Nelson B <[EMAIL PROTECTED]> writes:

>Peter Gutmann wrote:
>> Gervase Markham <[EMAIL PROTECTED]> writes:

>>>SSL3 has a mechanism for detecting an attacker attempting to downgrade a 
>>>connection between two SSL3 endpoints to SSL2 in order to MITM it, if 
>>>that's what you mean.
>> 
>> However for TLS Microsoft got their implementation of this wrong (it's still
>> wrong in the latest versions of MSIE, last time I checked), so all other
>> implementations don't use it in order to work with MSIE/IIS:

>Actually, quite a few server products DO properly implement version roll-back
>detection.  I think that's one reason why IE keeps TLS disabled by default.
>Dunno why they don't just fix it.

Because in order to be compatible with MSIE, everyone else has to break their
code, so there's no need to fix it :-).  Are there products around that will
actually reject an MSIE handshake with its wrong version number?  Since I
never use MSIE (apart from testing my own code), I haven't noticed any
problems with connecting.  I know that when I first saw it I asked another SSL
developer about it and he said it was a known problem, and the solution was
just to ignore the invalid version number for an MSIE connect.

Peter.

_______________________________________________
Mozilla-security mailing list
[email protected]
http://mail.mozilla.org/listinfo/mozilla-security

Reply via email to