one correction:

> cipher suite used: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (0x009f)

It is actually TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 (0x009e)


On Tue, 17 Oct 2023 at 13:55, M K Saravanan <mksa...@gmail.com> wrote:

> Hi,
>
> I found a weird packet capture of DHE key exchange.
>
> C --> S
> TLSv1.2
> cipher suite used: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 (0x009f)
>
> ServerKeyExchange message is sending:
>
> p length: 257 whereas pubkey length is: 256
>
> 256 means 256*8 = 2048 bit DHE key size.
>
> I am assuming, generally when using DHE, the p length and pubkey length
> should match.
>
> Here p length = 257*8 = 2056 bits whereas pubkey len is 2048 bits, which
> is unusual.
>
> Since SKE msg advertised a p len of 257, the client promptly responded
> with a client public key size of 257 in its CKE msg to match the p len
> advertised by SKE. Thus I feel the client behaviour is correct here.
>
> Can I know whether using diff p len and pubkey len allowed in DHE key
> exchange?
>
> with regards,
> Saravanan
>
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to