https://projects.duckcorp.org/https://projects.duckcorp.org/favicon.ico?16699090422015-01-15T04:02:04ZDuckCorp ProjectsBip - Bug #432: authenticated bip users could stop bip daemonhttps://projects.duckcorp.org/issues/432?journal_id=8162015-01-15T04:02:04ZPierre-Louis Bonicolipierre-louis.bonicoli@ir5.eu
<ul><li><strong>Subject</strong> changed from <i>Fatal</i> to <i>authenticated bip users could stop bip daemon</i></li><li><strong>Description</strong> updated (<a title="View differences" href="/journals/816/diff?detail_id=1059">diff</a>)</li></ul> Bip - Bug #432: authenticated bip users could stop bip daemonhttps://projects.duckcorp.org/issues/432?journal_id=8172015-01-16T06:28:44ZPierre-Louis Bonicolipierre-louis.bonicoli@ir5.eu
<ul><li><strong>File</strong> <a href="/attachments/74">patch</a> <a class="icon-only icon-download" title="Download" href="/attachments/download/74/patch">patch</a> added</li><li><strong>Status</strong> changed from <i>New</i> to <i>In Progress</i></li><li><strong>Assignee</strong> set to <i>Pierre-Louis Bonicoli</i></li></ul><p>This bug is the plaintext counterpart of <a class="issue tracker-1 status-3 priority-5 priority-high3 closed" title="Bug: Failed SSL handshake causes bip to write to a random socket, and never close the connection (Resolved)" href="https://projects.duckcorp.org/issues/261">#261</a> (which was related to SSL connections).</p>
<p>The attached patch fixes the problem for plaintext connections. I need to test behavior with SSL connections.</p> Bip - Bug #432: authenticated bip users could stop bip daemonhttps://projects.duckcorp.org/issues/432?journal_id=9292015-08-29T01:06:04ZPierre-Louis Bonicolipierre-louis.bonicoli@ir5.eu
<ul><li><strong>Target version</strong> set to <i>0.9.0</i></li><li><strong>% Done</strong> changed from <i>0</i> to <i>80</i></li><li><strong>Patch Available</strong> set to <i>Yes</i></li></ul><p>There is no problem when <code>client_side_ssl</code> is enabled.</p>
<p>Tested with these commands:<br /><pre>
$ socat -s TCP4-LISTEN:8000 OPENSSL:127.0.0.1:7778,verify=0 &
$ { echo PASS bipnick:mysecretpassword:freenode; echo NICK Pilou; echo USER Pilou 0 Pilou :blah; sleep 2; } | telnet 127.0.0.1 8000 | read
</pre></p> Bip - Bug #432: authenticated bip users could stop bip daemonhttps://projects.duckcorp.org/issues/432?journal_id=22592021-10-11T16:03:04ZPierre-Louis Bonicolipierre-louis.bonicoli@ir5.eu
<ul><li><strong>Status</strong> changed from <i>In Progress</i> to <i>Resolved</i></li><li><strong>% Done</strong> changed from <i>80</i> to <i>100</i></li></ul><p>This redmine issue should have been closed years ago.</p>