[erlang-bugs] Incomplete Elliptic Curve Cipher Suites in R16B01 and R16B02

Ingela Anderton Andin Ingela.Anderton.Andin@REDACTED
Mon Oct 7 15:27:35 CEST 2013


Hi!

I have not had time to make any gnutls test yet. But you could try out 
the following (still works with Openssl) and I think should be the 
correct solution to the problem.

I think the problem had three
parts,

* An explicit client ECC-curves option was not honored by Erlang server

* gnutls does not seem to ignore unknown server hello extensions

* Erlang server sent an option too much in its ECC-extensions.

https://github.com/IngelaAndin/otp/tree/ia/ssl/ecc-gnutls


Regards Ingela Erlang/OTP team - Ericsson AB


On 10/05/2013 06:36 AM, Andrew Thompson wrote:
> So, for the 23 ciphers that fail, all but one of them also fail under
> openssl. The one that doesn't fail under OpenSSL is the IDEA-CBC-SHA,
> which erlang doesn't seem to support.
>
> The ECDSA ciphers fail because we're not using ECC keys. I'm not sure
> why the others fail, but at least it is consistent.
>
> The bugs I found earlier only seems to manifest when using a non-openssl
> client, but that might well explain the issues with chrome because
> chrome links against gnutls.
>
> However, I am now able to connect over HTTPS from both chrome and
> firefox to the erlang http server that before would not connect.
>
> Here's a diff to patch the file:
>
> https://gist.github.com/Vagabond/6836706
>
> Note that this probably isn't the 'right' thing to do, for example
> select_curve/1 should probably filter the client provided list  based on
> what the server supports, and I'm not sure if EcPointFormats needs to be
> negotiated.
>
> However, the patch does seem to fix the immediate problem.
>
> Andrew
> _______________________________________________
> erlang-bugs mailing list
> erlang-bugs@REDACTED
> http://erlang.org/mailman/listinfo/erlang-bugs
>




More information about the erlang-bugs mailing list