Hi pound folks,

I've successfully disabled SSL compression in pound (a requirement for
a platform which needs to be hardened against the CRIME attack).

I'd not seen any mention of this on the mailing lists so far, so I
thought I'd mention how I did it (and ask for any comments for
improvements on my method).

This site[1] described the SSL_OP_NO_COMPRESSION option, which I've
added to my pound's config.c file.

Just for the record this is built against "OpenSSL 1.0.1c-fips" which
I described putting into place on CentOS 6 here[2].

Any comments on my first pound patch?

--- config.c.orig       2012-10-05 14:57:53.652702376 +0100
+++ config.c    2012-10-05 15:12:36.516952267 +0100
@@ -1136,6 +1136,7 @@
                 SSL_CTX_set_app_data(pc->ctx, res);
                 SSL_CTX_set_mode(pc->ctx, SSL_MODE_AUTO_RETRY);
                 SSL_CTX_set_options(pc->ctx, ssl_op_enable);
+                SSL_CTX_set_options(pc->ctx, SSL_OP_NO_COMPRESSION);
                 SSL_CTX_clear_options(pc->ctx, ssl_op_disable);
                 sprintf(lin, "%d-Pound-%ld", getpid(), random());
                 SSL_CTX_set_session_id_context(pc->ctx, (unsigned
char *)lin, strlen(lin));


 [1] http://www.dest-unreach.org/socat/contrib/socat-opensslcompress.html
 [2] http://tech.fawk.eu/233/

-- 
Coops

--
To unsubscribe send an email with subject unsubscribe to [email protected].
Please contact [email protected] for questions.

Reply via email to