From fc243e944ec00b59b75f41d07494116f925d58b4 Mon Sep 17 00:00:00 2001 From: Jeremy Harris Date: Sat, 16 Feb 2019 12:59:23 +0000 Subject: GnuTLS: Fix client detection of server reject of client cert under TLS1.3 --- doc/doc-txt/ChangeLog | 9 ++++++++- 1 file changed, 8 insertions(+), 1 deletion(-) (limited to 'doc') diff --git a/doc/doc-txt/ChangeLog b/doc/doc-txt/ChangeLog index 18db733aa..6a9aae365 100644 --- a/doc/doc-txt/ChangeLog +++ b/doc/doc-txt/ChangeLog @@ -11,7 +11,7 @@ Exim version 4.93 JH/01 OpenSSL: With debug enabled output keying information sufficient, server side, to decode a TLS 1.3 packet capture. -JH/02 OpenSSL: suppress the sending of (stateful) TLS1.3 session tickets. +JH/02 OpenSSL: Suppress the sending of (stateful) TLS1.3 session tickets. Previously the default library behaviour applied, sending two, each in its own TCP segment. @@ -25,6 +25,13 @@ JH/05 DKIM: ensure that dkim_domain elements are lowercased before use. JH/06 Fix buggy handling of autoreply bounce_return_size_limit, and a possible buffer overrun for (non-chunking) other transports. +JH/07 GnuTLS: Our use of late (post-handshake) certificate verification, under + TLS1.3, means that a server rejecting a client certificate is not visible + to the client until the first read of encrypted data (typically the + response to EHLO). Add detection for that case and treat it as a failed + TLS connection attempt, so that the normal retry-in-clear can work (if + suitably configured). + Exim version 4.92 ----------------- -- cgit v1.2.3