Hi,

I found a weird packet capture of DHE key exchange.

C --> S
TLSv1.2
cipher suite used: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (0x009f)

ServerKeyExchange message is sending:

p length: 257 whereas pubkey length is: 256

256 means 256*8 = 2048 bit DHE key size.

I am assuming, generally when using DHE, the p length and pubkey length
should match.

Here p length = 257*8 = 2056 bits whereas pubkey len is 2048 bits, which is
unusual.

Since SKE msg advertised a p len of 257, the client promptly responded with
a client public key size of 257 in its CKE msg to match the p len
advertised by SKE. Thus I feel the client behaviour is correct here.

Can I know whether using diff p len and pubkey len allowed in DHE key
exchange?

with regards,
Saravanan
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to