diff options
author | Nikos Mavrogiannopoulos <nmav@redhat.com> | 2016-04-29 12:57:23 +0200 |
---|---|---|
committer | Nikos Mavrogiannopoulos <nmav@redhat.com> | 2016-04-29 12:57:23 +0200 |
commit | 6e4864e54febd729fb84ec7441e84ef94983ebea (patch) | |
tree | 40295d25d2cbdd40d377d12d31997198fa07db2c /NEWS | |
parent | 0616a47b407ee7835a7767306411769c4645ca6e (diff) | |
download | gnutls-6e4864e54febd729fb84ec7441e84ef94983ebea.tar.gz |
doc update
Diffstat (limited to 'NEWS')
-rw-r--r-- | NEWS | 14 |
1 files changed, 9 insertions, 5 deletions
@@ -18,11 +18,15 @@ See the end for copying conditions. ** libgnutls: Added new APIs to access the FIPS186-4 (Shawe-Taylor based) provable RSA and DSA parameter generation from a seed. -** libgnutls: On a rehandshake ensure that the certificate of the peer (if - available) is the same as in previous handshakes. That is to protect - applications which do not check user credentials on rehandshakes from - attacks related to unsafe renegotiation. This can be overriden using - the %GNUTLS_ALLOW_ID_CHANGE flag in gnutls_init(). +** libgnutls: On a rehandshake ensure that the certificate of the peer or + its username remains the same as in previous handshakes. That is to protect + applications which do not check user credentials on rehandshakes. The + threat to address depends on the application protocol. Primarily it + protects against applications which authenticate the peer initially and + perform accounting using the session's information, from being misled + by a rehandshake which switches the peer's identity. Applications can + disable this protection by using the %GNUTLS_ALLOW_ID_CHANGE flag in + gnutls_init(). ** libgnutls: Be strict in TLS extension decoding. That is, do not tolerate parsing errors in the extensions field and treat it as a typical Hello |