According to the discussions in other threads, some applications
contain that kind of code, some don't.

Since alot of people are getting confused, I am asking that the
documentation clarify if only applications with that kind of code
need to do anything at all.

On 17-10-2014 18:25, Nou Dadoun wrote:

Since this is the users list (as opposed to the dev list) I’m a little confused about point 2 there; my understanding from the sketchy descriptions I’ve read is that the fallback to a lower version is automatically done by openssl on connect failure as opposed to something similar to the code snippet below being present in application code. (i.e. I’m not sure whether you intend the “client” in that description to be openssl library code or user application code which calls into the library). Thanks … N

*From:*owner-openssl-us...@openssl.org [mailto:owner-openssl-us...@openssl.org] *On Behalf Of *Jakob Bohm
*Sent:* October-17-14 7:59 AM
*To:* openssl-users@openssl.org
*Subject:* Please document the new SSL_MODE_SEND_FALLBACK_SCSV

The new SSL_MODE_SEND_FALLBACK_SCSV option is badly documented in
the wiki and man pages, which is going to cause a lot of problems
when people everywhere rush to incorporate the security fixes into
their code.

In particular, I find the following to be fully undocumented (except
by trying to read the code):

1. SSL_MODE_SEND_FALLBACK_SCSV was introduced in versions 1.0.1j,
  1.0.0o and 0.9.8zc, not way back when SSL_CTX_set_mode() itself
  was introduced.  The information at the bottom of that manpage
  needs to say that, like it already does for SSL_MODE_AUTO_RETRY.

2. [ THIS IS A GUESS ]
   SSL_MODE_SEND_FALLBACK_SCSV should only be set if the client
  contains code like the following:

  /* pseudo code */
  SSL_try_connect_(supporting versions x..y)
  if (failed) {
     SSL_try_connect_(supporting versions x..y-1)
     if (failed) {
        SSL_try_connect_(supporting versions x..y-2)
        ... (etc.)
     }
  }

  In which case that code needs to change to

  /* pseudo code */
  SSL_try_connect_(supporting versions x..y)
      /* No SSL_MODE_SEND_FALLBACK_SCSV when trying with highest
        attempted y */
  if (failed) {
SSL_try_connect_(supporting versions x..y-1, SSL_MODE_SEND_FALLBACK_SCSV)
     if (failed) {
SSL_try_connect_(supporting versions x..y-2, SSL_MODE_SEND_FALLBACK_SCSV)
        ... (etc.)
     }
  }

  (Note: The Internet draft says (in very technical terms) when an
  SSL client should send the message, not when an application should
  tell any given SSL library to do so, because that answer is expected
  to differ between OpenSSL, Mozilla NSS, Microsoft SCHANNEL,
  MatrixSSL and other SSL libraries).

3. Unlike the other SSL_MODE_ options, SSL_MODE_SEND_FALLBACK_SCSV
 is not about an internal API behavior.

4. Why this isn't SSL_OPTION_SEND_FALLBACK_SCSV (there is probably
 a good reason, but it isn't documented).


--
Jakob Bohm, CIO, partner, WiseMo A/S. http://www.wisemo.com
Transformervej 29, 2730 Herlev, Denmark. direct: +45 31 13 16 10 <call:+4531131610>
This message is only for its intended recipient, delete if misaddressed.
WiseMo - Remote Service Management for PCs, Phones and Embedded
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to