Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(37)

Issue 12327032: When performing an SSL renegotiation and requesting a certificate status, clear any existing certif… (Closed)

Created:
7 years, 10 months ago by Ryan Sleevi
Modified:
7 years, 10 months ago
Reviewers:
wtc, agl
CC:
chromium-reviews, cbentzel+watch_chromium.org, darin-cc_chromium.org, wtc
Visibility:
Public.

Description

When performing an SSL renegotiation and requesting a certificate status, clear any existing certificate status messages received. Failure to clear the status results in handshake failures. BUG=170328 TEST=See bug Committed: https://src.chromium.org/viewvc/chrome?view=rev&revision=184270

Patch Set 1 #

Total comments: 1

Patch Set 2 : Review feedback #

Total comments: 1
Unified diffs Side-by-side diffs Delta from patch set Stats (+4 lines, -0 lines) Patch
M net/third_party/nss/ssl/ssl3con.c View 1 1 chunk +4 lines, -0 lines 1 comment Download

Messages

Total messages: 11 (0 generated)
Ryan Sleevi
agl: PTAL wtc: Since you're under the weather, FYI. I guess this is another example ...
7 years, 10 months ago (2013-02-21 03:06:00 UTC) #1
agl
I wish we could just remove support for renegotiation :( https://codereview.chromium.org/12327032/diff/1/net/third_party/nss/ssl/ssl3ext.c File net/third_party/nss/ssl/ssl3ext.c (right): https://codereview.chromium.org/12327032/diff/1/net/third_party/nss/ssl/ssl3ext.c#newcode736 ...
7 years, 10 months ago (2013-02-21 14:57:02 UTC) #2
Ryan Sleevi
On 2013/02/21 14:57:02, agl wrote: > I wish we could just remove support for renegotiation ...
7 years, 10 months ago (2013-02-21 18:01:07 UTC) #3
agl
On Thu, Feb 21, 2013 at 1:01 PM, <rsleevi@chromium.org> wrote: > I'm not sure I ...
7 years, 10 months ago (2013-02-21 18:10:21 UTC) #4
Ryan Sleevi
On Thu, Feb 21, 2013 at 10:10 AM, Adam Langley <agl@chromium.org> wrote: > On Thu, ...
7 years, 10 months ago (2013-02-21 19:38:23 UTC) #5
agl
lgtm
7 years, 10 months ago (2013-02-21 19:48:09 UTC) #6
Ryan Sleevi
Ok, after looking at tlslite in more detail, I think the renego support there is ...
7 years, 10 months ago (2013-02-23 00:46:56 UTC) #7
commit-bot: I haz the power
CQ is trying da patch. Follow status at https://chromium-status.appspot.com/cq/rsleevi@chromium.org/12327032/7001
7 years, 10 months ago (2013-02-23 00:49:51 UTC) #8
commit-bot: I haz the power
Change committed as 184270
7 years, 10 months ago (2013-02-23 02:56:35 UTC) #9
wtc
Patch set 2 LGTM. Thanks. https://codereview.chromium.org/12327032/diff/7001/net/third_party/nss/ssl/ssl3con.c File net/third_party/nss/ssl/ssl3con.c (right): https://codereview.chromium.org/12327032/diff/7001/net/third_party/nss/ssl/ssl3con.c#newcode4190 net/third_party/nss/ssl/ssl3con.c:4190: } This is a ...
7 years, 10 months ago (2013-02-25 23:59:21 UTC) #10
Ryan Sleevi
7 years, 10 months ago (2013-02-26 00:07:17 UTC) #11
Message was sent while issue was closed.
On 2013/02/25 23:59:21, wtc wrote:
> Patch set 2 LGTM. Thanks.
> 
>
https://codereview.chromium.org/12327032/diff/7001/net/third_party/nss/ssl/ss...
> File net/third_party/nss/ssl/ssl3con.c (right):
> 
>
https://codereview.chromium.org/12327032/diff/7001/net/third_party/nss/ssl/ss...
> net/third_party/nss/ssl/ssl3con.c:4190: }
> 
> This is a good place to clear these two members.
> 
> NOTE: This bug seems similar to a bug you fixed before:
> 
> ----------------------------
> revision 1.150
> date: 2011/01/22 02:25:06;  author: wtc%google.com;  state: Exp;  lines: +20
-22
> Bug 616757: in ssl3_SendCertificateVerify, we must destroy
> ss->ssl3.clientPrivateKey for all key exchange algorithms, otherwise we
> will send a Certificate message in renegotiation even if the renegotiation
> doesn't request client auth.  Move the cleanup of clientCertChain and
> clientPrivateKey from ssl3_HandleCertificateRequest to
> ssl3_HandleServerHello as a second defense.  The patch is contributed by
> Ryan Sleevi <mailto:ryan.sleevi@gmail.com>.  r=wtc.
> ----------------------------
> 
> In that bug, we clear the relevant members in ssl3_HandleServerHello. I don't
> know why we didn't add
> that code to ssl3_SendClientHello. Do you remember?

Nope.

> 
> It would be nice to consolidate the code all in this
> function.

Agreed. That said, this code is part of our 'private fork' - Kai's upstream has
substantially changed this. Once we integrate NSS 3.14.3, we can revisit this
(esp. if Kai's stuff is affected)

I agree that cleanup should happen when sending the client hello, since we want
to make sure our state machine is prepared for any potentially bad/malicious
data.

Powered by Google App Engine
This is Rietveld 408576698