On Thu, Jul 21, 2016 at 10:19:34AM +0000, David Benjamin wrote:
> On Wed, Jul 20, 2016 at 5:43 PM Benjamin Kaduk <bka...@akamai.com> wrote:
> 
> > On 07/20/2016 05:01 AM, Hanno Böck wrote:
> > > On Wed, 20 Jul 2016 11:20:46 +0200
> > > Hubert Kario <hka...@redhat.com> wrote:
> > >
> And as Hubert notes, there may well be other intolerance triggers to clear
> through. 1.3 has a larger ClientHello. We have also never added a new
> signature algorithm before. But I think that just means we have more rusted
> protocol joints fix rather than just the one.

Could be useful to scan for SignatureScheme. I think the most worthwhile 6
to scan would be:

0x0003 (ECDSA-NONE in TLS 1.2)
0x0004 (UNKNOWN4-NONE in TLS 1.2)
0x0404 (UNKNOWN4-SHA256 in TLS 1.2)
0x0700 (ANON-UNKNOWN7 in TLS 1.2)
0x0703 (ECDSA-UNKNOWN7 in TLS 1.2)
0x0704 (UNKNOWN4-UNKNOWN7 in TLS 1.2)

And then see how many servers do anything retarded with these...


-Ilari

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to