Bodo Moeller wrote:
> 
> On Tue, May 23, 2000 at 01:21:51PM +0100, Dr Stephen Henson wrote:
> 
> >> Actually there's no security problem for servers to accept a
> >> PreMasterSecret that contains the negotiated protocol version instead
> >> of the client_version from the ClientHello if these don't match;
> >> so it's possible for servers to adopt to both correct and broken
> >> clients, in case there are already TLS 1.0-aware clients that send
> >> incorrect PreMasterSecret messages as expected by those broken SSLv3
> >> servers.
> 
> > Yes I was thinking we should make OpenSSL tolerate this, either by
> > default or a bug option. The only way you'll see this though is by
> > connecting with a broken client on an OpenSSL server that disables TLS.
> 
> Not as default (it's wrong after all), just as a bug option.
> But first I'd like to see any client that actually shows this behaviour
> -- note that for clients that don't come with TLS 1.0 support,
> all this is not an issue.

MSIE 5.0 does this, well at least version 5.00.2919.6307 You have to
change the default settings (at least on the version I have) to enable
TLS then try connecting to:

openssl s_server -no_tls1

It also seems that this bug was known some time ago. There is a bug
option called SSL_OP_TLS_ROLLBACK_BUG which is otherwise unreferenced in
the code. There was some code which was #if 0'ed out earlier which
seemed to cover this (but do other things as well) but its been deleted
from s3_srvr.c

Steve.
-- 
Dr Stephen N. Henson.   http://www.drh-consultancy.demon.co.uk/
Personal Email: [EMAIL PROTECTED] 
Senior crypto engineer, Celo Communications: http://www.celocom.com/
Core developer of the   OpenSSL project: http://www.openssl.org/
Business Email: [EMAIL PROTECTED] PGP key: via homepage.

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to