> From: openssl-users On Behalf Of Dr. Stephen Henson > Sent: Friday, February 20, 2015 17:24
> On Fri, Feb 20, 2015, Nathaniel McCallum wrote: > > > I'd like to use ASN1_item_d2i_bio() (or something similar) to parse an > > incoming message. However, given that types like ASN1_OCTET_STRING > > have (essentially) unbounded length, how do I prevent an attacker from > > DOS'ing via OOM? > > > > Is there some way to set a max packet size? > > > > No there isn't but if the input is in DER form you can peek the first few > bytes and get the tag+length fields to determine the size of the structure. If > the input uses indefinite length encoding that isn't possible however. > Some other possibilities: If the bio is memBIO or fileBIO its input size is known before you start, at least if it contains only one root item. More generally you could layer a simple filter BIO that limits total reads to a chosen amount like 1M, probably measured from a CTRL operation -- or a more complex one that looks dynamically at your memory-used and/or memory-available and chooses whether/when to force EOF, but that would be dependent on your particular platform and not portable. Alternatively or in addition, OpenSSL allows you to provide your own malloc/realloc/free implementations used instead of the standard ones. But these are used for *all* OpenSSL heap allocations, so you might need some care to count the space used "for" or at least during a d2i as opposed to other purposes and times. _______________________________________________ openssl-users mailing list To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users