Hi,

On Thu, May 20, 2021 at 05:11:45PM +0200, Arne Schwabe wrote:
> Since generating data channel keys does not happen when we have reach the
> S_ACTIVE/S_GOT_KEY state anymore like it used to be before NCP, the
> state that data channel keys deserves its own state in the TLS session
> state machine.

Master as of today (ccee09d1478a) + this patch crashes on p2p --secret

2021-07-02 15:06:31 us=336025 Peer Connection Initiated with 
[AF_INET6]::ffff:194.97.140.21:41858
2021-07-02 15:06:31 us=336099 WARNING: this configuration may cache passwords 
in memory -- use the auth-nocache option to prevent this
2021-07-02 15:06:31 us=336118 Initialization Sequence Completed

Program received signal SIGSEGV, Segmentation fault.
0x00005555555794c9 in do_up (c=c@entry=0x7fffffffd660, 
pulled_options=pulled_options@entry=false, 
    option_types_found=option_types_found@entry=0) at init.c:2205
    2205            c->c2.tls_multi->multi_state = CAS_CONNECT_DONE;

(gdb) print c->c2.tls_multi
$1 = (struct tls_multi *) 0x0


I'm fairly sure it should not do that :-)

Is this fixed in 7/9...9/9?  Or do we need a v3 of this one?

gert
-- 
"If was one thing all people took for granted, was conviction that if you 
 feed honest figures into a computer, honest figures come out. Never doubted 
 it myself till I met a computer with a sense of humor."
                             Robert A. Heinlein, The Moon is a Harsh Mistress

Gert Doering - Munich, Germany                             g...@greenie.muc.de

Attachment: signature.asc
Description: PGP signature

_______________________________________________
Openvpn-devel mailing list
Openvpn-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-devel

Reply via email to