[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #4592 [Tor Relay]: tor_tls_server_info_callback(): SSL3_ST_SW_SRVR_HELLO_B missed.



#4592: tor_tls_server_info_callback(): SSL3_ST_SW_SRVR_HELLO_B missed.
--------------------------+-------------------------------------------------
    Reporter:  troll_un   |       Owner:                    
        Type:  defect     |      Status:  needs_review      
    Priority:  normal     |   Milestone:  Tor: 0.2.2.x-final
   Component:  Tor Relay  |     Version:  Tor: 0.2.2.34     
  Resolution:             |    Keywords:                    
      Parent:  #4668      |      Points:                    
Actualpoints:             |  
--------------------------+-------------------------------------------------
Changes (by nickm):

  * status:  new => needs_review


Comment:

 Replying to [comment:9 nickm]:
 > Sounds like we should apply one of these.  Looking at the openssl code,
 my only worry here is that we might double-count handshakes, by triggering
 both for the SW_SRVR_HELLO_A and SW_SRVR_HELLO_B step of the same
 handshake.  Is that a possibility do you think?

 Ah, the "if (ret <= 0) goto end;" is the crucial bit.  We shouldn't get an
 info_cb until one of the SW_SRVR_HELLO_* actually has a successful
 ssl3_send_server_hello, which will cause it to transition out.  So asn's
 second patch above ought to be safe.  Turning it into a branch as
 "bug4592".

 My inner coward says to merge this into 0.2.3.x, though it would apply to
 0.2.2.x too.

-- 
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/4592#comment:10>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs