From 3c814351bf68b703d897ca73151025ba52d4d590 Mon Sep 17 00:00:00 2001 From: Joe Orton Date: Thu, 4 Feb 2010 11:25:54 +0000 Subject: [PATCH] * docs/manual/mod/mod_ssl.xml: Warn more clearly about the security impact of SSLInsecureRenegotiation. git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@906454 13f79535-47bb-0310-9956-ffa450edef68 --- docs/manual/mod/mod_ssl.xml | 19 ++++++++++++++----- 1 file changed, 14 insertions(+), 5 deletions(-) diff --git a/docs/manual/mod/mod_ssl.xml b/docs/manual/mod/mod_ssl.xml index 6eee29ca05..05967a0a69 100644 --- a/docs/manual/mod/mod_ssl.xml +++ b/docs/manual/mod/mod_ssl.xml @@ -1781,6 +1781,7 @@ certificate being validated references an OCSP responder.

server config virtual host Available in httpd 2.3 and later, if using OpenSSL 1.0.0 Beta 5 or later +SSLInsecureRenegotiation off

As originally specified, all versions of the SSL and TLS protocols @@ -1795,15 +1796,23 @@ vulnerability if supported by both client and server.

If mod_ssl is linked against OpenSSL version 1.0.0 Beta 5 or later, by default renegotiation is only supported with clients supporting the new protocol extension. If this directive is -enabled, renegotiation will be allowed with old (unpatched) clients. -SSL connections will be vulnerable to the prefix attack as described -above if this directive is enabled. The SSL_SECURE_RENEG -variable can be used to determine whether secure renegotiation is -supported for a given SSL connection.

+enabled, renegotiation will be allowed with old (unpatched) clients, +albeit insecurely.

+ +Security warning +

If this directive is enabled, SSL connections will be vulnerable to +the Man-in-the-Middle prefix attack as described +in CVE-2009-3555.

+
Example SSLInsecureRenegotiation on + +

The SSL_SECURE_RENEG environment variable can be used +from an SSI or CGI script to determine whether secure renegotiation is +supported for a given SSL connection.

+
-- 2.40.0