But, the application code tries to clear out/shutdown existing SSL session
with orderly bi-directional alerts. Once shutdown it creates a new SSL
object 'ssl' [ssl = SSL_new (ctx)]
for the next session in persistent connection..

When the app simulates limited clients , say, 100, each client makes
hundreds of  unique SSL sessions successfully in persistent connection.  It
is under stress of ~800 clients , that I run into issues.
Also, the bi-directional alerts do not happen always under high
stress..could this be the reason? a possible session data mix up?

Thanks,
Prabhu. S

On Thu, Feb 21, 2008 at 12:25 AM, David Schwartz <[EMAIL PROTECTED]>
wrote:

>
> > I have a SSL client and a server application.The client connects to a
> > SSL server in a TCP socket persistence mode, i.e, it does a data
> > exchange with the server through a SSL connection , tears down the SSL
> > connection but again sends out a client_hello in the same TCP socket
> > connection it had earlier established with the server to perform another
> > cycle of data exchange.
>
> You are trying to do this without having any protocol that would assure
> that
> it works. As far as I know, there is no reason this should work, and you
> haven't coded any.
>
> How do you determine, unambiguously, whether a particular chunk of data is
> part of the first SSL session or the second? How do you make sure final
> data
> from the first connection isn't seen as starting data for the second?
>
> If you want to multiplex two SSL connections over a single TCP connection,
> you need to make sure that both ends agree unambiguously on what data is
> part of the first SSL connection and what data is part of the second.
> Unless
> you wrote code to do that, you are basically expecting it to happen by
> accident.
>
> There is simply no way to prevent the code that receives the last bytes
> from
> the first SSL connection from receiving some of the first bytes for the
> new
> one, and it has no place to "put them back" since all the code just reads
> directly from the socket.
>
> Theoretically, SSL could have been designed to allow this, but as far as I
> know, it wasn't. Do you have any reason to believe otherwise?
>
> DS
>
>
> ______________________________________________________________________
> OpenSSL Project                                 http://www.openssl.org
> User Support Mailing List                    openssl-users@openssl.org
> Automated List Manager                           [EMAIL PROTECTED]
>

Reply via email to