RE: Re: document

2004-03-24 Thread Steven Reddie
That was one of the worms doing the rounds at the moment. It sends a 20-30KB zipfile and fakes the sender's email address. -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Bruce Christensen Sent: Thursday, 25 March 2004 12:22 PM To: [EMAIL PROTECTED] Subje

Re: Re: document

2004-03-24 Thread Bruce Christensen
It is inherently NOT SAFE to open attachments from people you do not know. Please do not send attachments to the list unless the moderator approves it (and he probably will not). Bruce You wrote on 24/03/2004 3:47:59 PM: >Please read the document. > ___

RE: [openssl.org #855] Major memory leak in OpenSSL using threads

2004-03-24 Thread [EMAIL PROTECTED] via RT
I agree with closing the issue - I believe the session caching problem is in mod_ssl -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Geoff Thorpe via RT Sent: Wednesday, March 24, 2004 9:45 AM To: Avery, Ken Cc: [EMAIL PROTECTED] Subject: [openssl.org #85

RE: [openssl.org #855] Major memory leak in OpenSSL using threads

2004-03-24 Thread Avery, Ken
I agree with closing the issue - I believe the session caching problem is in mod_ssl -Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Geoff Thorpe via RT Sent: Wednesday, March 24, 2004 9:45 AM To: Avery, Ken Cc: [EMAIL PROTECTED] Subject: [openssl.org #855

[openssl.org #855] Major memory leak in OpenSSL using threads

2004-03-24 Thread Geoff Thorpe via RT
Thanks for the update. You mentioned off-RT that there might have been some other problem with session caching? Contrary to what I said at the time, I'm closing this ticket (for the sake of clarity). Please feel free to open another if you hit other problems. _

Re: a bug in RSA_public_encrypt with RSA_NO_PADDING

2004-03-24 Thread Geoff Thorpe
On March 24, 2004 03:43 am, Nils Larsch wrote: > > Like the other padding modes, RSA_NO_PADDING is handled by a > > pre-processor, RSA_padding_add_none(), which insists that input and > > output byte buffers have the same length, and the way this is invoked > > from the RSA implementation in rsa_ea

[openssl.org #855] Major memory leak in OpenSSL using threads

2004-03-24 Thread via RT
[guest - Tue Mar 23 20:10:43 2004]: > I have narrowed it down to the function BN_BLINDING_new in the file > crypto\bn\bn_blind.c, the memory allocated for the BN_BLINDING > structure never gets freed. I am assuming that the BIGNUM structures > allocated with BN_new inside of BN_BLINDING never

Re: a bug in RSA_public_encrypt with RSA_NO_PADDING

2004-03-24 Thread Nils Larsch
Hi Geoff, Geoff Thorpe wrote: Like the other padding modes, RSA_NO_PADDING is handled by a pre-processor, RSA_padding_add_none(), which insists that input and output byte buffers have the same length, and the way this is invoked from the RSA implementation in rsa_eay.c equates the output b