[erlang-bugs] Incomplete Elliptic Curve Cipher Suites in R16B01 and R16B02

Ingela Anderton Andin ingela.anderton.andin@REDACTED
Mon Oct 7 10:19:57 CEST 2013


Hi again!

On 10/05/2013 06:36 AM, Andrew Thompson wrote:
> So, for the 23 ciphers that fail, all but one of them also fail under
> openssl. The one that doesn't fail under OpenSSL is the IDEA-CBC-SHA,
> which erlang doesn't seem to support.

It is correct that Erlang does not support IDEA-ciphers.  We could
easily include support for them but as they have been deprecated by
the latest TLS spec we see no real need to implement them.

> The ECDSA ciphers fail because we're not using ECC keys. I'm not sure
> why the others fail, but at least it is consistent.
>
> The bugs I found earlier only seems to manifest when using a non-openssl
> client, but that might well explain the issues with chrome because
> chrome links against gnutls.
>

Well that would make sense as OpenSSL is the client and serve we use in our
interoperability test  and we have quite a few of those.  Perhaps we 
ought to
create a gnutls test suite as well!

> However, I am now able to connect over HTTPS from both chrome and
> firefox to the erlang http server that before would not connect.
>
> Here's a diff to patch the file:
>
> https://gist.github.com/Vagabond/6836706
>
> Note that this probably isn't the 'right' thing to do, for example
> select_curve/1 should probably filter the client provided list  based on
> what the server supports, and I'm not sure if EcPointFormats needs to be
> negotiated.
>
> However, the patch does seem to fix the immediate problem.
>
Thanks again for all your input!  I Will make sure the problem is fixed. 
TLS is very
flexible which makes it hard to be certain you covered all possible 
combinations of input.

Regards Ingela Erlang OTP team - Ericsson AB




More information about the erlang-bugs mailing list