-
Notifications
You must be signed in to change notification settings - Fork 833
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Compatibility issues with other TLS libraries #6408
Comments
@julek-wolfssl can you look into this report? |
Hi @SmallTown123, thank you for your report.
Sincerely |
Ok, I understand. Thank you for your reply! @julek-wolfssl |
@SmallTown123 I have opened #6415 which fixes the session ID incompatibility. |
Hi @SmallTown123 , Have you had a chance to try the fixes in PR #6415 to resolve the shorter session ID issue? You feedback would be appreciated. Thanks, |
Hi @SmallTown123, the PR fixing this has been merged. Juliusz |
Version
5.5.1 and below
Description
I think there are two compatibility issues in the TLS 1.2 implementation:
(1) When processing the SessionID field in the ClientHello message, the wolfssl server side seems to respond normally only to SessionID of length 32 at present.
However, RFC5246 specifies the SessionID length as
opaque SessionID<0..32>
.There may be compatibility issues with other TLS library clients.
(2) It seems that wolfssl server has support upper limit 150 for Cipher Suites in ClientHello.
In general, this upper number is sufficient, but is there a potential compatibility issue with this implementation?
For example, a client with an individual TLS implementation library will send all the cipher suites it supports, and the number happens to be greater than 150.
The text was updated successfully, but these errors were encountered: