That was one of the worms doing the rounds at the moment. It sends a
20-30KB zipfile and fakes the sender's email address.
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
On Behalf Of Bruce Christensen
Sent: Thursday, 25 March 2004 12:22 PM
To: [EMAIL PROTECTED]
Subje
It is inherently NOT SAFE to open attachments from people you
do not know. Please do not send attachments to the list unless
the moderator approves it (and he probably will not).
Bruce
You wrote on 24/03/2004 3:47:59 PM:
>Please read the document.
>
___
I agree with closing the issue - I believe the session caching problem
is in mod_ssl
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Geoff Thorpe
via RT
Sent: Wednesday, March 24, 2004 9:45 AM
To: Avery, Ken
Cc: [EMAIL PROTECTED]
Subject: [openssl.org #85
I agree with closing the issue - I believe the session caching problem
is in mod_ssl
-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Geoff Thorpe
via RT
Sent: Wednesday, March 24, 2004 9:45 AM
To: Avery, Ken
Cc: [EMAIL PROTECTED]
Subject: [openssl.org #855
Thanks for the update.
You mentioned off-RT that there might have been some other problem with
session caching? Contrary to what I said at the time, I'm closing this
ticket (for the sake of clarity). Please feel free to open another if
you hit other problems.
_
On March 24, 2004 03:43 am, Nils Larsch wrote:
> > Like the other padding modes, RSA_NO_PADDING is handled by a
> > pre-processor, RSA_padding_add_none(), which insists that input and
> > output byte buffers have the same length, and the way this is invoked
> > from the RSA implementation in rsa_ea
[guest - Tue Mar 23 20:10:43 2004]:
> I have narrowed it down to the function BN_BLINDING_new in the file
> crypto\bn\bn_blind.c, the memory allocated for the BN_BLINDING
> structure never gets freed. I am assuming that the BIGNUM structures
> allocated with BN_new inside of BN_BLINDING never
Hi Geoff,
Geoff Thorpe wrote:
Like the other padding modes, RSA_NO_PADDING is handled by a
pre-processor, RSA_padding_add_none(), which insists that input and
output byte buffers have the same length, and the way this is invoked
from the RSA implementation in rsa_eay.c equates the output b