On Wednesday, 4 July 2018 15:46:04 CEST Salz, Rich wrote:
> >    if the interpretation of "I know this _message_ _length_ is wrong
> >    because of 
> >    some other values I negotiated before, so I'll send illegal_parameter"
> >    was  correct, then overflow_error, decrypt_error and probably few
> >    others
> >    would also need to be replaced with illegal_parameter...
>   
> I think the rigorousness of error codes is not at the same level as the rest
> of the document.  I'm fine with that.  I can understand why people
> developing test suites are frustrated. 

It's not about developing test suites. It's about software the test suites are 
running against.

Inconsistent behaviour is usually a sign of a bug (I already had to deal with 
two security bugs, including one remote crash, that were/could have been found 
by verifying the sending of alerts and description of alerts), if not a 
security issue by itself (see ROBOT).

To reiterate: I'm not doing it because it brings me perverse pleasure or 
because I'm obsessive about details or because it makes writing test suites 
easier (it doesn't, that's why first tests I was writing didn't do that), I 
insist on specific, explicit and correct error handling
_because it finds bugs_ 

And I think we can all agree that a secure implementation of TLS needs not to 
have bugs. And we all primarily want to see such implementations, don't we?

-- 
Regards,
Hubert Kario
Senior Quality Engineer, QE BaseOS Security team
Web: www.cz.redhat.com
Red Hat Czech s.r.o., Purkyňova 115, 612 00  Brno, Czech Republic

Attachment: signature.asc
Description: This is a digitally signed message part.

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to