|
Description: disable session caching in the server (as opposed to in the
|
|
config, which would be way harder to get right) to address
|
|
https://security-tracker.debian.org/tracker/CVE-2017-9148
|
|
Author: Michael Stapelberg <stapelberg@debian.org>
|
|
Forwarded: not-needed
|
|
Last-Update: 2017-05-30
|
|
|
|
---
|
|
|
|
--- a/src/main/tls.c
|
|
+++ b/src/main/tls.c
|
|
@@ -369,7 +369,7 @@ tls_session_t *tls_new_session(TALLOC_CT
|
|
*
|
|
* FIXME: Also do it every N sessions?
|
|
*/
|
|
- if (conf->session_cache_enable &&
|
|
+ if (/*conf->session_cache_enable*/0 &&
|
|
((conf->session_last_flushed + ((int)conf->session_timeout * 1800)) <= request->timestamp)){
|
|
RDEBUG2("Flushing SSL sessions (of #%ld)", SSL_CTX_sess_number(conf->ctx));
|
|
|
|
@@ -463,7 +463,7 @@ tls_session_t *tls_new_session(TALLOC_CT
|
|
state->mtu = vp->vp_integer;
|
|
}
|
|
|
|
- if (conf->session_cache_enable) state->allow_session_resumption = true; /* otherwise it's false */
|
|
+ if (/*conf->session_cache_enable*/0) state->allow_session_resumption = true; /* otherwise it's false */
|
|
|
|
return state;
|
|
}
|
|
@@ -2675,7 +2675,7 @@ post_ca:
|
|
/*
|
|
* Callbacks, etc. for session resumption.
|
|
*/
|
|
- if (conf->session_cache_enable) {
|
|
+ if (/*conf->session_cache_enable*/0) {
|
|
/*
|
|
* Cache sessions on disk if requested.
|
|
*/
|
|
@@ -2745,7 +2745,7 @@ post_ca:
|
|
/*
|
|
* Setup session caching
|
|
*/
|
|
- if (conf->session_cache_enable) {
|
|
+ if (/*conf->session_cache_enable*/0) {
|
|
/*
|
|
* Create a unique context Id per EAP-TLS configuration.
|
|
*/
|