1. 14 2月, 2018 4 次提交
  2. 04 12月, 2017 1 次提交
  3. 16 10月, 2017 1 次提交
    • D
      qemu: ensure TLS clients always verify the server certificate · dc6c4179
      Daniel P. Berrange 提交于
      The default_tls_x509_verify (and related) parameters in qemu.conf
      control whether the QEMU TLS servers request & verify certificates
      from clients. This works as a simple access control system for
      servers by requiring the CA to issue certs to permitted clients.
      This use of client certificates is disabled by default, since it
      requires extra work to issue client certificates.
      
      Unfortunately the code was using this configuration parameter when
      setting up both TLS clients and servers in QEMU. The result was that
      TLS clients for character devices and disk devices had verification
      turned off, meaning they would ignore errors while validating the
      server certificate.
      
      This allows for trivial MITM attacks between client and server,
      as any certificate returned by the attacker will be accepted by
      the client.
      
      This is assigned CVE-2017-1000256  / LSN-2017-0002
      Reviewed-by: NEric Blake <eblake@redhat.com>
      Signed-off-by: NDaniel P. Berrange <berrange@redhat.com>
      (cherry picked from commit 441d3eb6)
      dc6c4179
  4. 04 9月, 2017 2 次提交
  5. 02 9月, 2017 3 次提交
  6. 01 9月, 2017 4 次提交
  7. 31 8月, 2017 4 次提交
  8. 30 8月, 2017 9 次提交
  9. 29 8月, 2017 12 次提交