mitls-fstar icon indicating copy to clipboard operation
mitls-fstar copied to clipboard

miTLS and NSS servers emit different alerts when manipulating EncryptedExtensions

Open oweisse-msft opened this issue 7 years ago • 2 comments

Items inside EncryptedExtensions are shuffled, and encrypted with the correct server handshake key. The miTLS client responds with plaintext-alert  bad_certificate, while NSS client doesn’t emit an alert (potential NSS issue) .    1. In case of miTLS server and miTLS client (emitting bad_certificate), the miTLS client response will be encrypted-alert of type   decryption_failed_RESERVED 2. In case of NSS server and miTLS client (emitting bad_certificate), the miTLS client response will be encrypted-alert of type   bad_record_mac (that sounds right, since the MAC doesn't fit the re-ordered message from the server). 3. In case of miTLS server and NSS client (which is not emitting an alert), FFI_mitls_accept_connect is completed successfully, even though the client's Finished has not been sent.

oweisse-msft avatar Jul 19 '17 16:07 oweisse-msft

@oweisse-msft Does NSS close the connection instead of sending an alert or does it keep going ? 1 - Sending a 'RESERVED' value with TLS 1.3 doesn't seem good. 3 - Not good.

beurdouche avatar Jul 19 '17 17:07 beurdouche

Can you follow up on this bug? Please check if it is still and issue, and if it'll be caught/fixed as part of the verification push?

BarryBo avatar Jun 01 '18 16:06 BarryBo