[ https://issues.apache.org/jira/browse/AXIS2C-1619?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16920249#comment-16920249 ]
Bill Blough commented on AXIS2C-1619: ------------------------------------- Code to validate peer name (CN/SAN) added in r1866225. Behavior can be toggled via axis2_http_client, and currently defaults to disabled for backwards compatibility reasons. Will default to enabled in a future release. > CVE-2012-6107: SSL/TLS Hostname validation > ------------------------------------------ > > Key: AXIS2C-1619 > URL: https://issues.apache.org/jira/browse/AXIS2C-1619 > Project: Axis2-C > Issue Type: Bug > Components: transport/http > Reporter: Seth Arnold > Priority: Major > > I've looked through the source code and cannot find any peer hostname > validation code. It appears to me that Axis2/c is vulnerable to the problems > discussed in this paper: http://www.cs.utexas.edu/~shmat/shmat_ccs12.pdf > Have I overlooked the TLS / SSL peer name validation? > Thanks -- This message was sent by Atlassian Jira (v8.3.2#803003) --------------------------------------------------------------------- To unsubscribe, e-mail: c-dev-unsubscr...@axis.apache.org For additional commands, e-mail: c-dev-h...@axis.apache.org