Return-Path: Delivered-To: apmail-httpd-bugs-archive@www.apache.org Received: (qmail 85824 invoked from network); 16 Nov 2009 12:46:35 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.3) by minotaur.apache.org with SMTP; 16 Nov 2009 12:46:35 -0000 Received: (qmail 67484 invoked by uid 500); 16 Nov 2009 12:46:35 -0000 Delivered-To: apmail-httpd-bugs-archive@httpd.apache.org Received: (qmail 67396 invoked by uid 500); 16 Nov 2009 12:46:34 -0000 Mailing-List: contact bugs-help@httpd.apache.org; run by ezmlm Precedence: bulk List-Post: List-Help: List-Unsubscribe: Reply-To: "Apache HTTPD Bugs Notification List" List-Id: Delivered-To: mailing list bugs@httpd.apache.org Received: (qmail 67384 invoked by uid 99); 16 Nov 2009 12:46:34 -0000 Received: from athena.apache.org (HELO athena.apache.org) (140.211.11.136) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 16 Nov 2009 12:46:34 +0000 X-ASF-Spam-Status: No, hits=-10.5 required=5.0 tests=AWL,BAYES_00,RCVD_IN_DNSWL_HI X-Spam-Check-By: apache.org Received: from [140.211.11.140] (HELO brutus.apache.org) (140.211.11.140) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 16 Nov 2009 12:46:32 +0000 Received: by brutus.apache.org (Postfix, from userid 33) id AE5BC234C045; Mon, 16 Nov 2009 04:46:12 -0800 (PST) From: bugzilla@apache.org To: bugs@httpd.apache.org Subject: DO NOT REPLY [Bug 48204] extended patch CVE-2009-3555-2.2.patch handling request splicing in case of server initiated renegotiation X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Apache httpd-2 X-Bugzilla-Component: mod_ssl X-Bugzilla-Keywords: X-Bugzilla-Severity: major X-Bugzilla-Who: covener@gmail.com X-Bugzilla-Status: NEW X-Bugzilla-Priority: P2 X-Bugzilla-Assigned-To: bugs@httpd.apache.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Changed-Fields: In-Reply-To: References: X-Bugzilla-URL: https://issues.apache.org/bugzilla/ Auto-Submitted: auto-generated Content-Type: text/plain; charset="UTF-8" MIME-Version: 1.0 Message-Id: <20091116124612.AE5BC234C045@brutus.apache.org> Date: Mon, 16 Nov 2009 04:46:12 -0800 (PST) https://issues.apache.org/bugzilla/show_bug.cgi?id=48204 --- Comment #3 from Eric Covener 2009-11-16 04:46:12 UTC --- (In reply to comment #2) > (In reply to comment #1) > > > A simple countermeasure is to reset the buffer 'cbuf' of the decrypted data > > > in case of a server initiated renegotiation. See the following patch of the > > > method 'bio_filter_in_read(..) in ssl_engine_io.c > > > > How does this not discard a legitimate clients request line? > > No. If mod_ssl is initiated a SSL renegotiation, the request header is already > parsed/consumed. Sorry to be obtuse, but then how does this help in the attack scenario? -- Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are the assignee for the bug. --------------------------------------------------------------------- To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org For additional commands, e-mail: bugs-help@httpd.apache.org