On 3/5/2010 4:13 PM, Jeff Trawick wrote:
> On Fri, Mar 5, 2010 at 4:55 PM, William A. Rowe Jr. <[email protected]> 
> wrote:
>> Anyone looking at the changelog should be terrified of adopting 2.2.15; I'm 
>> going
>> to modify it thusly (please correct attributions if needed?);
>>
>>  *) SECURITY: CVE-2009-3555 (cve.mitre.org)
>>     mod_ssl: Comprehensive fix of the TLS renegotiation prefix injection
>>     attack when compiled against OpenSSL version 0.9.8m or later.
> 
> I see what you mean about potential fear; OTOH, maybe "comprehensive
> fix" is misleading too.  Joe mentioned adding something to the FAQ
> about the issue.  Perhaps that's the only solution.

I will solve through the CHANGES, as well, to at least calm fears that there is 
only
half a solution in 2.2.15.  (Well, there is only half a solution, the other 
half is
in openssl :-)

Here is some slight rewording; I don't believe comprehensive is misleading at 
all,
the exposure isn't mitigated, it is eliminated [until they are foolish enough to
re-enable SSLInsecureRenegotiation].  We also can hardly assume most credit.  
So I'd
suggest this phrasing;

     mod_ssl: Comprehensive fix of the TLS renegotiation prefix injection
     attack when compiled against OpenSSL version 0.9.8m or later. Introduces
     the 'SSLInsecureRenegotiation' directive to reopen this vulnerability
     and offer unsafe legacy renegotiation with clients which do not yet
     support the secure renegotiation protocol.  [Joe Orton, and the OpenSSL 
Team]

Reply via email to