https://issues.apache.org/bugzilla/show_bug.cgi?id=48204

--- Comment #4 from keilh <[email protected]> 2009-11-16 04:56:12 UTC ---
(In reply to comment #3)
> (In reply to comment #2)
> > (In reply to comment #1)
> > > > A simple countermeasure is to reset the buffer 'cbuf' of the decrypted 
> > > > data 
> > > > in case of a server initiated renegotiation. See the following patch of 
> > > > the
> > > > method 'bio_filter_in_read(..) in ssl_engine_io.c
> > > 
> > > How does this not discard a legitimate clients request line?
> > 
> > No. If mod_ssl is initiated a SSL renegotiation, the request header is 
> > already
> > parsed/consumed.
> 
> Sorry to be obtuse, but then how does this help in the attack scenario?

The second, incomplete request in cbuff will be discarded, and request splicing
is no longer working

-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to