Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix TCP TLS server SNI server name leak #5099

Merged
merged 3 commits into from
Feb 6, 2024
Merged

Fix TCP TLS server SNI server name leak #5099

merged 3 commits into from
Feb 6, 2024

Commits on Feb 6, 2024

  1. The TCP client will not send the correct server name to the client du…

    …e to SSL client resumption performed by the SSL implementation although we are using a new engine implementation.
    
    The SSL channel provider when a server name is specified for a client should use the SSL context map to avoid this.
    vietj committed Feb 6, 2024
    Configuration menu
    Copy the full SHA
    10cf577 View commit details
    Browse the repository at this point in the history
  2. Configuration menu
    Copy the full SHA
    5658941 View commit details
    Browse the repository at this point in the history
  3. The SslChannelProvider class maintains a map of server name to Netty …

    …SslContext that is filled when a client provides a server name. When a server name does not resolve to a KeyManagerFactory or TrustManagerFactory, the default factories are used and the entry is stored in the map. Instead no specific factory is resolved the default Netty SslContext is used, since this can lead to a a memory leak when a client specifies spurious SNI server names. This affects only a TCP server when SNI is set in the HttpServerOptions.
    vietj committed Feb 6, 2024
    Configuration menu
    Copy the full SHA
    60b5268 View commit details
    Browse the repository at this point in the history