On Sat, Dec 5, 2015 at 9:33 PM, Peter Gutmann <pgut...@cs.auckland.ac.nz> wrote:
> Watson Ladd <watsonbl...@gmail.com> writes:
>
>>miTLS did not claim to be consistent with the RFC. Rather it claimed to be
>>secure, and to interoperate with most other implementations in circumstances
>>tested. The informal nature of the RFC makes it impossible to carry out
>>formal verification against it.
>
> By that argument, you could start accepting SSH messages in the middle of the
> TLS handshake.  No matter how you colour it, accepting Application Data after
> a Client Hello is wrong.  Is there any random, non-formally-verified
> implementation that would do that?

Any implementation where the record layer state is maintained
separately from the handshake state will do this automatically. The
only security issue is when data is intermingled across authentication
boundaries, but once the record layer is told to encrypt at all that
doesn't happen. If you disagree, please cite the sentence of the TLS
RFC which prohibits accepting application data records during the
handshake.

>
> Peter.



-- 
"Man is born free, but everywhere he is in chains".
--Rousseau.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to