Marek Marcola wrote:
> Hello,
>   
>>>> It seems the OpenSSL TLS server, when forced to use TLSv1,
>>>> shuts down the connection immediately after receiving a
>>>> ClientHello with major version number not equal to 0x03.
>>>> Nothing was sent to the client to notify the error.
>>>>         
>>> What could be sent to the client to notify it of the error? Since the server
>>> was forced to speak TLSv1, and all evidence suggests the client does not
>>> speak TLSv1, what format should the error notification take?
>>>       
>> Depends.
>> If SSL3-only client connects to TLS1-only
>> server then SSL3 alert message will be sent to client (by server).
>>     
>
>   
>> If SSL2 handshake is sent by client to server (with SSL3/TLS1
>> proposition or not) TCP socket will be closed by server.
>>     
> This statement is for OpenSSL only, but after looking at that 
> second time I think that this is bug.
> Why TLS1 proposition is rejected when sent in SSL2 client_hello packet
> and TCP connection is closed (instead of sending alert message) ?
> SSL2 client_hello is compatibility method here.
> This connections should not be closed but established in TLS1 mode.
>
> In GNUTLS this works ok and in any case (SSL2/SSL3/TLS1/TLS11) proper
> alert message is returned to client
This technique is supported in OpenSSL as well, you just have to configure
it in a different way. Use the "sslv23_method" which will accept all
protocols
and use the SSL_OP_NO_SSLv2 etc options with SSL_set_options() to restrict
the protocols so that only TLSv1 is supported.
If you choose the tlsv1_method, you explictly choose to not accept the
compatible handshanking.

Best regards,
    Lutz
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to