ID: 45808
Comment by: singularity_control at rcpt dot at
Reported By: six at aegis-corp dot org
Status: Open
Bug Type: Streams related
Operating System: Linux 2.6
PHP Version: 5.3.0alpha1
New Comment:
This makes a serious security issue. It is a very effective DoS on
all single process PHP servers with SSL and a slightly less bad DoS on
multi-process PHP servers.
Previous Comments:
------------------------------------------------------------------------
[2008-09-25 16:07:31] nasam at mailvault dot com
Bug is in ext/openssl/xp_ssl.c
Function handle_ssl_error: (line 107)
case SSL_ERROR_WANT_READ:
case SSL_ERROR_WANT_WRITE:
/* re-negotiation, or perhaps the SSL layer needs more
* packets: retry in next iteration */
errno = EAGAIN;
retry = is_init ? 1 : sslsock->s.is_blocked; //BUG
break;
it sets retry to 1 in php_openssl_enable_crypto no matter if socket is
blocking or not.
------------------------------------------------------------------------
[2008-09-25 10:06:09] six at aegis-corp dot org
the bug is still present in php5.3-200809232030
------------------------------------------------------------------------
[2008-09-24 01:20:29] six at aegis-corp dot org
the bug is still present in php5.3-200809232030
------------------------------------------------------------------------
[2008-09-23 01:00:00] php-bugs at lists dot php dot net
No feedback was provided for this bug for over a week, so it is
being suspended automatically. If you are able to provide the
information that was originally requested, please do so and change
the status of the bug back to "Open".
------------------------------------------------------------------------
[2008-09-15 07:22:44] [EMAIL PROTECTED]
Please try using this CVS snapshot:
http://snaps.php.net/php5.3-latest.tar.gz
For Windows (zip):
http://snaps.php.net/win32/php5.3-win32-latest.zip
For Windows (installer):
http://snaps.php.net/win32/php5.3-win32-installer-latest.msi
------------------------------------------------------------------------
The remainder of the comments for this report are too long. To view
the rest of the comments, please view the bug report online at
http://bugs.php.net/45808
--
Edit this bug report at http://bugs.php.net/?id=45808&edit=1