On Sat, Dec 5, 2015 at 8:18 PM, Peter Gutmann <pgut...@cs.auckland.ac.nz> wrote:
> Watson Ladd <watsonbl...@gmail.com> writes:
>>On Sat, Dec 5, 2015 at 6:54 PM, Peter Gutmann <pgut...@cs.auckland.ac.nz> 
>>wrote:
>>> Hubert Kario <hka...@redhat.com> writes:
>>>
>>>>miTLS does accept Application Data when it is send between Client Hello and
>>>>Client Key Exchange and rejects it when it is sent between Change Cipher 
>>>>Spec
>>>>and Finished.
>>>
>>> Given that miTLS is a formally verified implementation, would this imply 
>>> that
>>> there's a problem with the verification?  "Beware of bugs in the above 
>>> code; I
>>> have only proved it correct, not tried it"?
>>
>>Are you saying there is a security flaw with the behavior described?
>
> I hadn't even thought it through to that point, more that you're not supposed
> to accept anything between Client Hello and Client Keyex except an optional
> Client Certificate.
>
> (OK, I haven't gone through every extension RFC and draft to see what else you
> could poke in there, but I'm pretty sure Application Data isn't one of them).

miTLS did not claim to be consistent with the RFC. Rather it claimed
to be secure, and to interoperate with most other implementations in
circumstances tested. The informal nature of the RFC makes it
impossible to carry out formal verification against it.
>
> Peter.



-- 
"Man is born free, but everywhere he is in chains".
--Rousseau.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to