Gayathri Sundar wrote:
Thanks Richard..but I was thinking only SSL RECORDS with Record Type "APP
DATA"
Contain application data!!! If I can ensure that only complete SSL Records
of Type Handshake, Change cipher spec, and Alerts are given to OpenSSL, it can process it rite? This way how can openssl know that app data records have been removed..?
Hope I am making sense here..

If you are inserting, modifying or deleting any record of any type from the raw socket byte stream the SSL layers have a very high probability of detecting it.

If you are performing a proper SSL shutdown at the end of transmission then the SSL layer will notice missing data as well.


I'm hoping/guessing the MAC for each message is computed successively with each new record of all types and seeded with the left overs of the last. This means if a record of any type of inserted, modified or deleted from the stream it will be detected at the moment of receiving the new modified data.

If you are performing a proper SSL shutdown it is mandatory to send a last control record to mark the end of transmission. So even if you removed records of any type from preceeding it, it will be noticed because the MAC covering the shutdown close notify alert message will be corrupted.



But in relation to your renegotiation DoS, maybe its upto the application to enforce an acceptable use policy for the renegotiation function. But the protocol and the OpenSSL library dont impose any limits.


Darryl
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to