https://issues.apache.org/bugzilla/show_bug.cgi?id=48204

--- Comment #3 from Eric Covener <[email protected]> 2009-11-16 04:46:12 UTC ---
(In reply to comment #2)
> (In reply to comment #1)
> > > A simple countermeasure is to reset the buffer 'cbuf' of the decrypted 
> > > data 
> > > in case of a server initiated renegotiation. See the following patch of 
> > > the
> > > method 'bio_filter_in_read(..) in ssl_engine_io.c
> > 
> > How does this not discard a legitimate clients request line?
> 
> No. If mod_ssl is initiated a SSL renegotiation, the request header is already
> parsed/consumed.

Sorry to be obtuse, but then how does this help in the attack scenario?

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to