Closed
Bug 1608892
Opened 4 years ago
Closed 4 years ago
Update DTLS 1.3 to draft-34
Categories
(NSS :: Libraries, enhancement, P1)
NSS
Libraries
Tracking
(Not tracked)
RESOLVED
FIXED
3.51
People
(Reporter: kjacobs, Assigned: kjacobs)
References
(Blocks 1 open bug)
Details
Attachments
(1 file)
DTLS 1.3 implementation is at draft-30 as of https://hg.mozilla.org/projects/nss/rev/8b7f0180c5b05870c67fcc06338749e42863c74f
This bug tracks the next update to draft-34 (currently latest).
Updated•4 years ago
|
Priority: -- → P1
Assignee | ||
Comment 1•4 years ago
|
||
This patch updates the DTLS 1.3 implementation to draft-34. Notable changes:
- Key separation via
ssl_protocol_variant
. - No longer apply sequence number masking when in
UNSAFE_FUZZER_MODE
. This allowed removal of workarounds for unpadded (<16B) ciphertexts being used as input toSSL_CreateMask
. - Compile ssl_gtests in
UNSAFE_FUZZER_MODE
iff--fuzz=tls
was specified. Currently all gtests are compiled this way if--fuzz
, but lib/ssl only if--fuzz=tls
. (See above, we can't have ssl_gtests in fuzzer mode, but not lib/ssl, since the masking mismatch will break filters). - Parameterize masking tests, as appropriate.
- Reject non-empty legacy_cookie, and test.
- Reject ciphertexts <16B in length in
dtls13_MaskSequenceNumber
(if notUNSAFE_FUZZER_MODE
).
Assignee | ||
Comment 2•4 years ago
|
||
Status: ASSIGNED → RESOLVED
Closed: 4 years ago
Resolution: --- → FIXED
Target Milestone: --- → 3.51
Assignee | ||
Updated•4 years ago
|
Blocks: dtls1.3-support
You need to log in
before you can comment on or make changes to this bug.
Description
•