> [sean.cunning...@mandiant.com - Tue Jun 30 17:06:26 2009]: > > << > Can you find a way to reproduce this behaviour with s_client/s_server > or > does it only happen with external session caches? > >> > > I took a look at s_server. It uses openssl's default session cache, > which does not flatten the session objects with > i2d_SSL_SESSION/d2i_SSL_SESSION. The default cache just ref counts > the session object and keeps it in memory, so the compression > method within that object is retained when subsequent sessions pull > the object out of the cache. > > You can emulate the problem by hacking the session cache code. Try > the following: > [snip]
Interesting, the problem doesn't appear during session resumption over a new connection, it only seems to happen when a session is renegotiated. Which was why I couldn't reproduce it using -sess_out and -sess_in . I've committed a fix for this now, let me know of any issues. Thanks for the report. ______________________________________________________________________ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager majord...@openssl.org