Watson Ladd <watsonbl...@gmail.com> writes:
>On Sat, Dec 5, 2015 at 6:54 PM, Peter Gutmann <pgut...@cs.auckland.ac.nz> 
>wrote:
>> Hubert Kario <hka...@redhat.com> writes:
>>
>>>miTLS does accept Application Data when it is send between Client Hello and
>>>Client Key Exchange and rejects it when it is sent between Change Cipher Spec
>>>and Finished.
>>
>> Given that miTLS is a formally verified implementation, would this imply that
>> there's a problem with the verification?  "Beware of bugs in the above code; 
>> I
>> have only proved it correct, not tried it"?
>
>Are you saying there is a security flaw with the behavior described?

I hadn't even thought it through to that point, more that you're not supposed
to accept anything between Client Hello and Client Keyex except an optional
Client Certificate.

(OK, I haven't gone through every extension RFC and draft to see what else you
could poke in there, but I'm pretty sure Application Data isn't one of them).

Peter.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to