[openssl-users] Interoperating with a legacy client.

Tim Kirby tkirby at hotlink.com
Tue Feb 7 09:46:09 UTC 2017


On 2/6/2017 2:55 AM, Matt Caswell wrote:
> This does look like the client is misbehaving for some reason. It's not
> behaviour I can reproduce with a 1.0.1j version of s_client.
>
> The second ClientHello should have a TLS1.2 record version, not have the
> SCSV ciphersuite, but instead have a renegotiation_info extension.
>
> Is the second ClientHello encrypted or in plaintext? If it is a
> renegotiation then it would be encrypted. I am wondering whether for
> some reason the client has forgotten its original connection, and is
> attempting a second completely new TLS connection over the same
> underlying TCP connection.

Good question!

I checked my traces again, and the second ClientHello is plaintext.

Starting a new TLS connection over the same TCP connection as an

existing, functional, TLS connection seems like a weird thing for the

client to do, but that would explain a second ClientHello that looks like an

initial connection.


Assuming that's what's happening, is there a way I can detect it and start

a new connection instead?  Would it be safe to use a message callback to 
look

for a ClientHello, do an SSL_new() with the current context, and reuse 
the same BIOs?


Thanks.


--

Tim Kirby



More information about the openssl-users mailing list