Luigi Rizzo <[EMAIL PROTECTED]> writes:

[...]

> Other than playing tricks with the linker (to replace the
> system read/write/recv... with our own tls-aware routines),
> the other approach would be, for encrypted sockets, to
> pass the data to an intermediate thread which does the
> encrypted I/O. You cannot do this transparently in the thread
> handling the connection after the accept. However, you can still
> live with a single thread doing encryption/decryption for all
> encrrypted sockets, if you want to limit the number of threads
> in the system.
>
> One might argue that given the cost of encryption/decryption,
> going through an intermediate thread for the encrypted session
> is a negligible overhead, and this is the way to go.

If the encryption and decryption happens in a seperate process, there
are also some security advantages.  Encryption code is complex and
difficult to understand, so it's hard to analyze for security bugs.
Isolating this code in a seperate process limits how much damage can
be done in the event of a security problem, such as a buffer overflow.
See:

    http://www.openssl.org/news/secadv_20020730.txt
    http://www.citi.umich.edu/u/provos/ssh/privsep.html
    http://www.suspectclass.com/~sgifford/ucspi-tls/

----Scott.
_______________________________________________
--Bandwidth and Colocation provided by Easynews.com --

asterisk-dev mailing list
To UNSUBSCRIBE or update options visit:
   http://lists.digium.com/mailman/listinfo/asterisk-dev

Reply via email to