diff options
author | Bodo Möller <bodo@openssl.org> | 2007-03-21 14:33:16 +0000 |
---|---|---|
committer | Bodo Möller <bodo@openssl.org> | 2007-03-21 14:33:16 +0000 |
commit | 0f32c841a678d3a3cfb544243f9f672b22ed2dc3 (patch) | |
tree | 3bfc5f11d209350d43ba2b327d2de678dd561519 /CHANGES | |
parent | 41a8d5167f4325c83fed1e2e818e5280fbb711cf (diff) | |
download | openssl-0f32c841a678d3a3cfb544243f9f672b22ed2dc3.tar.gz |
stricter session ID context matching
Diffstat (limited to 'CHANGES')
-rw-r--r-- | CHANGES | 30 |
1 files changed, 28 insertions, 2 deletions
@@ -2,7 +2,7 @@ OpenSSL CHANGES _______________ - Changes between 0.9.8e and 0.9.9 [xx XXX xxxx] + Changes between 0.9.8f and 0.9.9 [xx XXX xxxx] *) Change ssl_cipher_apply_rule(), the internal function that does the work each time a ciphersuite string requests enabling @@ -481,13 +481,26 @@ *) Change 'Configure' script to enable Camellia by default. [NTT] - Changes between 0.9.8d and 0.9.8e [23 Feb 2007] + Changes between 0.9.8e and 0.9.8f [xx XXX xxxx] + + *) In the SSL/TLS server implementation, be strict about session ID + context matching (which matters if an application uses a single + external cache for different purposes). Previously, + out-of-context reuse was forbidden only if SSL_VERIFY_PEER was + set. This did ensure strict client verification, but meant that, + with applications using a single external cache for quite + different requirements, clients could circumvent ciphersuite + restrictions for a given session ID context by starting a session + in a different context. + [Bodo Moeller] *) Include "!eNULL" in SSL_DEFAULT_CIPHER_LIST to make sure that a ciphersuite string such as "DEFAULT:RSA" cannot enable authentication-only ciphersuites. [Bodo Moeller] + Changes between 0.9.8d and 0.9.8e [23 Feb 2007] + *) Since AES128 and AES256 (and similarly Camellia128 and Camellia256) share a single mask bit in the logic of ssl/ssl_ciph.c, the code for masking out disabled ciphers needs a @@ -1526,6 +1539,19 @@ differing sizes. [Richard Levitte] + Changes between 0.9.7m and 0.9.7n [xx XXX xxxx] + + *) In the SSL/TLS server implementation, be strict about session ID + context matching (which matters if an application uses a single + external cache for different purposes). Previously, + out-of-context reuse was forbidden only if SSL_VERIFY_PEER was + set. This did ensure strict client verification, but meant that, + with applications using a single external cache for quite + different requirements, clients could circumvent ciphersuite + restrictions for a given session ID context by starting a session + in a different context. + [Bodo Moeller] + Changes between 0.9.7l and 0.9.7m [23 Feb 2007] *) Cleanse PEM buffers before freeing them since they may contain |