On Aug 11, 2013, at 3:33 PM, The default queue via RT <r...@openssl.org> wrote:
> > Greetings, > > This message has been automatically generated in response to the > creation of a trouble ticket regarding: > "[openssl.org #3041[PATCH] DTLS message_sequence number wrong in > rehandshake ServerHello ", > a summary of which appears below. > > There is no need to reply to this message right now. Your ticket has been > assigned an ID of [openssl.org #3109]. > > Please include the string: > > [openssl.org #3109] > > in the subject line of all future correspondence about this issue. To do so, > you may reply to this message. It is a response to [openssl.org #304], so I'll resend the message correctly. You can close this ticket. Sorry for the inconvenience. Best regards Michael > > Thank you, > r...@openssl.org > > ------------------------------------------------------------------------- > This patch ensures that > * A HelloRequest is retransmitted if not responded by a ClientHello > * The HelloRequest "consumes" the sequence number 0. The subsequent > ServerHello uses the sequence number 1. > * The client also expects the sequence number of the ServerHello to > be 1 if a HelloRequest was received earlier. > This patch fixes the RFC violation. > > This patch should be applied to 1.0.1, 1.0.0 and 0.9.8. > > > ______________________________________________________________________ OpenSSL Project http://www.openssl.org Development Mailing List openssl-dev@openssl.org Automated List Manager majord...@openssl.org