[EMAIL PROTECTED] <[EMAIL PROTECTED]>:
> I experienced a infinite loop in ssl3_read_bytes (source file s3_pkt.c)
> while performing a handshake in TLSv1 with a wrong client_hello. My
> purpose was not to send such a message, but, accidentally, my
> non-SSL-encoded message looks like a SSL Client Hello. [...]
Thanks for the report. Actually this bug has already been found and
corrected, but the fix is not yet in a released version of OpenSSL:
Index: s3_pkt.c
===================================================================
RCS file: /usr/local/openssl/cvs/openssl/ssl/s3_pkt.c,v
retrieving revision 1.37.2.4
retrieving revision 1.37.2.5
diff -u -u -r1.37.2.4 -r1.37.2.5
--- s3_pkt.c 2001/10/20 17:52:40 1.37.2.4
+++ s3_pkt.c 2001/12/28 17:13:10 1.37.2.5
@@ -1077,6 +1077,7 @@
/* TLS just ignores unknown message types */
if (s->version == TLS1_VERSION)
{
+ rr->length = 0;
goto start;
}
#endif
--
Bodo M�ller <[EMAIL PROTECTED]>
PGP http://www.informatik.tu-darmstadt.de/TI/Mitarbeiter/moeller/0x36d2c658.html
* TU Darmstadt, Theoretische Informatik, Alexanderstr. 10, D-64283 Darmstadt
* Tel. +49-6151-16-6628, Fax +49-6151-16-6036
______________________________________________________________________
OpenSSL Project http://www.openssl.org
Development Mailing List [EMAIL PROTECTED]
Automated List Manager [EMAIL PROTECTED]