>> else" could have a look at / comment on it (in particular someone
>> who's

Correcting myself (to keep English grammar straight):
s/who's/whose/, actually

> I'll look into this in more detail later, however on the face of it 
> there's a conflict with draft-ietf-tls-rfc4366-bis-06.txt
> specifically:

Hmm, interesting. Thanks for pointing this out - apparently this text
was only added in the latest revision of that I-D (published on 26
October 2009)... as a consequence of the AD review comments here, I
assume: http://www.ietf.org/mail-archive/web/tls/current/msg03720.html.

> I'm never one for blindly following specs especially if they suggest
> something stupid ;-) However if the current extensions draft includes
> undesirable behaviour that should be mentioned to the ietf-tls
> working group.

I think it's good to see that draft-ietf-tls-rfc4366-bis-06 is now
really explicit about this point. If we follow this rule (and I don't
have specific arguments against it), then the current OpenSSL code is
probably already correct, indeed. It also means that a client should not
attempt session resumption for the case I originally described in this
ticket (note that future NSS-based versions of Chrome/Chromium will no
longer trigger this issue with mod_ssl anyway, cf.
http://code.google.com/p/chromium/issues/detail?id=28732).

One smaller issue remains, nevertheless: when working on the patch, I
noticed that ssl_parse_clienthello_tlsext() currently chokes on an SNI
extension with more than one hostname - and aborts with a (fatal)
decode_error alert. I wonder if that's really the most appropriate way
of handling this case (for decode_error, RFC 5246 says "This message is
always fatal and should never be observed in communication between
proper implementations (except when messages were corrupted in the
network)". Should we change it to send an unrecognized_name alert
instead (or simply ignore the additional names, as I'm proposing in the
previously attached patch)?

Kaspar


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       openssl-dev@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to