On Jul 23, 2014, at 8:04 AM, Bob Beck <b...@obtuse.com> wrote:

> An interesting thought Hanno - do we know what other implementations
> (Polar, GnuTLS, etc.) do by default?

PolarSSL does not generate the extension, but tolerates it on the server side.

GnuTLS generates it if you enable the %COMPAT or %DUMBFW priority strings.

> I'm inclined to agree that it never should have been done. Having said
> that, before we nuke it we kind of
> need to know if this is has become de-facto standard behaviour thanks
> to OpenSSL doing this in the
> first place.
> 
> -Bob
> 
> 
> On Wed, Jul 23, 2014 at 2:20 AM, Hanno Böck <ha...@hboeck.de> wrote:
>> Hi,
>> 
>> Quick background: Some router firmwares from F5 have a bug that they
>> fail if the SSL handshake is between 256 and 511 bytes.
>> 
>> Following up that openssl and other major ssl implementations
>> introduced a TLS padding extension that does nothing else than padding
>> the handshake if it is between these sizes.
>> 
>> IMHO this is the wrong way of doing things, because it hides bugs
>> instead of fixing them. And a bunch of alike workarounds in the past
>> are one of the reasons TLS is such a mess these days.
>> Also, there have already been devices found that break with this
>> workaround because they fail if the ssl handshake is above 512 bytes
>> [3].
>> 
>> openssl unconditionally enables the padding extension. I propose a
>> simple step: Just remove it from libressl.
>> 
>> 
>> 
>> [1] https://www.imperialviolet.org/2014/02/27/tlssymmetriccrypto.html
>> [2] http://www.ietf.org/mail-archive/web/tls/current/msg10423.html
>> [3] http://www.ietf.org/mail-archive/web/tls/current/msg12143.html
>> 
>> cu,
>> --
>> Hanno Böck
>> http://hboeck.de/
>> 
>> mail/jabber: ha...@hboeck.de
>> GPG: BBB51E42
> 


Reply via email to