Ok fine you can be forward compatible but i still don't agree its my
personal opinion if I don't know what the packet format for next version
why should I support it. But this was not the major issue for what i
started the discussion. I think the major is relaxing the record layer
check to SSLv3 and we should fix it.




On Fri, Apr 11, 2014 at 4:32 PM, Lukas Tribus <[email protected]> wrote:

> Hi,
>
>
> > I think the next version may or may not contain the same client hello
> > format if it allows i don't have any issues if it doesn't allows then
> > the code may crash or it may return bad value for SNI. I just suggested
> > it for safety reasons its just my input.
>
> If HAproxy would crash, we would need to fix the actual reason of the
> crash, not ignore SNI when TLS version is higher than 1.2, because an
> attacker can always send packets with TLSv1.2 and the offending payload,
> even if its not valid packet as per RFC.
>
>
> As for bad values: SNI is a client provided value and thus must never
> be trusted. We can use it for routing the request to different backends,
> but we always need to validate it before doing something with it.
>
>
>
>
> Regards,
>
> Lukas
>
>

Reply via email to