Hello,
I recently encountered a compatibility issue with X25519Kyber768
<https://bugs.chromium.org/p/chromium/issues/detail?id=1484074>: I was
unable to access the site via X25519Kyber768-enabled Google Chrome on a
server with only TLS 1.2 enabled, but not TLS 1.3.
The Chromium team replied:
Regarding TLS 1.2 vs TLS 1.3, a TLS ClientHello is generally good for
all the parameters we support. So though we include TLS 1.3 with Kyber
in there, we also include parameters for TLS 1.3 without Kyber and TLS
1.2. So if the server and network well behaving correctly, it's
perfectly fine if the server only supports TLS 1.2.
I'm able to reproduce the problem. It looks like a bug in
www.paypal.cn's server. They didn't implement TLS 1.2 correctly.
Specifically, they do not correctly handle when the ClientHello comes
in in two reads. Before Kyber, this wasn't very common because
ClientHellos usually fit in a packet. But Kyber makes ClientHellos
larger, so it is possible to get only a partial ClientHello in the
first read, and require a second read to try again. This is something
that any TCP-based application needs to handle; you may not have
gotten the whole message on a given read and need to keep on reading.
www.paypal.cn will need to fix their server to correctly handle this case.
So the Chromium team isn't considering making a change, so I'm wondering
how compatible nginx is with this? Or what version is needed to make it
error free?
Best regards,
Gentry
_______________________________________________
nginx mailing list
nginx@nginx.org
https://mailman.nginx.org/mailman/listinfo/nginx