Better comments for #15308 and a small vulnerability possible
    Tomasz Wasilczyk 
    twasilczyk at pidgin.im
       
    Mon Dec  9 21:18:44 EST 2013
    
    
  
Hi,
I've been looking at #15308 (the accusation of lobotomy) and wanted to 
tidy up and comment this code, to remove any doubts for spectators (the 
patch is attached).
However, I have a doubt about one check, not directly related to the 
original report. The actual cert verification is done in 
ssl_nss_handshake_cb, *if* gsc->verifier is set. It should be, because 
purple_certificate_find_verifier should return non-NULL value: it's 
always called with ("x509","tls_cached") parameters, which should always 
be valid.
But what, if purple_certificate_find_verifier fails? In such case, cert 
validation is disabled. In the patch I attached, I use default NSS's 
cert verifier then. I see two options:
- purple_certificate_find_verifier never fails, so my change (and the 
"else" branch in ssl_nss_handshake_cb) is dead code. In such case, I 
would insist on removing it and replacing with g_return_if_fail, or 
something like that (just in case of totally unexpected fail);
- purple_certificate_find_verifier can fail in certain conditions: in 
such case, gnutls should be updated in the similiar way the nss plugin was.
I guess, in the first case my patch can go straight into public 
repository, since it's just a code cleanup. In second case, it could be 
embargo-ed, depending on your opinion.
Waiting for the opinion,
Tomek
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 4225 bytes
Desc: Kryptograficzna sygnatura S/MIME
URL: <https://pidgin.im/cgi-bin/mailman/private/security/attachments/20131210/9ca70723/attachment.bin>
    
    
More information about the security
mailing list