Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Conversation

normanmaurer
Copy link
Member

…se-positives

Motivation:

SslHandler.isEncrypted(...) could produce false-positives as it might assumed that a buffer contained SSLv2. We should provide a variant of this method which is more robust

Modifications:

  • Add new new variant of this method which allows to disable probing for SSLv2
  • Add unit test

Result:

Fixes #14238

…se-positives

Motivation:

SslHandler.isEncrypted(...) could produce false-positives as it might assumed that a buffer contained SSLv2. We should provide a variant of this method which is more robust

Modifications:

- Add new new variant of this method which allows to disable probing for SSLv2
- Add unit test

Result:

Fixes #14238
@normanmaurer normanmaurer added this to the 4.1.113.Final milestone Aug 21, 2024
@normanmaurer normanmaurer merged commit dc30c33 into 4.1 Aug 23, 2024
17 checks passed
@normanmaurer normanmaurer deleted the encrypted branch August 23, 2024 07:38
normanmaurer added a commit that referenced this pull request Aug 23, 2024
#14243)

…se-positives

Motivation:

SslHandler.isEncrypted(...) could produce false-positives as it might
assumed that a buffer contained SSLv2. We should provide a variant of
this method which is more robust

Modifications:

- Add new new variant of this method which allows to disable probing for
SSLv2
- Add unit test

Result:

Fixes #14238
normanmaurer added a commit that referenced this pull request Aug 23, 2024
#14243)

…se-positives

Motivation:

SslHandler.isEncrypted(...) could produce false-positives as it might
assumed that a buffer contained SSLv2. We should provide a variant of
this method which is more robust

Modifications:

- Add new new variant of this method which allows to disable probing for
SSLv2
- Add unit test

Result:

Fixes #14238
jfyuen pushed a commit to jfyuen/netty that referenced this pull request May 5, 2025
netty#14243)

…se-positives

Motivation:

SslHandler.isEncrypted(...) could produce false-positives as it might
assumed that a buffer contained SSLv2. We should provide a variant of
this method which is more robust

Modifications:

- Add new new variant of this method which allows to disable probing for
SSLv2
- Add unit test

Result:

Fixes netty#14238

(cherry picked from commit dc30c33)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Netty SSLHandler.isEncrypted mistakes SNMP as encrypted
2 participants