Ion Larranaga Azcue <ila...@s21sec.com> writes:

>I would say it's unfair to expect other people to diagnose the problem by
>claiming "that information was all that was available" because you had access
>to:
>
>- traffic dumps of the failing handshakes

There was no access to this.

>- traffic dumps of working handshakes

There was no access to this.

>- the possibility to try any number of modifications of the client hello to
>go from a working handshake to a failing handshake in order to identify the
>offending option or parameter

That was only after the second day of negotiations, when I managed to get
indirect access to the server to use it as an oracle, resulting in trial-and-
error modification of the client hello until the server didn't report a
handshake failure any more.

>- as you are going to have to ask the server side to activate extended
>alerts, you can ask them for server logs, as well as traffic dumps of (at
>least) the failed connections on their side (if they receive any, which is
>additional information)

Neither of those were available, and neither of them could be made available.
As I said in my previous message, the only information I had was "Handshake
failed".

>Besides, I also think it's not fair to claim that when someone disagrees, you
>are being "shouted down". 

What I meant was that as it's a non-zero amount of effort to write up a draft,
I wasn't terribly keen on putting in the effort only to have it bikeshedded to
death with "it's a security problem" (it isn't, unless you go out of your way
to make it one), "you can look at the server logs" (no, you can't), etc.  So
what I was trying to get is an idea of whether it's worth writing a draft or
not.

>That being said... I encourage you to write your draft and look for consensus
>within the group.

OK, I'll give it a go.

Peter.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to