On Tue, Jul 30, 2002 at 03:50:17PM +0300, Arne Ansper wrote:

>> These patches are known to apply correctly but have not been
>> thoroughly tested.

> As I understand it, OpenSSL will call abort() when it detects attack
> against any hole in SSL.

Not quite.  The attacks against known holes are shielded by proper
error handling.

The 'die()' lines that might call 'abort()' are essentially 'assert()'
lines, and they are just for additional protection: There should be
now way for an attacker to trigger an 'abort()', but if there is still
some problem left, an 'abort()' is better than a buffer overflow.

(The reason that we are using 'abort()' now instead of generating
'internal error' error message is that we wanted to release the fix as
soon as possible.)



-- 
Bodo Möller <[EMAIL PROTECTED]>
PGP http://www.informatik.tu-darmstadt.de/TI/Mitarbeiter/moeller/0x36d2c658.html
* TU Darmstadt, Theoretische Informatik, Alexanderstr. 10, D-64283 Darmstadt
* Tel. +49-6151-16-6628, Fax +49-6151-16-6036
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to