diff options
author | 2015-02-20 00:56:32 +0000 | |
---|---|---|
committer | 2015-02-20 00:56:32 +0000 | |
commit | 8fb5aed9036c435866a2e1dceff088f6ceb5f677 (patch) | |
tree | ef434026aa77f35137361040ece1beefa2330350 /usr.sbin/syslogd/syslogd.c | |
parent | Move the splsoftnet() hiding in the declarations closer to the code. (diff) | |
download | wireguard-openbsd-8fb5aed9036c435866a2e1dceff088f6ceb5f677.tar.xz wireguard-openbsd-8fb5aed9036c435866a2e1dceff088f6ceb5f677.zip |
When syslogd is writing over TLS, the error "SSL3_WRITE_PENDING:bad
write retry" may occur. Unfortunately libtls tls_write() has
inherited the strange semantics regarding partial writes and buffer
movement from SSL_write(). This will be investigated after unlock,
the goal is to have the behavior of write(2) in libtls.
For now add a workaround in syslogd. If tls_write() indicates that
it needs a read or write again, stop modifying the output buffer.
Instead drop and count the syslog messages. After writing over TLS
was successful, continue to queue the messages. This solution has
minimum inpact and will be improved after 5.7 release.
discussed with tedu@ reyk@ jsing@; OK tedu@
Diffstat (limited to 'usr.sbin/syslogd/syslogd.c')
-rw-r--r-- | usr.sbin/syslogd/syslogd.c | 18 |
1 files changed, 16 insertions, 2 deletions
diff --git a/usr.sbin/syslogd/syslogd.c b/usr.sbin/syslogd/syslogd.c index 32f4d1a3006..d381c1402bd 100644 --- a/usr.sbin/syslogd/syslogd.c +++ b/usr.sbin/syslogd/syslogd.c @@ -1,4 +1,4 @@ -/* $OpenBSD: syslogd.c,v 1.156 2015/02/14 09:02:15 bluhm Exp $ */ +/* $OpenBSD: syslogd.c,v 1.157 2015/02/20 00:56:32 bluhm Exp $ */ /* * Copyright (c) 1983, 1988, 1993, 1994 @@ -1265,8 +1265,22 @@ fprintlog(struct filed *f, int flags, char *msg) } break; - case F_FORWTCP: case F_FORWTLS: + if (f->f_un.f_forw.f_buftls.bt_flags & BT_WRITE_AGAIN) { + /* + * After an OpenSSL SSL_ERROR_WANT_WRITE you must not + * modify the buffer pointer or length until the next + * successful write. Otherwise there will be an + * error SSL3_WRITE_PENDING:bad write retry. + * XXX This should be handled in the buffertls layer. + */ + dprintf(" %s (dropped tls write again)\n", + f->f_un.f_forw.f_loghost); + f->f_un.f_forw.f_dropped++; + break; + } + /* FALLTHROUGH */ + case F_FORWTCP: dprintf(" %s", f->f_un.f_forw.f_loghost); if (EVBUFFER_LENGTH(f->f_un.f_forw.f_bufev->output) >= MAX_TCPBUF) { |