Re: [openssl.org #1105] DTLS HelloVerifyRequest PATCH
So the bug report can be removed, right? Yes, the report can be removed. It is not a bug. (and *please* keep [EMAIL PROTECTED] among the recipients. It's quite hard to follow history in the database when people keep skipping that address) Apologies. nagendra __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager [EMAIL PROTECTED]
[openssl.org #1105] DTLS HelloVerifyRequest PATCH
[EMAIL PROTECTED] - Wed Jun 29 17:43:06 2005]: So the bug report can be removed, right? Yes, the report can be removed. It is not a bug. Thanks. Ticket resolved. -- Richard Levitte [EMAIL PROTECTED] __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager [EMAIL PROTECTED]
Re: [openssl.org #1105] DTLS HelloVerifyRequest PATCH
In message [EMAIL PROTECTED] on Sat, 25 Jun 2005 02:30:40 -0700, nagendra modadugu [EMAIL PROTECTED] said: nagendra It turns out that the Version field was omitted from the nagendra HelloVerify message in the internet draft. The document nagendra will be corrected. So the bug report can be removed, right? (and *please* keep [EMAIL PROTECTED] among the recipients. It's quite hard to follow history in the database when people keep skipping that address) Cheers, Richard - Please consider sponsoring my work on free software. See http://www.free.lp.se/sponsoring.html for details. -- Richard Levitte [EMAIL PROTECTED] http://richard.levitte.org/ When I became a man I put away childish things, including the fear of childishness and the desire to be very grown up. -- C.S. Lewis __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager [EMAIL PROTECTED]
Re: [openssl.org #1105] DTLS HelloVerifyRequest PATCH
It turns out that the Version field was omitted from the HelloVerify message in the internet draft. The document will be corrected. nagendra * nagendra modadugu [EMAIL PROTECTED] [2005-06-08 17:09:40 -0700]: I think you might have found a bug in the draft document. I'll get back to you soon. Thanks, nagendra * Tigran Gevorgyan via RT [EMAIL PROTECTED] [2005-06-08 22:00:58 +0200]: Hello, I apologize if this message appears multiple times. This is a proposed patch for openssl-0.9.8-beta for all platforms. I tested it with openssl-0.9.8beta2 however I think it is applicable to all openssl-0.9.8 trees. I think the current implementation of DTLS is not compliant with the draft. According to http://www.ietf.org/internet-drafts/draft-rescorla-dtls-04.txt Section 4.3 the HelloVerifyRequest is defined like this: struct { Cookie cookie0..32; } HelloVerifyRequest; The 0.9.8-beta2 implementation has two additional octets which specify the protocol version. Is this according to a newer version of the DTLS draft or is it an error? Attached is a patch that removes the code that parses and generates this additional octets. Thanks Tigran Gevorgyan This e-mail message, including any attachments, is for the sole use of the intended recipient(s) and may contain confidential and privileged information. Unauthorized review, use, disclosure or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. Thank you. __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager [EMAIL PROTECTED] __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager [EMAIL PROTECTED] __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager [EMAIL PROTECTED]
[openssl.org #1105] DTLS HelloVerifyRequest PATCH
I'm leaving this unresolved for now, since we still don't know if that's a bug in the draft or not... -- Richard Levitte [EMAIL PROTECTED] __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager [EMAIL PROTECTED]
[openssl.org #1105] DTLS HelloVerifyRequest PATCH
Hello, I apologize if this message appears multiple times. This is a proposed patch for openssl-0.9.8-beta for all platforms. I tested it with openssl-0.9.8beta2 however I think it is applicable to all openssl-0.9.8 trees. I think the current implementation of DTLS is not compliant with the draft. According to http://www.ietf.org/internet-drafts/draft-rescorla-dtls-04.txt Section 4.3 the HelloVerifyRequest is defined like this: struct { Cookie cookie0..32; } HelloVerifyRequest; The 0.9.8-beta2 implementation has two additional octets which specify the protocol version. Is this according to a newer version of the DTLS draft or is it an error? Attached is a patch that removes the code that parses and generates this additional octets. Thanks Tigran Gevorgyan This e-mail message, including any attachments, is for the sole use of the intended recipient(s) and may contain confidential and privileged information. Unauthorized review, use, disclosure or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. Thank you. __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager [EMAIL PROTECTED]
Re: [openssl.org #1105] DTLS HelloVerifyRequest PATCH
I think you might have found a bug in the draft document. I'll get back to you soon. Thanks, nagendra * Tigran Gevorgyan via RT [EMAIL PROTECTED] [2005-06-08 22:00:58 +0200]: Hello, I apologize if this message appears multiple times. This is a proposed patch for openssl-0.9.8-beta for all platforms. I tested it with openssl-0.9.8beta2 however I think it is applicable to all openssl-0.9.8 trees. I think the current implementation of DTLS is not compliant with the draft. According to http://www.ietf.org/internet-drafts/draft-rescorla-dtls-04.txt Section 4.3 the HelloVerifyRequest is defined like this: struct { Cookie cookie0..32; } HelloVerifyRequest; The 0.9.8-beta2 implementation has two additional octets which specify the protocol version. Is this according to a newer version of the DTLS draft or is it an error? Attached is a patch that removes the code that parses and generates this additional octets. Thanks Tigran Gevorgyan This e-mail message, including any attachments, is for the sole use of the intended recipient(s) and may contain confidential and privileged information. Unauthorized review, use, disclosure or distribution is prohibited. If you are not the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message. Thank you. __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager [EMAIL PROTECTED] __ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager [EMAIL PROTECTED]