[EMAIL PROTECTED] <[EMAIL PROTECTED]>:

>       I experienced a infinite loop in ssl3_read_bytes (source file s3_pkt.c)
> while performing a handshake in TLSv1 with a wrong client_hello. My
> purpose was not to send such a message, but, accidentally, my
> non-SSL-encoded message looks like a SSL Client Hello. [...]

Thanks for the report.  Actually this bug has already been found and
corrected, but the fix is not yet in a released version of OpenSSL:

Index: s3_pkt.c
===================================================================
RCS file: /usr/local/openssl/cvs/openssl/ssl/s3_pkt.c,v
retrieving revision 1.37.2.4
retrieving revision 1.37.2.5
diff -u -u -r1.37.2.4 -r1.37.2.5
--- s3_pkt.c    2001/10/20 17:52:40     1.37.2.4
+++ s3_pkt.c    2001/12/28 17:13:10     1.37.2.5
@@ -1077,6 +1077,7 @@
                /* TLS just ignores unknown message types */
                if (s->version == TLS1_VERSION)
                        {
+                       rr->length = 0;
                        goto start;
                        }
 #endif


-- 
Bodo M�ller <[EMAIL PROTECTED]>
PGP http://www.informatik.tu-darmstadt.de/TI/Mitarbeiter/moeller/0x36d2c658.html
* TU Darmstadt, Theoretische Informatik, Alexanderstr. 10, D-64283 Darmstadt
* Tel. +49-6151-16-6628, Fax +49-6151-16-6036
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to