[Bug 1829861] Re: handle TLS session renegotiation

Launchpad Bug Tracker 1829861 at bugs.launchpad.net
Thu Sep 12 12:14:19 UTC 2019


This bug was fixed in the package apt - 1.6.12

---------------
apt (1.6.12) bionic; urgency=medium

  [ TilmanK ]
  * Fix typo in German manpage translation

  [ Michael Zhivich ]
  * methods: https: handle requests for TLS re-handshake (LP: #1829861)

  [ Julian Andres Klode ]
  * Unlock dpkg locks in reverse locking order (LP: #1829860)

  [ Simon Körner ]
  * http: Fix Host header in proxied https connections (LP: #1838771)

  [ Brian Murray ]
  * Do not include squashfs file systems in df output. (LP: #1756595)

 -- Julian Andres Klode <juliank at ubuntu.com>  Tue, 03 Sep 2019 12:05:35
+0200

** Changed in: apt (Ubuntu Bionic)
       Status: Fix Committed => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to apt in Ubuntu.
https://bugs.launchpad.net/bugs/1829861

Title:
  handle TLS session renegotiation

Status in apt package in Ubuntu:
  Fix Released
Status in apt source package in Bionic:
  Fix Released
Status in apt source package in Disco:
  Fix Released
Status in apt source package in Eoan:
  Fix Released

Bug description:
  [Impact]
  TLS sessions can renegotiate keys, but APT does not support it; meaning their HTTPS connections stop working.

  [Test case]
  We don't really have a reproducer. You'd need a server that re-negotiates by path; e.g. because it requires a a certain client certificate for a certain path.

  We know it does not break other use cases, having run that for quite
  some time in eoan and Debian stretch, and the patch was tested by the
  patch submitter @ Akamai (see https://github.com/Debian/apt/pull/93).

  [Regression potential]
  - Could we get stuck on renegotiation?

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/apt/+bug/1829861/+subscriptions



More information about the foundations-bugs mailing list