Hello all,
We recently did some negative testing against OpenSSL 1.0.1e, with a focus on DTLS, and observed that the library, running on the peer, could be made to abort by simply disconnecting during the handshake process. The abort is due to a getsockopt() or setsockopt() call failing from within dgram_sctp_read() because the socket descriptor has been rendered invalid by the disconnect. We ran the same scenario against TLS, but it is not affected. Is the development team aware of this? Should we open an RT? Thanks, Brian