I have been reading about various posts related to the TLS_FALLBACK_SCSV
fall back option. The more I read the more confused I am.
I would like to get some help on the current scenario that we have.

We have a library which is built on top of openssl 0.9.8 (now incorporated
the openssl 0.9.8zc related changes for TLS_FALLBACK_SCSV) for handling
cryptographic and SSL functionality. By default the SSL protocol is set to
SSLv23 at both client and Server.That means The client and Server can
support SSLv2, SSLv3 and TLSv1 protcols. However an explicit protocl
(SSLv2/SSLv3/TLSV1) can also be set at both client and Server.

As per my understanding We can overcome the POODLe vulnerability by
disabling SSLv3 protocol or setting the TLSv1 as the default protocol at
client and Server.

Now I would like to understand the following.
1. if we keep the SSLv23 protocol at both the Server and Client, How does
TLS_FALLBACK_SCSV option set at the client going to work and does it stop
the usage of SSLv3 protocol as both client and Server are capable of
supporting TLSv1.

2. In general, if we have SSLv23 protocol at both client and Server, How
does the protcol negotiation happens? I have been reading that the client
sends a client_hello message along with the other protocols supported and
the cipher suites. The Server then sends its supported protocols/cipher
suites and selects the highest protocol supported by client and Server in
the order. Is my understanding correct?

3. How does the TLS_FALLBACK_SCSV is going to work in the above scenario.


Thanks in advance and appreciate your response.

Regards,
-Jaya.

Reply via email to