NSS version 3.12.5 has been released in source code form from the master
upstream CVS repository with the CVS NSS_3_12_5_RTM.

Sun made NSS 3.12.5 publicly available as a binary patch for some platforms.
See http://sunsolve.sun.com/search/document.do?assetkey=1-66-273350-1

The main reason this release was made at this time was to make available
immediate relief for bug 526689, the recently discovered SSL/TLS
renegotiation vulnerability.  See
https://bugzilla.mozilla.org/show_bug.cgi?id=526689
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-3555

The relief consists of disabling the vulnerable renegotiation feature of
the SSL3/TLS protocol by default in both clients and servers, whether
initiated by the process at the local or remote end of the connection.

A new API has been introduced by which an application can re-enable that
vulnerable renegotiation feature, if desired.  Be aware that doing so makes
the application vulnerable again.

There is also a new environment variable that the user/admin may set that
will re-enable renegotiation by default for any process that begins
execution with that environment variable set.  This allows the renegotiation
feature to be re-enabled without any program changes, but
again, doing so reintroduces the vulnerability to the attack.

The new environment variable is NSS_SSL_ENABLE_RENEGOTIATION.  Setting it to
the value "1" will re-enable renegotiation.  Setting it to the value "0"
will leave renegotiation disabled (as it is by default).

Release notes have not yet been published to the web site, but should become
available this week.

The full list of bug fixes and RFEs may be seen at this URL:

https://bugzilla.mozilla.org/buglist.cgi?order=Assignee;resolution=FIXED;query_format=advanced;target_milestone=3.12.5;product=NSS
-- 
dev-tech-crypto mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to