Steffen Klemer <klemer(a)dfn.de> wrote
Fri, 17 Nov 2017 15:38:08 +0100:
Thanks for finding and report this (with a fix, none the less!).
This looks like RADSECPROXY-47 [0] which was identified earlier but
sadly never addressed.
[0]
https://project.nordu.net/projects/RADSECPROXY/issues/RADSECPROXY-47
The attached patch against 1.6.9 fixes this while
trying to be non-invasive to the code flow. There is still the chance of running SSL_write
on a 'broken' tls connection but this is handled by openssl and 'cnt'
anyway -- one could perhaps adjust the debug message then :).
How do you mean openssl and 'cnt' handle this?
An alternative fix might be to simply check for client->ssl != NULL
before calling SSL_write() outside of the replyq->mutex lock. Did you
consider this? Worth investigating?