> [sean.cunning...@mandiant.com - Tue Jun 30 17:06:26 2009]:
> 
> <<
> Can you find a way to reproduce this behaviour with s_client/s_server
>    or
> does it only happen with external session caches?
> >>
> 
> I took a look at s_server.  It uses openssl's default session cache,
>    which does not flatten the session objects with
>    i2d_SSL_SESSION/d2i_SSL_SESSION.  The default cache just ref counts
>    the session object and keeps it in memory, so the compression
>    method within that object is retained when subsequent sessions pull
>    the object out of the cache.
> 
> You can emulate the problem by hacking the session cache code.  Try
>    the following:
> 
[snip]

Interesting, the problem doesn't appear during session resumption over a
new connection, it only seems to happen when a session is renegotiated.
Which was why I couldn't reproduce it using -sess_out and -sess_in .
I've committed a fix for this now, let me know of any issues.

Thanks for the report.



______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       openssl-dev@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to