On Tue, Aug 2, 2016 at 6:33 AM, Bauer Johannes (HOME/EFS)
<johannes.ba...@bosch.com> wrote:
> Dear mailing list,
>
> regarding RFC5746 (https://tools.ietf.org/rfc/rfc5746.txt) I do have a 
> question which could not be solved in our internal discussions. Therefore I 
> would kindly ask for your comments on my issue. If I posted to the wrong 
> place, please advise on where such a question would be relevant instead.
>
> The question revolves around TLS servers (and clients) which do not support 
> renegotiation at. The server side is the more interesting of the two, hence I 
> will discuss it first. Sect 4.3 says:
>
>    In order to enable clients to probe, even servers that do not support
>    renegotiation MUST implement the minimal version of the extension
>    described in this document for initial handshakes, thus signaling
>    that they have been upgraded.
>
> This hint refers to Sect. 3.6 ("Server Behavior: Initial Handshake"). It says 
> that a server in any case (independent if it supports or does not support 
> renegotiation at all) must send a empty renegotiation_info TLS extension as 
> soon as it receives a client request for that info (be it either by a 
> renegotiation_info or by the SCSV). Sending that empty renegotiation_info is 
> really no problem even for deeply embedded TLS servers (the message is only 5 
> bytes and always static).
>
> However, there is also this in Sect. 3.6 which has caused some confusion and 
> lengthy discussion among my colleagues and myself:
>
>    o  When the handshake has completed, the server needs to save the
>       client_verify_data and server_verify_data values for future use.

Yes, and since it doesn't read them out, it should use write only
memory as an optimization.

Sincerely,
Watson Ladd

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to