Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix ssl ecc handshake crash on unknown curve #286

Closed

Conversation

stolen
Copy link
Contributor

@stolen stolen commented Mar 9, 2014

original message at http://erlang.org/pipermail/erlang-questions/2014-March/078083.html

When buggy client or security scanner opens a connection to OTP ssl server and sends Supported Elliptic Curves Client Hello Extension with '0' or any other curve id not defined in tls_v1:enum_to_oid/1, a server crashes.

This pull requests fixes this problem by ignoring unknown curve ids.

When TLS client sends a Supported Elliptic Curves Client Hello Extension
containing an unknown curve enum value, a server crashes with a
function_clause instead of just ignoring specified unknown curve.
When TLS client sends Supported Elliptic Curves Client Hello Extension
server should select curves supported by both of them or refuse to
negotiate the use of an ECC cipher suite. So it should be OK to ignore
unknown curves specified by a client.
@proxyles
Copy link
Contributor

We have decided to include this but with a slightly different implementation. Thank you for your contribution!

@proxyles proxyles closed this Mar 14, 2014
@stolen
Copy link
Contributor Author

stolen commented Mar 14, 2014

Are there chances for it to be included in R16B04?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants