Have you ever seen a TLS server that was incompatible with TLS session
IDs?

I helped to analyze bug 858394 (with the help of ssltap), where initial
connections to a TLS server work, but attempts to reconnect fail.

If the client includes a non-null session ID parameter in the client
hello message, the server immediately terminates the connection.

I reproduced the problem using ssltap (from NSS) and using the s_client
utility (from openssl).

It has been confirmed (using a custom build) that reconnecting with TLS
session caching disabled makes reconnections work.

Do you agree this is bug on the server side? Should we attempt to
identify which TLS toolkits and versions show this broken behaviour?

At least NSS/PSM currently don't expect such behaviour. We don't
automatically retry without a TLS session ID. Should we?

Regards
Kai

PS:

Bug report: https://bugzilla.mozilla.org/show_bug.cgi?id=858394

How to reproduce: 
# ssltap -s -l 86.65.39.15:6697
# openssl s_client -connect 127.0.0.1:1924 -ssl3 -tls1 \
                   -no_ssl2 -no_tls1_1 -no_tls1_2 -reconnect


-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to