>
> Hey Pandit,
>
>
    Sorry for sending out the previous before it was complete. So here it
goes....


> From what I understand the vulnerability can apply if:
>
> 1) Internal session caching is *not* disable  - This means the session
> cache is mantained in SSL_CTX.
> 2) Internal session cache Lookup is *not* disabled  - This means that the
> ssl code will lookup the session cache on receiving ClientHello with valid
> session Id.
> 3) Your application is designed such that you create a SSL_CTX and multiple
> threads can access it. In this case multiple threads could be accessing the
> same session object (from session cache). The function
> ssl_parse_clienthello_tlsext in t1_lib.c has unsynchronized access to
> members in session object which could cause the vulnerability.
>

> David/other experinced openssl users correct me if you think this
> understanding is incottect.
>
>  Regards,
>
    Nivedita




>  On Thu, Nov 18, 2010 at 7:26 AM, Pandit Panburana <ppanb...@yahoo.com>wrote:
>
>>  Hi,
>>
>>    I am not clear about the condition that vulnerability when using
>> internal session caching mechanism. Is it the same thing as TLS session
>> caching or this is some thing different?
>>
>> Thank you,
>> - Pandit
>>
>>  ------------------------------
>> *From:* David Schwartz <dav...@webmaster.com>
>> *To:* openssl-users@openssl.org
>> *Cc:* Nivedita Melinkeri <nivedita...@gmail.com>
>> *Sent:* Wed, November 17, 2010 4:15:36 AM
>> *Subject:* Re: Question regarding OpenSSL Security Advisory
>>
>> On 11/16/2010 11:06 PM, Nivedita Melinkeri wrote:
>>
>> > Hi,
>> > I had some questions about the latest security advisory. I understand
>> > that this applies to multi-threaded application while using ssl
>> sessions.
>>
>> Correct.
>>
>> > If the application is written thread safe using
>> > CRYPTO_set_locking_callback functions will the vulnerability still apply
>> ?
>>
>> If it didn't, it wouldn't be a vulnerability at all.
>>
>> > If the ssl code calls the locking callback function before accessing the
>> > internal session cache then the vulnerability should not
>> > apply to above mentioned applications.
>>
>> Right, it shouldn't, but it does. That's what makes it a vulnerability.
>> Code not working under conditions where it cannot be expected to work is not
>> a vulnerability, it's simply misuse. This is a vulnerability because it
>> affects applications that use the code correctly.
>>
>> DS
>>
>> ______________________________________________________________________
>> OpenSSL Project                                http://www.openssl.org
>> User Support Mailing List                    openssl-users@openssl.org
>> Automated List Manager                          majord...@openssl.org
>>
>>
>

Reply via email to