2013/10/18 Mark Thomas <ma...@apache.org>:
> On 17/10/2013 00:44, Konstantin Preißer wrote:
>
> <snip/>
>
>
> There is a long series of these results:
> Read result [1]
> Read result [48]
> Read result [-120002]
>
> which looks fairly normal (I need to look into why we see a single byte
> and then 48 bytes rather than 49 bytes).
>

A 1/(n-1) split is usually a counter-measure against BEAST attack on
TLS 1.0 (CVE-2011-3389)

(I have not looked whether it is what actually happens here, but just
noting to save you some time, as the scheme sounds familiar).

http://www.mail-archive.com/openssl-dev@openssl.org/msg29810.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3389
http://www.educatedguesswork.org/2011/11/rizzoduong_beast_countermeasur.html

Best regards,
Konstantin Kolinko

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to