Description: disable session caching in the server (as opposed to in the config, which would be way harder to get right) to address https://security-tracker.debian.org/tracker/CVE-2017-9148 Author: Michael Stapelberg Forwarded: not-needed Last-Update: 2017-05-30 --- --- a/src/main/tls.c +++ b/src/main/tls.c @@ -369,7 +369,7 @@ tls_session_t *tls_new_session(TALLOC_CT * * FIXME: Also do it every N sessions? */ - if (conf->session_cache_enable && + if (/*conf->session_cache_enable*/0 && ((conf->session_last_flushed + ((int)conf->session_timeout * 1800)) <= request->timestamp)){ RDEBUG2("Flushing SSL sessions (of #%ld)", SSL_CTX_sess_number(conf->ctx)); @@ -463,7 +463,7 @@ tls_session_t *tls_new_session(TALLOC_CT state->mtu = vp->vp_integer; } - if (conf->session_cache_enable) state->allow_session_resumption = true; /* otherwise it's false */ + if (/*conf->session_cache_enable*/0) state->allow_session_resumption = true; /* otherwise it's false */ return state; } @@ -2675,7 +2675,7 @@ post_ca: /* * Callbacks, etc. for session resumption. */ - if (conf->session_cache_enable) { + if (/*conf->session_cache_enable*/0) { /* * Cache sessions on disk if requested. */ @@ -2745,7 +2745,7 @@ post_ca: /* * Setup session caching */ - if (conf->session_cache_enable) { + if (/*conf->session_cache_enable*/0) { /* * Create a unique context Id per EAP-TLS configuration. */