X-Git-Url: https://git.openssl.org/gitweb/?p=openssl.git;a=blobdiff_plain;f=CHANGES;h=6d23d8131dcdcb463ca38e2f0ebcd5b10e769fad;hp=0d9bd505c3ce56f8f0d79d54da6f57efabd5e315;hb=31832e8ff1a3e731ea9fab41aef071a12709cf33;hpb=de2c7504ebd4ec15334ae151a31917753468f86f diff --git a/CHANGES b/CHANGES index 0d9bd505c3..6d23d8131d 100644 --- a/CHANGES +++ b/CHANGES @@ -303,18 +303,7 @@ whose return value is often ignored. [Steve Henson] - Changes between 1.0.1j and 1.0.2 [xx XXX xxxx] - - *) Tighten client-side session ticket handling during renegotiation: - ensure that the client only accepts a session ticket if the server sends - the extension anew in the ServerHello. Previously, a TLS client would - reuse the old extension state and thus accept a session ticket if one was - announced in the initial ServerHello. - - Similarly, ensure that the client requires a session ticket if one - was advertised in the ServerHello. Previously, a TLS client would - ignore a missing NewSessionTicket message. - [Emilia Käsper] + Changes between 1.0.1k and 1.0.2 [xx XXX xxxx] *) Accelerated NIST P-256 elliptic curve implementation for x86_64 (other platforms pending). @@ -638,6 +627,11 @@ Changes between 1.0.1j and 1.0.1k [xx XXX xxxx] + *) Tighten handling of the ChangeCipherSpec (CCS) message: reject + early CCS messages during renegotiation. (Note that because + renegotiation is encrypted, this early CCS was not exploitable.) + [Emilia Käsper] + *) Tighten client-side session ticket handling during renegotiation: ensure that the client only accepts a session ticket if the server sends the extension anew in the ServerHello. Previously, a TLS client would