Jeffrey Altman wrote:
>>Jeffrey Altman wrote:
>>
>>>The answer to your questions is 'yes'.  As I understand it, the
>>>patches were released as they are "for the time being" because it is
>>>better to crash your application then allow the attacker to compromise
>>>your computer.
>>>
>>>New patches will have to be released to properly correct the problem
>>>in the very near future.
>>
>>Note that changing unexploitable die()s to internal errors is a mistake: 
>>it is not safe to continue after an internal error!
>>
>>Cheers,
>>
>>Ben.
> 
> 
> This is true IFF the internal error is the result of a memory
> overwrite condition that could have compromised the application; but
> if the problem is something that we were able to identify before any
> damage is done (such as the recent protocol error checks) then the
> error must be returned to the application.  The library is often just
> one small part of an overall application.  Introducing easy to trigger
> denial of service attacks is unacceptable.  

I agree. This is precisely my point.

Cheers,

Ben.

-- 
http://www.apache-ssl.org/ben.html       http://www.thebunker.net/

Available for contract work.

"There is no limit to what a man can do or how far he can go if he
doesn't mind who gets the credit." - Robert Woodruff

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to