On Aug 11, 2013, at 3:33 PM, The default queue via RT <r...@openssl.org> wrote:

> 
> Greetings,
> 
> This message has been automatically generated in response to the
> creation of a trouble ticket regarding:
>       "[openssl.org #3041[PATCH] DTLS message_sequence number wrong in 
> rehandshake ServerHello ", 
> a summary of which appears below.
> 
> There is no need to reply to this message right now.  Your ticket has been
> assigned an ID of [openssl.org #3109].
> 
> Please include the string:
> 
>         [openssl.org #3109]
> 
> in the subject line of all future correspondence about this issue. To do so, 
> you may reply to this message.
It is a response to [openssl.org #304], so I'll resend the message correctly.
You can close this ticket.

Sorry for the inconvenience.

Best regards
Michael
> 
>                        Thank you,
>                        r...@openssl.org
> 
> -------------------------------------------------------------------------
> This patch ensures that
> * A HelloRequest is retransmitted if not responded by a ClientHello
> * The HelloRequest "consumes" the sequence number 0. The subsequent
>  ServerHello uses the sequence number 1.
> * The client also expects the sequence number of the ServerHello to
>  be 1 if a HelloRequest was received earlier.
> This patch fixes the RFC violation.
> 
> This patch should be applied to 1.0.1, 1.0.0 and 0.9.8.
> 
> 
> 


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       openssl-dev@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to