commit | d017f113c0db0f99227a96e825d244c6e1e322ac | [log] [tgz] |
---|---|---|
author | Willy Tarreau <w@1wt.eu> | Mon Apr 09 09:24:11 2012 +0200 |
committer | Willy Tarreau <w@1wt.eu> | Mon Apr 09 09:24:11 2012 +0200 |
tree | fff52539f54bce22e2a73465a3d296ce3c1a1597 | |
parent | dc4d9036406611211816e2761beeaece697f650f [diff] |
BUG/MINOR: acl: req_ssl_sni would randomly fail if a session ID is present The wrong byte was checked for the session_id length in the payload. This used to work when the session ID was absent because zero was found there, but when a session ID is present, there is 1/256 chance that the inspected data contains 0x20 (the actual session ID length), so it fails. Thanks to Emmanuel Bézagu for reporting this bug. This bug does not need backporting, it is 1.5 specific.