height\" content=\"285\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Bosco Sebastian\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bosco Sebastian\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vulnerable-openssl-handshake-renegotiation-can-trigger-denial-service\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vulnerable-openssl-handshake-renegotiation-can-trigger-denial-service\/\"},\"author\":{\"name\":\"Bosco Sebastian\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/fa34211f16b6ccfeba39d2c969693ccb\"},\"headline\":\"Vulnerable OpenSSL Handshake Renegotiation Can Trigger Denial of Service\",\"datePublished\":\"2017-05-09T18:54:01+00:00\",\"dateModified\":\"2025-06-09T02:19:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vulnerable-openssl-handshake-renegotiation-can-trigger-denial-service\/\"},\"wordCount\":611,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vulnerable-openssl-handshake-renegotiation-can-trigger-denial-service\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170504-OpenSSL-1.png\",\"keywords\":[\"computer security\",\"network security\",\"vulnerability\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vulnerable-openssl-handshake-renegotiation-can-trigger-denial-service\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vulnerable-openssl-handshake-renegotiation-can-trigger-denial-service\/\",\"name\":\"Vulnerable OpenSSL Handshake Renegotiation Can Trigger Denial of Service | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vulnerable-openssl-handshake-renegotiation-can-trigger-denial-service\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vulnerable-openssl-handshake-renegotiation-can-trigger-denial-service\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170504-OpenSSL-1.png\",\"datePublished\":\"2017-05-09T18:54:01+00:00\",\"dateModified\":\"2025-06-09T02:19:47+00:00\",\"description\":\"OpenSSL, the popular general-purpose cryptographic library that implements SSL\/TLS protocols for web authentication, has recently suffered from several\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vulnerable-openssl-handshake-renegotiation-can-trigger-denial-service\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vulnerable-openssl-handshake-renegotiation-can-trigger-denial-service\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vulnerable-openssl-handshake-renegotiation-can-trigger-denial-service\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170504-OpenSSL-1.png\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170504-OpenSSL-1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vulnerable-openssl-handshake-renegotiation-can-trigger-denial-service\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Vulnerable OpenSSL Handshake Renegotiation Can Trigger Denial of Service\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/fa34211f16b6ccfeba39d2c969693ccb\",\"name\":\"Bosco Sebastian\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/c800a46fa279d3908ffe8833409fe6a4\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1a99a3fe5e99387ff53f1d11dd03e0dc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1a99a3fe5e99387ff53f1d11dd03e0dc?s=96&d=mm&r=g\",\"caption\":\"Bosco Sebastian\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/bosco-sebastian-74732636\/\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/bosco-sebastian\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerable OpenSSL Handshake Renegotiation Can Trigger Denial of Service | McAfee Blog","description":"OpenSSL, the popular general-purpose cryptographic library that implements SSL\/TLS protocols for web authentication, has recently suffered from several","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Vulnerable OpenSSL Handshake Renegotiation Can Trigger Denial of Service | McAfee Blog","og_description":"OpenSSL, the popular general-purpose cryptographic library that implements SSL\/TLS protocols for web authentication, has recently suffered from several","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vulnerable-openssl-handshake-renegotiation-can-trigger-denial-service\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2017-05-09T18:54:01+00:00","article_modified_time":"2025-06-09T02:19:47+00:00","og_image":[{"width":975,"height":285,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/20170504-OpenSSL-1.png","type":"image\/png"}],"author":"Bosco Sebastian","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Bosco Sebastian","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vulnerable-openssl-handshake-renegotiation-can-trigger-denial-service\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vulnerable-openssl-handshake-renegotiation-can-trigger-denial-service\/"},"author":{"name":"Bosco Sebastian","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/fa34211f16b6ccfeba39d2c969693ccb"},"headline":"Vulnerable OpenSSL Handshake Renegotiation Can Trigger Denial of Service","datePublished":"2017-05-09T18:54:01+00:00","dateModified":"2025-06-09T02:19:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vulnerable-openssl-handshake-renegotiation-can-trigger-denial-service\/"},"wordCount":611,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vulnerable-openssl-handshake-renegotiation-can-trigger-denial-service\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170504-OpenSSL-1.png","keywords":["computer security","network security","vulnerability"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vulnerable-openssl-handshake-renegotiation-can-trigger-denial-service\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vulnerable-openssl-handshake-renegotiation-can-trigger-denial-service\/","name":"Vulnerable OpenSSL Handshake Renegotiation Can Trigger Denial of Service | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vulnerable-openssl-handshake-renegotiation-can-trigger-denial-service\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vulnerable-openssl-handshake-renegotiation-can-trigger-denial-service\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170504-OpenSSL-1.png","datePublished":"2017-05-09T18:54:01+00:00","dateModified":"2025-06-09T02:19:47+00:00","description":"OpenSSL, the popular general-purpose cryptographic library that implements SSL\/TLS protocols for web authentication, has recently suffered from several","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vulnerable-openssl-handshake-renegotiation-can-trigger-denial-service\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vulnerable-openssl-handshake-renegotiation-can-trigger-denial-service\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vulnerable-openssl-handshake-renegotiation-can-trigger-denial-service\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170504-OpenSSL-1.png","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/05\/20170504-OpenSSL-1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/vulnerable-openssl-handshake-renegotiation-can-trigger-denial-service\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Vulnerable OpenSSL Handshake Renegotiation Can Trigger Denial of Service"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/fa34211f16b6ccfeba39d2c969693ccb","name":"Bosco Sebastian","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/c800a46fa279d3908ffe8833409fe6a4","url":"https:\/\/secure.gravatar.com\/avatar\/1a99a3fe5e99387ff53f1d11dd03e0dc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1a99a3fe5e99387ff53f1d11dd03e0dc?s=96&d=mm&r=g","caption":"Bosco Sebastian"},"sameAs":["https:\/\/www.linkedin.com\/in\/bosco-sebastian-74732636\/"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/bosco-sebastian\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/73629","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/910"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=73629"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/73629\/revisions"}],"predecessor-version":[{"id":215280,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/73629\/revisions\/215280"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=73629"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=73629"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=73629"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=73629"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}