* Jakob Bohm:

>> The purpose of the option is to make totally broken applications a
>> bit less secure (when they happen to certain servers).  From my

I meant “a bit less insecure”, as Bodo pointed out.

>> point of view, there is only one really good reason to have this
>> client-side option—so that you can test the server-side
>> support. That's why I implemented it for OpenJDK as well.
>> Application should *never* use it because it does not really solve
>> anything. If you have fallback code, your application is still
>> insecure.

> No the purpose is to make them more secure by preventing their
> (rarely needed) fallback code from being abused by MITM attackers,
> but the extra protection only works if the server contains the
> corresponding patch.  Basically, if a (patched) server sees that

The key word here is “patched”, a broken-server-supporting application
gets only protection for well-maintained servers—after the Powers That
Be forced server operators to add a patch to better support such
broken-server-supporting applications.  No one will be forced to fix
their insecure, version-intolerant servers, and it is unlikely that
those will ever implement TLS_FALLBACK_SCSV.  It's a bit like telling
people to wear gas mask, instead of taking measures against air
polution.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to