[Bug 1829861] Re: handle TLS session renegotiation
Julian Andres Klode
julian.klode at canonical.com
Tue Sep 10 14:52:27 UTC 2019
There's nothing we can verify here, not having a test server for that.
Two autopkgtest regressions remain for apport, but they are not
regressions; they're the usual flaky communication with launchpad -
launchpad 503-ing.
Given that there are no regressions in other parts and the patch is
unmodified from eoan, we should hopefully be fine.
** Tags removed: verification-needed verification-needed-bionic verification-needed-disco
** Tags added: verification-done verification-done-bionic verification-done-disco
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to apt in Ubuntu.
https://bugs.launchpad.net/bugs/1829861
Title:
handle TLS session renegotiation
Status in apt package in Ubuntu:
Fix Released
Status in apt source package in Bionic:
Fix Committed
Status in apt source package in Disco:
Fix Committed
Status in apt source package in Eoan:
Fix Released
Bug description:
[Impact]
TLS sessions can renegotiate keys, but APT does not support it; meaning their HTTPS connections stop working.
[Test case]
We don't really have a reproducer. You'd need a server that re-negotiates by path; e.g. because it requires a a certain client certificate for a certain path.
We know it does not break other use cases, having run that for quite
some time in eoan and Debian stretch, and the patch was tested by the
patch submitter @ Akamai (see https://github.com/Debian/apt/pull/93).
[Regression potential]
- Could we get stuck on renegotiation?
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1829861/+subscriptions
More information about the foundations-bugs
mailing list