Re: DTLS cookies rendered useless by SSL_accept behavior

2011-07-23 Thread com...@gmx.ch
On 07/24/2011 03:55 AM, Michael Tuexen wrote: On Jul 24, 2011, at 12:40 AM, com...@gmx.ch wrote: I got some code which uses nonblocking dtls via self fed bios. You are supposed to call DTLSv1_listen() to handle the front state... #define DTLSv1_listen(ssl, peer) \ SSL_ctrl(ssl,DTLS_CTR

Re: DTLS cookies rendered useless by SSL_accept behavior

2011-07-23 Thread Michael Tuexen
On Jul 24, 2011, at 12:40 AM, com...@gmx.ch wrote: > Hi, > > > I got some code which uses nonblocking dtls via self fed bios. > If a unknown session comes up, I create a new session, feed/drain the > sessions bios from/to the wire until SSL_accept returns success. > > Now, I added DTLS cookies

DTLS cookies rendered useless by SSL_accept behavior

2011-07-23 Thread com...@gmx.ch
Hi, I got some code which uses nonblocking dtls via self fed bios. If a unknown session comes up, I create a new session, feed/drain the sessions bios from/to the wire until SSL_accept returns success. Now, I added DTLS cookies. I expected SSL_accept to return an error if a ClientHello packet

stunnel 4.40 released

2011-07-23 Thread Michal Trojnara
Dear Users, I have released version 4.40 of stunnel. The ChangeLog entry: Version 4.40, 2011.07.23, urgency: LOW: * New Win32 features - Added a GUI menu to save cached peer certificate chains. - Added "-exit" option to stop stunnel *not* running as a service. This option may be useful