From e60743c2598f2b8d05fbd008cafbfe16bfe0b9a3 Mon Sep 17 00:00:00 2001 From: jsing <> Date: Sat, 9 May 2020 15:30:21 +0000 Subject: Add a middlebox_compat flag and condition session ID randomisation on it. ok tb@ --- src/lib/libssl/tls13_client.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'src/lib/libssl/tls13_client.c') diff --git a/src/lib/libssl/tls13_client.c b/src/lib/libssl/tls13_client.c index aab83dcc69..d5ac6ba5e0 100644 --- a/src/lib/libssl/tls13_client.c +++ b/src/lib/libssl/tls13_client.c @@ -1,4 +1,4 @@ -/* $OpenBSD: tls13_client.c,v 1.55 2020/05/09 15:05:50 beck Exp $ */ +/* $OpenBSD: tls13_client.c,v 1.56 2020/05/09 15:30:21 jsing Exp $ */ /* * Copyright (c) 2018, 2019 Joel Sing * @@ -61,7 +61,7 @@ tls13_client_init(struct tls13_ctx *ctx) * legacy session identifier triggers compatibility mode (see RFC 8446 * Appendix D.4). In the pre-TLSv1.3 case a zero length value is used. */ - if (ctx->hs->max_version >= TLS1_3_VERSION) { + if (ctx->middlebox_compat && ctx->hs->max_version >= TLS1_3_VERSION) { arc4random_buf(ctx->hs->legacy_session_id, sizeof(ctx->hs->legacy_session_id)); ctx->hs->legacy_session_id_len = -- cgit v1.2.3-55-g6feb