Closed Bug 274989 Opened 21 years ago Closed 20 years ago

SSL session client cache can grow without bounds

Categories

(NSS :: Libraries, defect, P2)

3.9.4
defect

Tracking

(Not tracked)

RESOLVED DUPLICATE of bug 300043

People

(Reporter: julien.pierre, Assigned: nelson)

Details

Unlike the SSL server , which has a limited number of slots, configured at initialization time, the SSL client cache knows no such bounds . The only way SSL sessions get expunged from the client cache is when a restart handshake happens, during which libssl inspects all the sessions in the cache and frees all the ones that are expired or without a reference . I think there should be limits on this cache as well. In a server application, which talks to other servers, the memory growth from the unbounded client cache can be a problem, since SSL sessions default to 24 hours expiration.
Priority: -- → P2
Target Milestone: --- → 3.10
It is not true that the only way that sessions are removed from the cache is when attempting restarts. However, I agree that the client cache could and should be redesigned to bound session cache growth and to organize the cache so that the entries to be deleted are LRU.
QA Contact: bishakhabanerjee → jason.m.reid
I'd like to be able to improve this for 3.11, but 3.12 is probably the soonest I can get to it.
Target Milestone: 3.10 → 3.12
This is a duplicate. I'm leaving the bug with the most information open . *** This bug has been marked as a duplicate of 300043 ***
Status: NEW → RESOLVED
Closed: 20 years ago
Resolution: --- → DUPLICATE
You need to log in before you can comment on or make changes to this bug.