Nelson B <[EMAIL PROTECTED]> writes: >Peter Gutmann wrote: >> Gervase Markham <[EMAIL PROTECTED]> writes:
>>>SSL3 has a mechanism for detecting an attacker attempting to downgrade a >>>connection between two SSL3 endpoints to SSL2 in order to MITM it, if >>>that's what you mean. >> >> However for TLS Microsoft got their implementation of this wrong (it's still >> wrong in the latest versions of MSIE, last time I checked), so all other >> implementations don't use it in order to work with MSIE/IIS: >Actually, quite a few server products DO properly implement version roll-back >detection. I think that's one reason why IE keeps TLS disabled by default. >Dunno why they don't just fix it. Because in order to be compatible with MSIE, everyone else has to break their code, so there's no need to fix it :-). Are there products around that will actually reject an MSIE handshake with its wrong version number? Since I never use MSIE (apart from testing my own code), I haven't noticed any problems with connecting. I know that when I first saw it I asked another SSL developer about it and he said it was a known problem, and the solution was just to ignore the invalid version number for an MSIE connect. Peter. _______________________________________________ Mozilla-security mailing list [email protected] http://mail.mozilla.org/listinfo/mozilla-security
