[gnutls-help] 0-length handshake fragments with DTLS
Manuel Pégourié-Gonnard
mpg at polarssl.org
Tue Sep 2 18:18:20 CEST 2014
On 02/09/2014 17:34, Nikos Mavrogiannopoulos wrote:
> It doesn't look like a feature either. Is there some way to easily
> reproduce that?
>
Using the certificate and key below, with gnutls 3.3.7, run:
gnutls-serv --x509certfile below.crt --x509keyfile below.key -u --mtu 104
and connect with gnutls-cli -u --insecure localhost
If everything goes as expected, the server's Certificate message will be 553
bytes long and split in 7 fragments of length 79, plus one fragment with offset
553 and length 0. This can be observed using wireshark for example. (Wireshark
flags this as an error "new fragment overlaps old data", which should rather be
a warning IMO.)
By the way, with the above test gnutls-cli says
|<1>| Invalid handshake packet headers. Discarding.
which might or might not be related.
hth,
Manuel.
-----BEGIN EC PRIVATE KEY-----
MHcCAQEEIPEqEyB2AnCoPL/9U/YDHvdqXYbIogTywwyp6/UfDw6noAoGCCqGSM49
AwEHoUQDQgAEN8xW2XYJHlpyPsdZLf8gbu58+QaRdNCtFLX3aCJZYpJO5QDYIxH/
6i/SNF1dFr2KiMJrdw1VzYoqDvoByLTt/w==
-----END EC PRIVATE KEY-----
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
More information about the Gnutls-help
mailing list