On Thursday, 5 July 2018 02:06:45 CEST Martin Thomson wrote:
> On Wed, Jul 4, 2018 at 7:55 PM Hubert Kario <hka...@redhat.com> wrote:
> > Despite this, is it correct to terminate a connection with
> > "illegal_parameter" upon receiving a Finished handshake message with a
> > 100 byte payload? or a 20 byte payload? My opinion is that it is not,
> > "decode_error" is more specific so it should be used instead.
> 
> When there are multiple problems with a message, why do we need to
> accept just one of the possible alerts?  That assumes either a very
> particular order of processing, or a strict precedence order for
> errors.  Like Rich says, there is a degree of imprecision in our error
> reporting, but - for me - that's OK.

but there are no multiple problems with the message in question

no part of the TLS standards states that the implementation should check if 
the length of the handshake message lies within expected bounds

but there *is* a section that explicitly calls out that the implementation 
needs to verify if the handshake message matches the header, *after* parsing

-- 
Regards,
Hubert Kario
Senior Quality Engineer, QE BaseOS Security team
Web: www.cz.redhat.com
Red Hat Czech s.r.o., Purkyňova 115, 612 00  Brno, Czech Republic

Attachment: signature.asc
Description: This is a digitally signed message part.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to