On 10/22/2015 06:29 AM, Eric Rescorla wrote:


From an implementation perspective, I wouldn't be surprised if client
implementations choked on the server sending this. I had to check
to see if NSS would do so. It doesn't, but given the way the code
is written, it wouldn't have surprised me if it checked that all extensions
were handled and choked otherwise.

Yeah, NSS was implemented under the old 'be graceful in what you accept' with the 'be a bit paranoid when security is on the line'.

That being said, in the early days of SSL3, unknown extensions were explicitly allowed, mostly so you could handle new protocols against old servers.

In practice this failed miserably because many server implementations followed the standard security paranoia of 'it's there and I don't undertand it, fail'. This is why we have/had TLS intolerance issues.

Anyway NSS is purposefully tolerant of well formed unknown extensions, as well as typically accepting new extensions on older versions of the protocol (like accepting ECC operations even though you negotiated SSL3).

bob

-Ekr


    -Martin




_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to