Skip to content
This repository has been archived by the owner on May 24, 2022. It is now read-only.

Disable tls ticket extention using multiple hosts share cache updates. #52

Closed
wants to merge 5 commits into from

Conversation

EmericBr
Copy link

@EmericBr EmericBr commented Nov 7, 2011

To complete #50.

dpaneda and others added 5 commits October 20, 2011 13:26
If OpenSSL is too old, it does not properly associate renegotiation
handshakes with an existing connection, which allows man-in-the-middle
attackers to insert data into HTTPS sessions, and possibly other types
of sessions protected by TLS or SSL, by sending an unauthenticated
request that is processed retroactively by a server in a
post-renegotiation context, related to a "plaintext injection" attack,
aka the "Project Mogul" issue.

If OpenSSL is recent enough, it will use SSL secure renegotiation
instead (RFC 5746). However, this feature allows an attacker to
trigger easily a lot of handshake which would allow to DoS the server.

At least, there seems to be no easy way to tell if OpenSSL is
vulnerable to CVE-2009-3555 and therefore, in doubt, it may be better
to disable renegotiation.
Patch to set SO_KEEPALIVE on client socket
@EmericBr
Copy link
Author

Recreate proper pull request in #60

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants