mirror of
https://github.com/openssl/openssl.git
synced 2025-02-23 14:42:15 +08:00
Add a note about aborts encountered while sending early_data
In some circumstances it is possible for a client to have a session reporting a max early data value that is greater than the server will support. In such cases the client could encounter an aborted connection. Fixes #6735 Reviewed-by: Kurt Roeckx <kurt@roeckx.be> (Merged from https://github.com/openssl/openssl/pull/6740)
This commit is contained in:
parent
8fc4aeb952
commit
b5cd751c69
@ -267,6 +267,19 @@ Nagle's algorithm. If an application opts to disable Nagle's algorithm
|
||||
consideration should be given to turning it back on again after the handshake is
|
||||
complete if appropriate.
|
||||
|
||||
In rare circumstances, it may be possible for a client to have a session that
|
||||
reports a max early data value greater than 0, but where the server does not
|
||||
support this. For example, this can occur if a server has had its configuration
|
||||
changed to accept a lower max early data value such as by calling
|
||||
SSL_CTX_set_recv_max_early_data(). Another example is if a server used to
|
||||
support TLSv1.3 but was later downgraded to TLSv1.2. Sending early data to such
|
||||
a server will cause the connection to abort. Clients that encounter an aborted
|
||||
connection while sending early data may want to retry the connection without
|
||||
sending early data as this does not happen automatically. A client will have to
|
||||
establish a new transport layer connection to the server and attempt the SSL/TLS
|
||||
connection again but without sending early data. Note that it is inadvisable to
|
||||
retry with a lower maximum protocol version.
|
||||
|
||||
=head1 REPLAY PROTECTION
|
||||
|
||||
When early data is in use the TLS protocol provides no security guarantees that
|
||||
|
Loading…
Reference in New Issue
Block a user