Are there any flag that control client finished hash verification
Neil Proctor
np at acronisscs.com
Mon Jun 8 18:53:32 UTC 2020
Hello,
Specific to OpenSSL v1.0.2p and TLS1.2 are there any flags or options like, SSL_CERT_FLAG_TLS_STRICT, that set whether or not the client handshake finished hash is verified by the server? Or is this always performed regardless of configuration?
During some of our testing, it seems that even if the last byte of the client handshake finished hash gets modified, the server will still accept and complete the handshake and the TLS connection.
Thanks
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mta.openssl.org/pipermail/openssl-users/attachments/20200608/f531779e/attachment.html>
More information about the openssl-users
mailing list