On Thu, Oct 13, 2016 at 03:17:32PM +0900, Kazuho Oku wrote:
> TLDR: the spec. was clear and easy to implement, but some test vectors
> and clarification on what constitutes a Handshake Context would have
> helped.
> 
> FWIW, please let me share my experience of implementing TLS 1.3.
> 
> This month, I have written a TLS 1.3 implementation (named picotls,
> available at https://github.com/h2o/picotls) based on draft 16 from
> scratch.

Tried interop versus my own implementation (with my implementation
as client).

Didn't work... I traced the blowup to client_hello_decode_server_name():

The sent contents of the SNI extension is:

00 0B 00 00 08 "h2o.test"

Which AFAICT is a server name list of 11 bytes, containing entry of
type 0 (host_name), with length 8 and name "h2o.test".

picotls seems to interpret the first byte as the type (happens to
be 0, which is host_name), and then interprets 0B 00 as the
length of the hostname. Which of course blows up as the length
is way too big (over 2kB).


Also, my implementation does not show any alert being received
from the peer (as result of this failure), just connection being
closed (internally, picotls returns -50, which I think is
decode_error)?


-Ilari

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to