Closed
Bug 1353750
Opened 7 years ago
Closed 7 years ago
malformed extended master secret extension causes incorrect alert
Categories
(NSS :: Libraries, enhancement)
Tracking
(Not tracked)
RESOLVED
FIXED
3.32
People
(Reporter: hkario, Assigned: mt)
Details
When client sends Client Hello that includes a malformed Extended Master Secret extension (one that includes some payload), the server replies with incorrect alert (handshake_failure) instead of a decode_error alert. Version: nss-3.29.3-1.0.fc24.x86_64 Reproducer: git clone https://github.com/tomato42/tlsfuzzer.git pushd tlsfuzzer git checkout extended-master-secret-parameterise git clone https://github.com/warner/python-ecdsa .python-ecdsa ln -s .python-ecdsa/ecdsa ecdsa git clone https://github.com/tomato42/tlslite-ng.git .tlslite-ng pushd .tlslite-ng git checkout ems-fixup popd ln -s .tlslite-ng/tlslite tlslite popd openssl req -x509 -newkey rsa -keyout localhost.key -out localhost.crt -nodes -batch -subj /CN=localhost openssl pkcs12 -export -passout pass: -out localhost.p12 -inkey localhost.key -in localhost.crt mkdir nssdb certutil -N -d sql:nssdb --empty-password pk12util -i localhost.p12 -d sql:nssdb -W '' selfserv -n localhost -p 4433 -d sql:./nssdb -V tls1.0: -H 1 -U 0 -G # in another terminal, same directory PYTHONPATH=tlsfuzzer python tlsfuzzer/scripts/test-extended-master-secret-extension.py 'malformed extended master secret ext' Result: Server prints selfserv: HDX PR_Read returned error -12260: SSL received a malformed Client Hello handshake message. Client prints: AssertionError: Alert description 40 != 50
Updated•7 years ago
|
Status: UNCONFIRMED → NEW
Ever confirmed: true
Assignee | ||
Comment 1•7 years ago
|
||
https://nss-review.dev.mozaws.net/D337 I found that we don't even validate the body of the signed certificate timestamps extension just today. I'm going to lump that in together with this if that's OK with you.
Assignee: nobody → martin.thomson
Reporter | ||
Comment 2•7 years ago
|
||
I'm not sure if implementing support for experimental extension that google already is abandoning is a good use of time; unless you mean https://tools.ietf.org/html/draft-ietf-trans-rfc6962-bis-24 and not https://tools.ietf.org/html/rfc6962 (that is bug 1281469)
Comment 3•7 years ago
|
||
(In reply to Hubert Kario from comment #2) > I'm not sure if implementing support for experimental extension that google > already is abandoning is a good use of time; unless you mean > https://tools.ietf.org/html/draft-ietf-trans-rfc6962-bis-24 and not > https://tools.ietf.org/html/rfc6962 (that is bug 1281469) It wouldn't be fair to characterize it as "abandoning support" Chrome has offered no timeline for 6962-bis adoption, and clearly communicated strong support for 6962 for at least the next 3-5 years, as part of transitioning the WebPKI to CT.
Assignee | ||
Comment 4•7 years ago
|
||
Until we explicitly decide to remove the code, I intend for it to work correctly. Given how inexpensive this fix is, I don't see an issue.
Comment 5•7 years ago
|
||
I agree with MT. The support is already there, it should be correct.
Assignee | ||
Comment 6•7 years ago
|
||
https://hg.mozilla.org/projects/nss/rev/dba170cbc3b4
Status: NEW → RESOLVED
Closed: 7 years ago
Resolution: --- → FIXED
Target Milestone: --- → 3.32
You need to log in
before you can comment on or make changes to this bug.
Description
•