diff options
author | Jeremy Harris <jgh146exb@wizmail.org> | 2019-02-16 12:59:23 +0000 |
---|---|---|
committer | Jeremy Harris <jgh146exb@wizmail.org> | 2019-02-16 12:59:23 +0000 |
commit | fc243e944ec00b59b75f41d07494116f925d58b4 (patch) | |
tree | f297ea2e8ce5aa02c105c9b842d0d53523d8a62e /doc | |
parent | 882bc1704d33aa34873e3a0f72e657b0cc2985e5 (diff) |
GnuTLS: Fix client detection of server reject of client cert under TLS1.3
Diffstat (limited to 'doc')
-rw-r--r-- | doc/doc-txt/ChangeLog | 9 |
1 files changed, 8 insertions, 1 deletions
diff --git a/doc/doc-txt/ChangeLog b/doc/doc-txt/ChangeLog index 18db733aa..6a9aae365 100644 --- a/doc/doc-txt/ChangeLog +++ b/doc/doc-txt/ChangeLog @@ -11,7 +11,7 @@ Exim version 4.93 JH/01 OpenSSL: With debug enabled output keying information sufficient, server side, to decode a TLS 1.3 packet capture. -JH/02 OpenSSL: suppress the sending of (stateful) TLS1.3 session tickets. +JH/02 OpenSSL: Suppress the sending of (stateful) TLS1.3 session tickets. Previously the default library behaviour applied, sending two, each in its own TCP segment. @@ -25,6 +25,13 @@ JH/05 DKIM: ensure that dkim_domain elements are lowercased before use. JH/06 Fix buggy handling of autoreply bounce_return_size_limit, and a possible buffer overrun for (non-chunking) other transports. +JH/07 GnuTLS: Our use of late (post-handshake) certificate verification, under + TLS1.3, means that a server rejecting a client certificate is not visible + to the client until the first read of encrypted data (typically the + response to EHLO). Add detection for that case and treat it as a failed + TLS connection attempt, so that the normal retry-in-clear can work (if + suitably configured). + Exim version 4.92 ----------------- |