Skip to content
Snippets Groups Projects
Commit ae562df5 authored by Niels Möller's avatar Niels Möller
Browse files

Fix for Bleichenbacher's chosen ciphertext attack. Basically, don't

send an ALERT-messages immediately if decryption of the session key
failes. Continue handshaking as if nothing is wrong.

Either some other invalid message is recieved, and handshaking failes
at that time, or the client sends a change cipher message, followed by
a completely garbled finished-message (as the server and client will
not be using the same keys), or the client will wait for ever for an
answer.

Rev: lib/modules/SSL.pmod/handshake.pike:1.9
parent 24b58ec7
No related branches found
No related tags found
Loading
Loading
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment