On Sun, 19 Feb 2012 18:44:24 -0700 Guan Jun He wrote:

> >> > It seems you're trying to address more than just CVE-2011-1473
> >> > via this patch, which results in a fairly large patch.  Why do
> >> > you need to track client IP at all?  This issue is about
> >> > client's ability to do unlimited number of renegotiations within
> >> > single connection.  To limit that (either to a maximum total, or
> >> > rate limiting), you should not really need to care about
> >> > client's IP.
> >> 
> >> If do not care about client's IP, then the rate limiting is
> >> aimless, that means all legitimate ssl requests will be blocked,
> >> and cause another 'DoS'.
> > 
> > The issue is about renegotiations.  If the fix allows all initial
> > handshakes and only penalizes all connections that do many
> > rehanshakes, there's no DoS as you suggest and should be sufficient
> > to address CVE-2011-1473.
> 
> Actually,the patch is based on the ssl protocol's "client hello",
> initial handshakes and rehanshakes both use this, so the patch 
> does not differ them, find one "client hello" just increase the
> counter. So, it can fix both 'initial handshakes DoS' and
> 'rehanshakes DoS'.

Yes, I understand what you're trying to do with your patch.  I was only
suggesting that extra checks you do on top of what CVE-2011-1473 is
about result it in a bigger (read: apparently less likely to be
accepted) patch.  But again, I can't speak for openssl team, just
offering my 2c.

th.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       openssl-dev@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to