For posterity, here is an example of the relevant part of the client
trace output when the bug is active, i.e. data is sent with the
ClientRequest:

$ grep -B1 -A4 CertificateRequest s_client.log
  Inner Content Type = Handshake (22)
    CertificateRequest, Length=1570
      request_context (len=0): 
      extensions, length = 1567
        extension_type=status_request(5), length=1521
          0000 - 01 00 05 ed 30 82 05 e9-0a 01 00 a0 82 05 e2   ....0..........

Here is an example of the relevant part of the client trace output when
this is fixed:

$ grep -B1 -A4 CertificateRequest s_client.log
  Inner Content Type = Handshake (22)
    CertificateRequest, Length=45
      request_context (len=0): 
      extensions, length = 42
        extension_type=signature_algorithms(13), length=38
          ecdsa_secp256r1_sha256 (0x0403)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1940141

Title:
  OpenSSL servers can send a non-empty status_request in a
  CertificateRequest

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/openssl/+bug/1940141/+subscriptions


-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to