You are viewing a plain text version of this content. The canonical link for it is here.
Posted to c-dev@axis.apache.org by "Bill Blough (Jira)" <ji...@apache.org> on 2020/01/28 17:53:00 UTC

[jira] [Comment Edited] (AXIS2C-1619) CVE-2012-6107: SSL/TLS Hostname validation

    [ https://issues.apache.org/jira/browse/AXIS2C-1619?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16920249#comment-16920249 ] 

Bill Blough edited comment on AXIS2C-1619 at 1/28/20 5:52 PM:
--------------------------------------------------------------

Code to validate peer name (CN/SAN) added in r1866225 and r1866245.    Behavior can be toggled via axis2_http_client, and currently defaults to disabled for backwards compatibility reasons.  Will default to enabled in a future release.


was (Author: bblough):
Code to validate peer name (CN/SAN) added in r1866225.    Behavior can be toggled via axis2_http_client, and currently defaults to disabled for backwards compatibility reasons.  Will default to enabled in a future release.

> CVE-2012-6107: SSL/TLS Hostname validation
> ------------------------------------------
>
>                 Key: AXIS2C-1619
>                 URL: https://issues.apache.org/jira/browse/AXIS2C-1619
>             Project: Axis2-C
>          Issue Type: Bug
>          Components: transport/http
>            Reporter: Seth Arnold
>            Priority: Major
>
> I've looked through the source code and cannot find any peer hostname validation code. It appears to me that Axis2/c is vulnerable to the problems discussed in this paper: http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf
> Have I overlooked the TLS / SSL peer name validation?
> Thanks



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

---------------------------------------------------------------------
To unsubscribe, e-mail: c-dev-unsubscribe@axis.apache.org
For additional commands, e-mail: c-dev-help@axis.apache.org