[gnutls-devel] GnuTLS | server auth: disable TLS 1.3 if no signature algorithm is usable (!987)
Development of GNU's TLS library
gnutls-devel at lists.gnutls.org
Fri May 17 09:41:48 CEST 2019
Nikos Mavrogiannopoulos commented on a discussion on tests/tls-neg-ext4-key.c: https://gitlab.com/gnutls/gnutls/merge_requests/987#note_171314420
> .sig = GNUTLS_SIGN_RSA_PSS_SHA256,
> .exp_kx = GNUTLS_KX_ECDHE_RSA,
> },
> - {.name = "tls1.3 rsa-pss cert, rsa-sign key", /* we expect the server to refuse negotiating */
> + {.name = "tls1.3 rsa-pss cert, rsa-sign key", /* we expect the server to attempt to downgrade to TLS 1.2, but it is not possible because it is not enabled */
> .pk = GNUTLS_PK_RSA,
> .prio = "NORMAL:-VERS-ALL:+VERS-TLS1.3",
> .cert = &server_ca3_rsa_pss_cert,
> .key = &server_ca3_rsa_pss_key,
> + .sig = GNUTLS_SIGN_RSA_SHA256,
> + .exp_kx = GNUTLS_KX_ECDHE_RSA,
> + .exp_serv_err = GNUTLS_E_INSUFFICIENT_SECURITY
Hmm, but is that what is happening here? I am not sure what exactly this test entails but it should be failing due to no corresponding certificate found (which maps to `GNUTLS_E_NO_CIPHER_SUITES`) right? I do not see why it should reach the mismatch in FFDHE.
--
Reply to this email directly or view it on GitLab: https://gitlab.com/gnutls/gnutls/merge_requests/987#note_171314420
You're receiving this email because of your account on gitlab.com.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.gnupg.org/pipermail/gnutls-devel/attachments/20190517/7a40691f/attachment.html>
More information about the Gnutls-devel
mailing list