Hi,

found in the current git version.

RFC 6347, Sect. 4.2.2 says:
   The first message each side transmits in each handshake always has
   message_seq = 0.  Whenever each new message is generated, the
   message_seq value is incremented by one.  Note that in the case of a
   rehandshake, this implies that the HelloRequest will have message_seq
   = 0 and the ServerHello will have message_seq = 1

When a OpenSSL DTLS server requests a rehandshake, it correctly sends a
HelloRequest with message_seq = 0, the next ServerHello should have
message_seq = 1, but OpenSSL sends it with message_seq = 0. This clearly
violates the RFC.

Andreas

-- 
-- 
Dipl. Inform.
Andreas Schultz

______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       openssl-dev@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to