[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #6033 [Tor Bridge]: Tor v2 handshake does not work with openssl 1.0.1
#6033: Tor v2 handshake does not work with openssl 1.0.1
------------------------+---------------------------------------------------
Reporter: murble | Owner:
Type: defect | Status: new
Priority: critical | Milestone: Tor: 0.2.2.x-final
Component: Tor Bridge | Version: Tor: 0.2.3.15-alpha
Keywords: | Parent:
Points: | Actualpoints:
------------------------+---------------------------------------------------
Comment(by marshray):
I have reproed the problem and attached a packet capture.
Packets 4 and 6 show TLS 1.1 being negotiated successfully.
Packet 11 is an encrypted handshake message that is the client initiated
renegotiation. However, note that the record layer version has jumped
backwards from 1.1 to 1.0. It's expected that the initial Client Hello
will have a record layer version of TLS 1.0 because the client doesn't
know if the server supports anything higher. But once encryption has
started, it's not OK for the client to change the record layer version
because that would change the encryption format and the server wouldn't be
able to decode it. I believe this behavior is against RFC 5246.
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/6033#comment:8>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs