[openssl.org #2036] bug report: TLS session resumption not checking for existence of client finished message

2009-09-08 Thread Stephen Henson via RT
[david.good...@g2microsystems.com - Tue Sep 08 09:45:22 2009]: However I was advised that it is not a bug in FreeRADIUS, since FreeRADIUS uses OpenSSL for the required functionality, and it was suggested that I report it to OpenSSL as a bug. I'm not sure this is an OpenSSL bug either. To

[openssl.org #2033] [PATCH] DTLS Listen

2009-09-08 Thread Stephen Henson via RT
[seggelm...@fh-muenster.de - Thu Sep 03 18:09:34 2009]: This patch adds the function dtls1_listen(SSL *s, struct sockaddr *client), as well as the user accessible macro DTLSv1_listen(). It is intended to be called with an SSL object with a listening socket. [snip to example]

Re: [openssl.org #2033] [PATCH] DTLS Listen

2009-09-08 Thread Robin Seggelmann via RT
Am 08.09.2009 um 18:15 schrieb Stephen Henson via RT: [seggelm...@fh-muenster.de - Thu Sep 03 18:09:34 2009]: This patch adds the function dtls1_listen(SSL *s, struct sockaddr *client), as well as the user accessible macro DTLSv1_listen(). It is intended to be called with an SSL object with

[openssl.org #2033] [PATCH] DTLS Listen

2009-09-08 Thread Stephen Henson via RT
[seggelm...@fh-muenster.de - Tue Sep 08 18:31:29 2009]: That's just a simple example. If you use blocking sockets, it doesn't return until a ClientHello with a valid cookie has been received (returns 1) or an error occurred (returns 0). If you use non-blocking sockets, it always

Re: [openssl.org #2033] [PATCH] DTLS Listen

2009-09-08 Thread Robin Seggelmann via RT
Am 08.09.2009 um 19:59 schrieb Stephen Henson via RT: [seggelm...@fh-muenster.de - Tue Sep 08 18:31:29 2009]: That's just a simple example. If you use blocking sockets, it doesn't return until a ClientHello with a valid cookie has been received (returns 1) or an error occurred (returns 0).

Re: [openssl.org #2033] [PATCH] DTLS Listen

2009-09-08 Thread Robin Seggelmann via RT
Am 08.09.2009 um 18:31 schrieb Robin Seggelmann via RT: Am 08.09.2009 um 18:15 schrieb Stephen Henson via RT: [seggelm...@fh-muenster.de - Thu Sep 03 18:09:34 2009]: This patch adds the function dtls1_listen(SSL *s, struct sockaddr *client), as well as the user accessible macro

Re: Bug in IP address parsing?..

2009-09-08 Thread Vineet Kumar
Thanks for clarifying that, Stephen. Never use openssl's request racket. When I go to http://rt.openssl.org and use the Quick ticket creation option a the bottom of the page, I get an error: No permission to create tickets in the queue 'OpenSSL-Bugs'. Apparently I need some permission to generate

Re: Bug in IP address parsing?..

2009-09-08 Thread Dr. Stephen Henson
On Tue, Sep 08, 2009, Vineet Kumar wrote: Thanks for clarifying that, Stephen. Never use openssl's request racket. When I go to http://rt.openssl.org and use the Quick ticket creation option a the bottom of the page, I get an error: No permission to create tickets in the queue 'OpenSSL-Bugs'.

RE: [openssl.org #2036] bug report: TLS session resumption not checking for existence of client finished message

2009-09-08 Thread David Goodall via RT
Okay, thanks. I have re-opened the original bug against FreeRADIUS so they can comment on whether the problem may be in the patch/additional code. I'll forward their reply and follow up with the author of that code if appropriate. Regards, David -Original Message- From: Stephen