-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
cryptomb: ssl handleshake always failed in tlsv1.2 #21198
Comments
Thanks for the report! The PKCS1_5 support didn't work right previously, so I just removed the code. I do have a working PKCS1_5 implementation drafted -- it just needs a bunch of tests. /assign @ipuustin |
@ipuustin We have used this function in the production environment and need to fix its compatibility with versions below tls1.3 as soon as possible. Maybe you can make your draft public and let me help with the testing part. |
@Lynskylate I pushed the draft code here: https://github.com/ipuustin/envoy/tree/pkcs1_5 Regarding testing, the problem is that we don't really have end-to-end test code for cryptomb, so the testing code needs to be able to check that the padding is done correctly. |
cryptomb: ssl handleshake always failed in tlsv1.2
@ipuustin
Openssl client can't complete ssl handleshake in tlsv1.2 protocol , but can complete tls handshake when use tlsv1.3 protocol.if connect server with tlsv1.2 protocol, envoy will reset the connection.
The difference seems to be in the order of the signature algorithms
Although client hello message offer many signature algorithm, crymtomb always use first signature method.
In the pr, cryptomb remove PKCS1_5 padding support and rsa_pkcs1_sha512 is the first order signature in the client hello message.
In tls1.3 rsa_pss_rsae_sha512 is the first signature algorithm, cymtomb can complete the tls handshake.
The text was updated successfully, but these errors were encountered: