You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
[CONC-654] Stop leaking client identifying information to the server before the TLS handshake
The server implementation here was incorrect as well, unnecessarily
reading—and TRUSTING—client identifying information sent before the TLS
handshake. That's in MDEV-31585.
As a result of the server's mishandling of this information, it's not
possible for the client to fix this in a way that's backwards-compatible
with old servers.
We rely on the server sending a capability bit to indicate that the
server-side bug has been fixed:
/* Server does not mishandle information sent in the plaintext
* login request packet sent prior to the TLS handshake. As a result, the
* client can safely send an empty/dummy packet contianing no
* identifying information. Indicates that MDEV-31585 has been fixed.
* Since ??.?.
*/
#define MARIADB_CLIENT_CAN_SEND_DUMMY_HANDSHAKE_PACKET (1ULL << 37)
All new code of the whole pull request, including one or several files
that are either new files or modified ones, are contributed under the
BSD-new license. I am contributing on behalf of my employer Amazon Web
Services, Inc.
0 commit comments