Closed
Bug 1553443
Opened 6 years ago
Closed 5 years ago
post-handshake authentication with selfserv and openssl fails if SSL_ENABLE_SESSION_TICKETS is set
Categories
(NSS :: Libraries, defect)
Tracking
(Not tracked)
RESOLVED
FIXED
3.45
People
(Reporter: hkario, Unassigned)
Details
Attachments
(1 file)
When selfserv is configured with support for session resumption (-u option), the post-handshake authentication is rejected by NSS with a decrypt_error (suggesting that NSS considers the signature to be incorrect).
When server doesn't send NewSessionTicket messages, the authentication succeeds, which would suggest that the fix from bug 1532312 was incomplete.
Tests ran with 3.44.0
Reporter | ||
Comment 1•6 years ago
|
||
I didn't check interaction with KeyUpdate messages, but I'm afraid they're affected too
Reporter | ||
Updated•6 years ago
|
Summary: post-handshake authentication with selfserv and openssl fails → post-handshake authentication with selfserv and openssl fails (NewSessionTicket case)
Updated•6 years ago
|
Summary: post-handshake authentication with selfserv and openssl fails (NewSessionTicket case) → post-handshake authentication with selfserv and openssl fails if SSL_ENABLE_SESSION_TICKETS is set
Comment 2•6 years ago
|
||
Comment 3•6 years ago
|
||
(In reply to Hubert Kario from comment #1)
I didn't check interaction with KeyUpdate messages, but I'm afraid they're affected too
That should be okay; the problem is that NST is sent before marking the handshake as completed.
Comment 4•5 years ago
|
||
Status: NEW → RESOLVED
Closed: 5 years ago
Resolution: --- → FIXED
Target Milestone: --- → 3.45
You need to log in
before you can comment on or make changes to this bug.
Description
•