You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Jul 13, 2023. It is now read-only.
The client will soon reject any key content that includes padding.
The server will need to watch and strip it. We should also return a
warning message, however the likelihood of that warning being noticed
is minimal.
Closes#451
The client will soon reject any key content that includes padding.
The server will need to watch and strip it. We should also return a
warning message, however the likelihood of that warning being noticed
is minimal.
Closes#451
The client will soon reject any key content that includes padding.
The server will need to watch and strip it. We should also return a
warning message, however the likelihood of that warning being noticed
is minimal.
Closes#451
@martinthomson suggested rejecting padded params in https://bugzilla.mozilla.org/show_bug.cgi?id=1256488#c8, and draft-ietf-httpbis-encryption-encoding cites RFC 7515, too.
Unfortunately, the test page used the padded form for a while, and I suspect others might, too. These senders will break once bug 1256488 lands.
I think we should detect these on the server and return a more helpful error, instead of having the client fail decryption.
+@jrconlin
The text was updated successfully, but these errors were encountered: