On Mon, Mar 21, 2005, Victor Duchovni wrote:

> On Mon, Mar 21, 2005 at 05:41:56PM +0100, Dr. Stephen Henson wrote:
> 
> > > In my server cache I have: 1900 entries occupying 2.4MBytes (in a btree
> > > totaling 7MB on disk) with an average size of 1300 bytes per entry
> > > (key + value). 977 of these entries are a mere 327 bytes long (no client
> > > cert), the rest of the sessions are 2.4k in average size and occupy 90%
> > > of the space. The vast majority of the client certs are unverified
> > > and waste space. Reducing resource requirements makes a server more
> > > DoS resistant. I think the feature I am looking for, a function that
> > > clears and frees the peer certificate from a session, is cheap enough
> > > to warrant implementation.
> > > 
> > 
> > I'm curious as to what purpose these unverified certificates serve? If they
> > aren't used in any way why are they requested in the first place?
> > 
> 
> I request client certificates because I need to authenticate a small
> number of clients (currently 1). When I ask for client certificates, all
> clients that have a client certificate (often self-signed) volunteer their
> certificates during the handshake. I don't need them, but I get them.
> 

Can't you change it so the server only requests a certificate when either the
user requests expanded priveleges or attempts a privileged action? Then if an
invalid certificate is given it would be rejected.

Steve.
--
Dr Stephen N. Henson. Email, S/MIME and PGP keys: see homepage
OpenSSL project core developer and freelance consultant.
Funding needed! Details on homepage.
Homepage: http://www.drh-consultancy.demon.co.uk
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to