-
Notifications
You must be signed in to change notification settings - Fork 2.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
programs/ssl/ssl_server2 bug #8654
Comments
Form
From
In summary, the server side doesn't have version negotiation yet. This is a documented limitation of TLS 1.3 in the library, which is a feature still in development. |
Thanks for the report. I have checked and this is still relevant in 3.5 where we support version negotiation on server side. When a connection is closed, ssl_server2 uses |
Fixed released in Mbed TLS v3.6 by
|
Summary
programs/ssl/ssl_server2 refuses following tls1.3 connections from a peer if that peer used to establish tls1.2 connections with the server previously.
System information
Mbed TLS version (number or commit id): 3.4.0 f1c032a
Operating system and version: Ubuntu 22.04.2 LTS
Configuration (if not default, please attach
mbedtls_config.h
): #define MBEDTLS_SSL_PROTO_TLS1_3Compiler and options (if you used a pre-built binary, please indicate how you obtained it): default
Additional environment information: no
Expected behavior
programs/ssl/ssl_server2 allows following tls1.3 connections from a peer if that peer used to establish tls1.2 connections with the server previously.
Actual behavior
programs/ssl/ssl_server2 refuses following tls1.3 connections from a peer if that peer used to establish tls1.2 connections with the server previously.
Steps to reproduce
server:
./programs/ssl/ssl_server2
client:
./programs/ssl/ssl_client2 force_version=tls12
server shows
Successful connection
Then,
ctrl+c
to close client, keep server running, restart client with./programs/ssl/ssl_client2 force_version=tls13
server shows
Last error was: -0x7780 - SSL - A fatal alert message was received from our peer
Additional information
Did not see this behavior in other tls implementations.
The text was updated successfully, but these errors were encountered: