You are viewing a plain text version of this content. The canonical link for it is here.
Posted to cvs@httpd.apache.org by jo...@apache.org on 2010/02/04 12:25:54 UTC

svn commit: r906454 - /httpd/httpd/trunk/docs/manual/mod/mod_ssl.xml

Author: jorton
Date: Thu Feb  4 11:25:54 2010
New Revision: 906454

URL: http://svn.apache.org/viewvc?rev=906454&view=rev
Log:
* docs/manual/mod/mod_ssl.xml: Warn more clearly about
the security impact of SSLInsecureRenegotiation.

Modified:
    httpd/httpd/trunk/docs/manual/mod/mod_ssl.xml

Modified: httpd/httpd/trunk/docs/manual/mod/mod_ssl.xml
URL: http://svn.apache.org/viewvc/httpd/httpd/trunk/docs/manual/mod/mod_ssl.xml?rev=906454&r1=906453&r2=906454&view=diff
==============================================================================
--- httpd/httpd/trunk/docs/manual/mod/mod_ssl.xml (original)
+++ httpd/httpd/trunk/docs/manual/mod/mod_ssl.xml Thu Feb  4 11:25:54 2010
@@ -1781,6 +1781,7 @@
 <contextlist><context>server config</context>
 <context>virtual host</context></contextlist>
 <compatibility>Available in httpd 2.3 and later, if using OpenSSL 1.0.0 Beta 5 or later</compatibility>
+<default>SSLInsecureRenegotiation off</default>
 
 <usage>
 <p>As originally specified, all versions of the SSL and TLS protocols
@@ -1795,15 +1796,23 @@
 <p>If <module>mod_ssl</module> is linked against OpenSSL version 1.0.0
 Beta 5 or later, by default renegotiation is only supported with
 clients supporting the new protocol extension.  If this directive is
-enabled, renegotiation will be allowed with old (unpatched) clients.
-SSL connections will be vulnerable to the prefix attack as described
-above if this directive is enabled.  The <code>SSL_SECURE_RENEG</code>
-variable can be used to determine whether secure renegotiation is
-supported for a given SSL connection.</p>
+enabled, renegotiation will be allowed with old (unpatched) clients,
+albeit insecurely.</p>
+
+<note type="warning"><title>Security warning</title>
+<p>If this directive is enabled, SSL connections will be vulnerable to
+the Man-in-the-Middle prefix attack as described
+in <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2009-3555">CVE-2009-3555</a>.</p>
+</note>
 
 <example><title>Example</title>
 SSLInsecureRenegotiation on
 </example>
+
+<p>The <code>SSL_SECURE_RENEG</code> environment variable can be used
+from an SSI or CGI script to determine whether secure renegotiation is
+supported for a given SSL connection.</p>
+
 </usage>
 </directivesynopsis>