Re: Session Ticket Support in Openssl TLS 1.2

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 06/09/2017 07:54 PM, Neetish Pathak wrote:

On Thu, Jun 8, 2017 at 3:45 PM, Matt Caswell <matt@xxxxxxxxxxx> wrote:


On 08/06/17 23:12, Neetish Pathak wrote:
> Thanks.
> I had one query regarding the TLS 1.3 implementation on server side. I
> have a simple client server program with session resumption working with
> TLS 1.2.
> When I use TLS 1.3, I see that server hello message has a malformed
> packet.

How do you know it is malformed? The format of the ServerHello message
has changed in TLSv1.3, so if you expect it to look like a TLSv1.2
ServerHello then you will be surprised.


I know the ServerHello is malformed from the WIRESHARK LOGS. It shows an exception for the ServerHello with malformed packet message.

It is quite likely that your version of wireshark does not know how to properly decode the TLS 1.3 ServerHello.  When interpreted as a TLS 1.2 ServerHello, it is expected to show as malformed, because the protocol formats are different between the two protocols.  This is what Matt was trying to say.

Someone could look at the raw hex dump of the packet and decode it manually as a TLS 1.3 ServerHello to confirm whether it is actually malformed or just a wireshark error.

-Ben
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux