If I remember/understand correctly, the cloudflare patch for chacha/poly
would (when server preference is in use) only attempt to use it when it
appeared first in the client's preference list, and would ignore it
elsewhere.  This could potentially lead to negotiation failures if,
e.g., the server only supported chacha/poly but the client did not put
it first in the list.  That doesn't seem to match up with what is being
described here, but could provide some insight into where to look.

-Ben

On 07/25/2016 04:00 PM, Ilari Liusvaara wrote:
> On Mon, Jul 25, 2016 at 04:36:27PM -0400, Viktor Dukhovni wrote:
>>> On Jul 25, 2016, at 3:08 PM, Martin Rex <m...@sap.com> wrote:
>>>
>>> specifically, after the FF update, this new TLS ciphersuite:
>>>
>>>   security.ssl3.ecdhe_ecdsa_aes_128_gcm_sha256  (0xcc, 0xa9)
>>>
>>> was the only ECDSA cipher suite enabled in my Firefox 47.0.1, and this
>>> kills connectivity (TLS handshake_failure alert) with regmedia.co.uk.
>> OpenSSL lists "CC, A9" as:
>>
>> 0xCC,0xA9 - ECDHE-ECDSA-CHACHA20-POLY1305 TLSv1.2 Kx=ECDH     Au=ECDSA 
>> Enc=CHACHA20/POLY1305(256) Mac=AEAD
> I wonder what is happening is that having ECDSA ciphersuite enabled
> causes Firefox to include the ECDSA signatures in signature_algorithms
> and the server end sees ECDSA supported, tries to choose that, but
> then blows up when it does not find any enabled ciphersuites it knows
> that support ECDSA...
>
>
>
> -Ilari
>
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to