[gnutls-devel] GnuTLS | GnuTLS sends record_overflow when client message is within the length limit (#1224)

Read-only notification of GnuTLS library development activities gnutls-devel at lists.gnutls.org
Wed May 5 11:30:30 CEST 2021




Daiki Ueno commented:


Because the `type` field is invalid, GnuTLS treats it as an SSLv2 Client Hello as described in:
https://tools.ietf.org/html/rfc5246#appendix-E.2

In that format, length is calculated as `((0xe8 & 0x7f) << 8) | 0x03`, which exceeds the record size limit.

-- 
Reply to this email directly or view it on GitLab: https://gitlab.com/gnutls/gnutls/-/issues/1224#note_567701623
You're receiving this email because of your account on gitlab.com.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.gnupg.org/pipermail/gnutls-devel/attachments/20210505/266e96fa/attachment.html>


More information about the Gnutls-devel mailing list