[PATCH 0 of 3] SSL certificate verification context checks
    Maxim Dounin 
    mdounin at mdounin.ru
       
    Sun Mar  9 00:27:39 UTC 2025
    
    
  
Hello!
The following patch series somewhat improves checking of the SSL context
where the client certificate was verified.
Notably:
- Session ID context now includes trusted certificates list, so a
  session cannot be restored in a server block with different trusted
  certificates list (even if it uses the same server certificate and
  the same client CA certificates list).
- Reshaped HTTP level server name checks to better match existing certificate
  verification checking code.  As a side effect, now it is now allowed
  to use different names at HTTP level as long as verification context
  stays the same (that is, names within the same server block).
- Added a workaround to prevent incorrect session reuse in OpenSSL 1.1.1e
  and above when using TLSv1.3, which allows session reuse with different
  server names without any checks.
-- 
Maxim Dounin
    
    
More information about the nginx-devel
mailing list