Branch: refs/heads/master
  Home:   https://github.com/OpenSIPS/opensips
  Commit: b1c67295c1ae5937df316df3152b8ecf4da6e067
      
https://github.com/OpenSIPS/opensips/commit/b1c67295c1ae5937df316df3152b8ecf4da6e067
  Author: Vlad Patrascu <vl...@opensips.org>
  Date:   2021-08-17 (Tue, 17 Aug 2021)

  Changed paths:
    M modules/tls_wolfssl/wolfssl.c
    M modules/tls_wolfssl/wolfssl_conn_ops.c

  Log Message:
  -----------
  tls_wolfssl: fix behavior of is_peer_verified() with session tickets

If TLS session tickets were used for session resuming, the
is_peer_verified() script function would not be able to verify the peer
even if it did present a valid certificate in the initial TLS handshake.

Even so, this fix can only guarantee that the peer can be verified when
resuming a session, if the TLS domain is configured to require a peer
certificate initially. Otherwise, wolfssl does not provide a way of
retrieving the peer certificate from the received session ticket.

Fixes #2541



_______________________________________________
Devel mailing list
Devel@lists.opensips.org
http://lists.opensips.org/cgi-bin/mailman/listinfo/devel

Reply via email to