[openssl-dev] [openssl.org #3463] [PATCH] Add support of no_application_protocol alert in ALPN protocol selection

Shigeki Ohtsu via RT rt at openssl.org
Mon Jun 15 04:50:02 UTC 2015


The Google's approach is keeping connection and expecting the client
continues to speak http/1.1 as a fail-back protocol.
This is one approach but I don't think it is all the cases.

For example when the server only provides a service that binds to the
specific protocol or tests some experimental protocols over TLS,
the server does not need to keep the connection and closes it because there
are no fail-back protocol.

It is natural for a server to send a no_application_protocol alert to
notify its error to the client before closing as well as it does in
handshake_failure.
According to RFC7301 it is defined SHALL so that the client which is
implemented with the spec properly can recognize the alert correctly.

I look back my patch now and it was really old and needs some changes. If
it would be accepted, I'd like to revise it.




2015-06-13 23:02 GMT+09:00 Rich Salz via RT <rt at openssl.org>:

> So, the google approach is that if no protocol match is found, the server
> replies WITHOUT the alpn header. They don't like no_app_protocol, to put it
> mildly :)
>
> thoughts?
>
>



More information about the openssl-dev mailing list