Open nmav opened 4 years ago
yes, in "check sigalgs in cert request" we are specifying signature algorithms, which effectively sets expected set of extensions, changing the CertificateRequest parser into strict mode
we'll need to add support for -E
option, similar to test-tls13-certificate-request.py
script
From the error message, I think it tries to parser the status_request
extension as a client_hello
status request which has different form despite the same code point.
That also makes me wonder whether there are other client implementations doing the same.
From the error message, I think it tries to parser the
status_request
extension as aclient_hello
status request which has different form despite the same code point.
yes, RFC 8446, section 4.4.2.1
A server MAY request that a client present an OCSP response with its
certificate by sending an empty "status_request" extension in its
CertificateRequest message. If the client opts to send an OCSP
response, the body of its "status_request" extension MUST be a
CertificateStatus structure as defined in [RFC6066].
while the code is expecting the payload to be the same as the one expected in ClientHello message, it should instead verify that the extension does not have a payload
That also makes me wonder whether there are other client implementations doing the same.
I'm not aware of any implementation that supports status_request
extension in client's Certificate: I'm sure OpenSSL doesn't support it, I almost sure that NSS doesn't
Bug Report
According to TLS1.3:
However when the server sends this extension to tlsfuzzer it errors with: