Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SSL Labs test version intolerance does not always work #385

Open
ivanr opened this issue Aug 23, 2016 · 2 comments
Open

SSL Labs test version intolerance does not always work #385

ivanr opened this issue Aug 23, 2016 · 2 comments
Labels

Comments

@ivanr
Copy link
Contributor

ivanr commented Aug 23, 2016

[Submitted on behalf of @hannob]

As you may know I'm currently trying to tackle the issue of TLS version intolerance. While the SSL Labs test has a check for version intolerance it doesn't always work.
Pages where this happens are e.g.:

For all of them the test shows "Version Intolerance: No", yet one can't establish a successful connection with an 1.3 handshake. (Please note: sometimes the www and the non-www-version behave differently.)

It seems the handshake here fails later on, your test probably only checks for the first serverhello.

You can test this with chrome canary, which already has preliminary 1.3 support. Install a current version of canary, go to chrome://flags and set "Maximum TLS version enabled" to "TLS 1.3".

@ivanr ivanr added the bug label Aug 23, 2016
@bhushan5640
Copy link
Contributor

Handshake fails after client key exchange, change cipher spec stage. Should SSL Labs test for complete handshake? As we only check for the response serverhello - which seems appropriate in this case.

paypal it

@ivanr
Copy link
Contributor Author

ivanr commented Sep 1, 2016

Yes, I think so. It seems this is a different problem, perhaps not intolerance, but a bug somewhere in the TLS stack. Still, the result is the same.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

2 participants
pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy