On Thu, Feb 25, 2010 at 11:45:14PM +0100, Dr. Stephen Henson wrote:

> This isn't a DoS issue as such it's just the client sending a message and
> never getting the reply it expects. You'd get exactly the same behaviour by
> connecting to a server and either never sending any data or deliberately not
> completing the handshake.

I consider resource starvation as a more serious DoS issue, when the
resource starvation is happens without a deliberate attack, but is
instead expected under normal operating conditions.

If I field a patched server, and sufficiently many unpatched pre-0.9.8m
OpenSSL clients attempt re-negotiation under normal conditions, I have
a resource starvation problem and unhappy users who are more annoyed at
stuck connections than failed ones.

I don't know to what extent this will impact our systems, but I am
more inclined to break midstream re-negotiation with legacy clients
than to expose the server and all unpatched clients to stuck sessions.

Thanks for the suggested patch, I'll chat to our web-plant team to find
out which of the two non-optimal behaviours they are more comfortably
with.

-- 
        Viktor.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to