Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Middlebox compatibility #386

Closed
wants to merge 3 commits into from
Closed

Middlebox compatibility #386

wants to merge 3 commits into from

Conversation

ocheron
Copy link
Contributor

@ocheron ocheron commented Jul 20, 2019

Currently the server code sends CCS13 at a fixed location, not very useful in case of HRR or early data. This PR adds remaining implementation of middlebox compatibility mode, hoping to maximize compatibility when transitioning to TLS 1.3.

I also include the client verification of legacy_session_id_echo.

Adds the requirement from RFC 8446 section 4.1.3:

   A client which receives a legacy_session_id_echo field that does
   not match what it sent in the ClientHello MUST abort the handshake
   with an "illegal_parameter" alert.
@kazu-yamamoto kazu-yamamoto self-requested a review July 22, 2019 00:13
Copy link
Collaborator

@kazu-yamamoto kazu-yamamoto left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks lovely!

kazu-yamamoto added a commit to kazu-yamamoto/hs-tls that referenced this pull request Jul 22, 2019
@kazu-yamamoto
Copy link
Collaborator

Merged.

@ocheron ocheron deleted the middlebox-compat branch July 22, 2019 04:51
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants