[gnutls-devel] GnuTLS | GnuTLS sends record_overflow when client message is within the length limit (#1224)
Read-only notification of GnuTLS library development activities
gnutls-devel at lists.gnutls.org
Wed May 5 11:30:30 CEST 2021
Daiki Ueno commented:
Because the `type` field is invalid, GnuTLS treats it as an SSLv2 Client Hello as described in:
https://tools.ietf.org/html/rfc5246#appendix-E.2
In that format, length is calculated as `((0xe8 & 0x7f) << 8) | 0x03`, which exceeds the record size limit.
--
Reply to this email directly or view it on GitLab: https://gitlab.com/gnutls/gnutls/-/issues/1224#note_567701623
You're receiving this email because of your account on gitlab.com.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.gnupg.org/pipermail/gnutls-devel/attachments/20210505/266e96fa/attachment.html>
More information about the Gnutls-devel
mailing list