untrusted comment: verify with openbsd-67-base.pub RWRmkIA877Io3u4xquVACayb1uI1KLL/br6KM8ES3ZXMfWxjyjNOahBqFF5UJYbMZ0zYtOW37QAHXnpZ070YDRkdL69KclNK8g4= OpenBSD 6.7 errata 015, July 27, 2020: In rpki-client, incorrect use of EVP_PKEY_cmp allows an authentication bypass. Apply by doing: signify -Vep /etc/signify/openbsd-67-base.pub -x 015_rpki.patch.sig \ -m - | (cd /usr/src && patch -p0) And then rebuild and install rpki-client: cd /usr/src/usr.sbin/rpki-client make obj make make install Index: usr.sbin/rpki-client/cert.c =================================================================== RCS file: /cvs/src/usr.sbin/rpki-client/cert.c,v diff -u -p -u -r1.15 cert.c --- usr.sbin/rpki-client/cert.c 2 Apr 2020 09:16:43 -0000 1.15 +++ usr.sbin/rpki-client/cert.c 23 Jul 2020 16:00:06 -0000 @@ -1128,7 +1128,7 @@ ta_parse(X509 **xp, const char *fn, cons if ((opk = X509_get_pubkey(*xp)) == NULL) cryptowarnx("%s: RFC 6487 (trust anchor): " "missing pubkey", fn); - else if (!EVP_PKEY_cmp(pk, opk)) + else if (EVP_PKEY_cmp(pk, opk) != 1) cryptowarnx("%s: RFC 6487 (trust anchor): " "pubkey does not match TAL pubkey", fn); else @@ -1136,8 +1136,7 @@ ta_parse(X509 **xp, const char *fn, cons EVP_PKEY_free(pk); EVP_PKEY_free(opk); - } else - rc = 1; + } if (rc == 0) { cert_free(p);