Return-Path: Delivered-To: apmail-httpd-bugs-archive@www.apache.org Received: (qmail 13865 invoked from network); 9 Nov 2009 16:57:13 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.3) by minotaur.apache.org with SMTP; 9 Nov 2009 16:57:13 -0000 Received: (qmail 81338 invoked by uid 500); 9 Nov 2009 16:57:13 -0000 Delivered-To: apmail-httpd-bugs-archive@httpd.apache.org Received: (qmail 81284 invoked by uid 500); 9 Nov 2009 16:57:13 -0000 Mailing-List: contact bugs-help@httpd.apache.org; run by ezmlm Precedence: bulk List-Post: List-Help: List-Unsubscribe: Reply-To: "Apache HTTPD Bugs Notification List" List-Id: Delivered-To: mailing list bugs@httpd.apache.org Received: (qmail 81272 invoked by uid 99); 9 Nov 2009 16:57:13 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 09 Nov 2009 16:57:13 +0000 X-ASF-Spam-Status: No, hits=-2000.0 required=10.0 tests=ALL_TRUSTED X-Spam-Check-By: apache.org Received: from [140.211.11.140] (HELO brutus.apache.org) (140.211.11.140) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 09 Nov 2009 16:57:10 +0000 Received: by brutus.apache.org (Postfix, from userid 33) id ADEA1234C495; Mon, 9 Nov 2009 08:56:49 -0800 (PST) From: bugzilla@apache.org To: bugs@httpd.apache.org Subject: DO NOT REPLY [Bug 47055] SSLVerifyClient + Directory doesn't use cache sessions X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Apache httpd-2 X-Bugzilla-Component: mod_ssl X-Bugzilla-Keywords: PatchAvailable X-Bugzilla-Severity: blocker X-Bugzilla-Who: mike.pechkin@gmail.com X-Bugzilla-Status: NEW X-Bugzilla-Priority: P1 X-Bugzilla-Assigned-To: bugs@httpd.apache.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Changed-Fields: In-Reply-To: References: X-Bugzilla-URL: https://issues.apache.org/bugzilla/ Auto-Submitted: auto-generated Content-Type: text/plain; charset="UTF-8" MIME-Version: 1.0 Message-Id: <20091109165649.ADEA1234C495@brutus.apache.org> Date: Mon, 9 Nov 2009 08:56:49 -0800 (PST) X-Virus-Checked: Checked by ClamAV on apache.org https://issues.apache.org/bugzilla/show_bug.cgi?id=47055 --- Comment #43 from Mike 2009-11-09 08:56:47 UTC --- Ruediger, 1. does the config still vulnerable if user redirects to "/mihailp1/www-secure/s" only after double authentication by soft (password-pin)? 2. why *this* config vulnerable if i disable renegotiation initiated by client? Thank you. -- Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug. --------------------------------------------------------------------- To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org For additional commands, e-mail: bugs-help@httpd.apache.org