Closed Bug 112051 Opened 23 years ago Closed 7 years ago

Send and handle TLS no_renegotiation alerts

Categories

(NSS :: Libraries, enhancement, P3)

3.3.1
enhancement

Tracking

(Not tracked)

RESOLVED WONTFIX

People

(Reporter: nelson, Assigned: nelson)

Details

TLS defines many new alerts, one of which is no_renegotiation.
The alert is intended to provide a way for an application to prevent 
handshakes subsequent to the first one done when the TCP connection is 
established.  

It is always a "warning", never "fatal". but when sending or receiving one, 
the application or TLS implementation must decide whether to 

a) treat this as fatal, terminating the connection, or 

b) simply stop the handshake in progress and allow the TLS connection to 
revert to the state it was in before the handshake began (assuming that
a previous handshake had succeeded).

Presently, libSSL provides no way to ever send that alert.  There is no
way for an application to configure the SSL socket to disallow handshakes
subsequent to the first (or most recently preceeding) one.

Also, libSSL presently just ignores "warning" alerts, and does not reset 
the handshake state when this alert is received, which could lead to a hang.
At the very minimum, libSSL should probably treat these alerts as fatal if 
it cannot reset the handshake.

The ability to send these alerts probably should not be added to libSSL
until libSSL is able to handle these alerts per method "b" above.
Target 4.0.
Priority: -- → P3
Target Milestone: --- → 4.0
Changed the QA contact to Bishakha.
QA Contact: sonja.mirtitsch → bishakhabanerjee
QA Contact: bishakhabanerjee → jason.m.reid
QA Contact: jason.m.reid → libraries
Status: NEW → RESOLVED
Closed: 7 years ago
Resolution: --- → WONTFIX
You need to log in before you can comment on or make changes to this bug.