]> git.ipfire.org Git - thirdparty/openssl.git/commit
Stop a TLSv1.3 server emitting an unsolicited PSK extension
authorMatt Caswell <matt@openssl.org>
Thu, 8 May 2025 13:54:35 +0000 (14:54 +0100)
committerTomas Mraz <tomas@openssl.org>
Tue, 13 May 2025 12:12:21 +0000 (14:12 +0200)
commitaa8bca2e81030560d690cb68bbcbe8b7d00d1d29
treee27b3ab0fe2c2c110d90498db1570a588dafc6a0
parent831cbbb5dd4a569b12f3f1ae9a6688ccee8edd24
Stop a TLSv1.3 server emitting an unsolicited PSK extension

If we attempt to accept a connection on an SSL object, and the
application has set an SSL_SESSION on that SSL object then we
can mistakenly believe that we are resuming and
emit an unsolicited PSK extension back to the client.

This can especially happen when using SSL_clear() which leaves
any SSL_SESSION associated with the SSL object.

See
https://github.com/openssl/openssl/discussions/27563#discussioncomment-13049352
and
https://github.com/openssl/openssl/discussions/24567

Reviewed-by: Todd Short <todd.short@me.com>
Reviewed-by: Tomas Mraz <tomas@openssl.org>
(Merged from https://github.com/openssl/openssl/pull/27584)
ssl/ssl_sess.c
test/sslapitest.c