Skip to content
  1. Mar 21, 2018
    • Benjamin Kaduk's avatar
      Do not cache sessions with zero sid_ctx_length when SSL_VERIFY_PEER · 8e405776
      Benjamin Kaduk authored
      
      
      The sid_ctx is something of a "certificate request context" or a
      "session ID context" -- something from the application that gives
      extra indication of what sort of thing this session is/was for/from.
      Without a sid_ctx, we only know that there is a session that we
      issued, but it could have come from a number of things, especially
      with an external (shared) session cache.  Accordingly, when resuming,
      we will hard-error the handshake when presented with a session with
      zero-length sid_ctx and SSL_VERIFY_PEER is set -- we simply have no
      information about the peer to verify, so the verification must fail.
      
      In order to prevent these future handshake failures, proactively
      decline to add the problematic sessions to the session cache.
      
      Reviewed-by: default avatarMatt Caswell <matt@openssl.org>
      (Merged from https://github.com/openssl/openssl/pull/5175)
      
      (cherry picked from commit d316cdcf)
      8e405776
  2. Mar 20, 2018
  3. Mar 19, 2018
  4. Mar 17, 2018
  5. Mar 15, 2018
  6. Mar 12, 2018
  7. Mar 11, 2018
  8. Mar 10, 2018
  9. Mar 09, 2018
  10. Mar 08, 2018
  11. Mar 07, 2018
  12. Mar 06, 2018
  13. Mar 04, 2018
  14. Mar 03, 2018
  15. Mar 01, 2018