post-handshake auth doesn't interoperate with OpenSSL
Categories
(NSS :: Libraries, enhancement)
Tracking
(Not tracked)
People
(Reporter: ueno, Unassigned)
References
Details
Attachments
(3 files)
I realized that the current implementation of post-handshake auth doesn't interoperate with OpenSSL, because of the wrong calculation of hash context after handshake (sorry about that).
It would be nice there is an automatic interoperability test, but for now I am adding a minimal support for post-handshake auth in selfserv/tstclnt to enable manual testing.
Reporter | ||
Comment 1•6 years ago
|
||
In post-handshake, Handshake Context should be:
ClientHello ... client Finished + CertificateRequest
while NSS continues feeding any handshake message after handshake.
Reporter | ||
Comment 2•6 years ago
|
||
Reporter | ||
Comment 3•6 years ago
|
||
Some servers send a certificate_required alert when the client returns
no certificate while it is required. For server, it is not mandatory
to send this alert, but it could make it easier for the client to
distinguish bad_certificate and the declined cases.
Reporter | ||
Comment 4•6 years ago
|
||
Pushed as:
https://hg.mozilla.org/projects/nss/rev/eb03936b42bb
https://hg.mozilla.org/projects/nss/rev/bb58098d38a5
https://hg.mozilla.org/projects/nss/rev/15905cd1cab9
Thank you Martin for the reviews!
Description
•