mirror of
https://github.com/cuberite/polarssl.git
synced 2025-09-24 05:00:45 -04:00
Changelog entries for requiring mbedls_ssl_set_hostname() in TLS clients
Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
This commit is contained in:
parent
11f74c5751
commit
20c7748575
18
ChangeLog.d/mbedtls_ssl_set_hostname.txt
Normal file
18
ChangeLog.d/mbedtls_ssl_set_hostname.txt
Normal file
@ -0,0 +1,18 @@
|
||||
Default behavior changes
|
||||
* In TLS clients, if mbedtls_ssl_set_hostname() has not been called,
|
||||
mbedtls_ssl_handshake() now fails with
|
||||
MBEDTLS_ERR_SSL_CERTIFICATE_VERIFICATION_WITHOUT_HOSTNAME
|
||||
if certificate-based authentication of the server is attempted.
|
||||
This is because authenticating a server without knowing what name
|
||||
to expect is usually insecure. To restore the old behavior, either
|
||||
call mbedtls_ssl_set_hostname() with NULL as the hostname, or
|
||||
enable the new compile-time option
|
||||
MBEDTLS_SSL_CLI_ALLOW_WEAK_CERTIFICATE_VERIFICATION_WITHOUT_HOSTNAME.
|
||||
|
||||
Security
|
||||
* Note that TLS clients should generally call mbedtls_ssl_set_hostname()
|
||||
if they use certificate authentication (i.e. not pre-shared keys).
|
||||
Otherwise, in many scenarios, the server could be impersonated.
|
||||
The library will now prevent the handshake and return
|
||||
MBEDTLS_ERR_SSL_CERTIFICATE_VERIFICATION_WITHOUT_HOSTNAME
|
||||
if mbedtls_ssl_set_hostname() has not been called.
|
Loading…
x
Reference in New Issue
Block a user