[
https://issues.apache.org/jira/browse/AXIS2C-1619?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16920249#comment-16920249
]
Bill Blough commented on AXIS2C-1619:
-------------------------------------
Code to validate peer name (CN/SAN) added in r1866225. Behavior can be
toggled via axis2_http_client, and currently defaults to disabled for backwards
compatibility reasons. Will default to enabled in a future release.
> CVE-2012-6107: SSL/TLS Hostname validation
> ------------------------------------------
>
> Key: AXIS2C-1619
> URL: https://issues.apache.org/jira/browse/AXIS2C-1619
> Project: Axis2-C
> Issue Type: Bug
> Components: transport/http
> Reporter: Seth Arnold
> Priority: Major
>
> I've looked through the source code and cannot find any peer hostname
> validation code. It appears to me that Axis2/c is vulnerable to the problems
> discussed in this paper: http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf
> Have I overlooked the TLS / SSL peer name validation?
> Thanks
--
This message was sent by Atlassian Jira
(v8.3.2#803003)
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]