[Pkg-openssl-changes] r433 - in openssl/branches/lenny: crypto/x509 debian
Kurt Roeckx
kroeckx at alioth.debian.org
Fri Sep 11 15:00:53 UTC 2009
Author: kroeckx
Date: 2009-09-11 15:00:53 +0000 (Fri, 11 Sep 2009)
New Revision: 433
Modified:
openssl/branches/lenny/crypto/x509/x509_vfy.c
openssl/branches/lenny/debian/changelog
Log:
Don't check self signed certificate signatures in X509_verify_cert()
(Closes: #541735)
Modified: openssl/branches/lenny/crypto/x509/x509_vfy.c
===================================================================
--- openssl/branches/lenny/crypto/x509/x509_vfy.c 2009-09-11 14:59:39 UTC (rev 432)
+++ openssl/branches/lenny/crypto/x509/x509_vfy.c 2009-09-11 15:00:53 UTC (rev 433)
@@ -982,7 +982,11 @@
while (n >= 0)
{
ctx->error_depth=n;
- if (!xs->valid)
+
+ /* Skip signature check for self signed certificates. It
+ * doesn't add any security and just wastes time.
+ */
+ if (!xs->valid && xs != xi)
{
if ((pkey=X509_get_pubkey(xi)) == NULL)
{
@@ -992,13 +996,6 @@
if (!ok) goto end;
}
else if (X509_verify(xs,pkey) <= 0)
- /* XXX For the final trusted self-signed cert,
- * this is a waste of time. That check should
- * optional so that e.g. 'openssl x509' can be
- * used to detect invalid self-signatures, but
- * we don't verify again and again in SSL
- * handshakes and the like once the cert has
- * been declared trusted. */
{
ctx->error=X509_V_ERR_CERT_SIGNATURE_FAILURE;
ctx->current_cert=xs;
Modified: openssl/branches/lenny/debian/changelog
===================================================================
--- openssl/branches/lenny/debian/changelog 2009-09-11 14:59:39 UTC (rev 432)
+++ openssl/branches/lenny/debian/changelog 2009-09-11 15:00:53 UTC (rev 433)
@@ -1,3 +1,10 @@
+openssl (0.9.8g-15+lenny5) stable-security; urgency=low
+
+ * Don't check self signed certificate signatures in X509_verify_cert()
+ (Closes: #541735)
+
+ -- Kurt Roeckx <kurt at roeckx.be> Fri, 11 Sep 2009 17:00:05 +0200
+
openssl (0.9.8g-15+lenny4) stable-security; urgency=low
* Remove MD2 from digest algorithm table. (CVE-2009-2409) (Closes: #539899)
More information about the Pkg-openssl-changes
mailing list