You are viewing a plain text version of this content. The canonical link for it is here.
Posted to issues@trafficserver.apache.org by "Brian Geffon (JIRA)" <ji...@apache.org> on 2014/10/10 01:48:34 UTC
[jira] [Updated] (TS-3125) SSL ctx is set to a constant allowing
for potential inappropriate session reuse.
[ https://issues.apache.org/jira/browse/TS-3125?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]
Brian Geffon updated TS-3125:
-----------------------------
Attachment: ssl-session-ctx-id.patch
> SSL ctx is set to a constant allowing for potential inappropriate session reuse.
> --------------------------------------------------------------------------------
>
> Key: TS-3125
> URL: https://issues.apache.org/jira/browse/TS-3125
> Project: Traffic Server
> Issue Type: Bug
> Components: Core, SSL
> Reporter: Brian Geffon
> Assignee: Brian Geffon
> Attachments: ssl-session-ctx-id.patch
>
>
> We have the following chunk of code in TS
> {code}
> // XXX I really don't think that this is a good idea. We should be setting this a some finer granularity,
> // possibly per SSL CTX. httpd uses md5(host:port), which seems reasonable.
> session_id_context = 1;
> SSL_CTX_set_session_id_context(ctx, (const unsigned char *) &session_id_context, sizeof(session_id_context));
> {code}
> This is 100% broken and needs to be fixed. I believe [~jpeach@apache.org] raised concerns about this in the past, after reading OpenSSL documentation this is completely broken.
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)