]> Cypherpunks repositories - gostls13.git/commit
crypto/tls: check verifiedChains roots when resuming sessions
authorRoland Shoemaker <roland@golang.org>
Mon, 26 Jan 2026 19:18:45 +0000 (11:18 -0800)
committerGopher Robot <gobot@golang.org>
Wed, 28 Jan 2026 16:15:14 +0000 (08:15 -0800)
commit026fa9dc597ea8e5280d7531ce7f193ed157cad0
tree7813b366c8c14e02218bb34fae151278aec02e93
parent133b339ca546937919ee3a8027f15470ebeb88b9
crypto/tls: check verifiedChains roots when resuming sessions

When resuming TLS sessions, on the server and client verify that the
chains stored in the session state (verifiedChains) are still acceptable
with regards to the Config by checking for the inclusion of the root in
either ClientCAs (server) or RootCAs (client). This prevents resuming
a session with a certificate chain that would be rejected during a full
handshake due to an untrusted root.

Updates #77113
Updates #77217
Updates CVE-2025-68121

Change-Id: I11fe00909ef1961c24ecf80bf5b97f7b1121d359
Reviewed-on: https://go-review.googlesource.com/c/go/+/737700
Auto-Submit: Roland Shoemaker <roland@golang.org>
Reviewed-by: Dmitri Shuralyov <dmitshur@google.com>
LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
Reviewed-by: Coia Prant <coiaprant@gmail.com>
Reviewed-by: Filippo Valsorda <filippo@golang.org>
src/crypto/tls/common.go
src/crypto/tls/handshake_client.go
src/crypto/tls/handshake_server.go
src/crypto/tls/handshake_server_test.go
src/crypto/tls/handshake_server_tls13.go