Rietveld Code Review Tool
Help | Bug tracker | Discussion group | Source code | Sign in
(2455)

Issue 301660044: Bug 1286140: HelloRetryRequest

Can't Edit
Can't Publish+Mail
Start Review
Created:
7 years, 8 months ago by mt
Modified:
7 years, 7 months ago
Reviewers:
ekr-rietveld, ekr-rietveld
Visibility:
Public.

Description

Bug 1286140: HelloRetryRequest

Patch Set 1 #

Total comments: 55

Patch Set 2 : Fixed, mostly #

Total comments: 10

Patch Set 3 : Small tweaks #

Unified diffs Side-by-side diffs Delta from patch set Stats (+1088 lines, -429 lines) Patch
M cmd/lib/basicutil.c View 1 1 chunk +1 line, -6 lines 0 comments Download
M external_tests/ssl_gtest/manifest.mn View 1 chunk +1 line, -0 lines 0 comments Download
M external_tests/ssl_gtest/ssl_0rtt_unittest.cc View 1 5 chunks +47 lines, -51 lines 0 comments Download
M external_tests/ssl_gtest/ssl_auth_unittest.cc View 1 1 chunk +1 line, -1 line 0 comments Download
M external_tests/ssl_gtest/ssl_ciphersuite_unittest.cc View 1 1 chunk +1 line, -1 line 0 comments Download
M external_tests/ssl_gtest/ssl_damage_unittest.cc View 1 2 chunks +2 lines, -2 lines 0 comments Download
M external_tests/ssl_gtest/ssl_dhe_unittest.cc View 1 2 chunks +3 lines, -3 lines 0 comments Download
M external_tests/ssl_gtest/ssl_drop_unittest.cc View 1 1 chunk +1 line, -20 lines 0 comments Download
M external_tests/ssl_gtest/ssl_ecdh_unittest.cc View 1 2 chunks +16 lines, -4 lines 0 comments Download
M external_tests/ssl_gtest/ssl_ems_unittest.cc View 1 1 chunk +1 line, -1 line 0 comments Download
M external_tests/ssl_gtest/ssl_extension_unittest.cc View 1 chunk +2 lines, -2 lines 0 comments Download
M external_tests/ssl_gtest/ssl_gtest.cc View 1 1 chunk +1 line, -1 line 0 comments Download
A external_tests/ssl_gtest/ssl_hrr_unittest.cc View 1 1 chunk +193 lines, -0 lines 0 comments Download
M external_tests/ssl_gtest/ssl_loopback_unittest.cc View 1 1 chunk +1 line, -1 line 0 comments Download
M external_tests/ssl_gtest/ssl_record_unittest.cc View 1 1 chunk +1 line, -1 line 0 comments Download
M external_tests/ssl_gtest/ssl_resumption_unittest.cc View 1 5 chunks +8 lines, -6 lines 0 comments Download
M external_tests/ssl_gtest/ssl_staticrsa_unittest.cc View 1 1 chunk +1 line, -1 line 0 comments Download
M external_tests/ssl_gtest/ssl_v2_client_hello_unittest.cc View 1 1 chunk +1 line, -1 line 0 comments Download
M external_tests/ssl_gtest/ssl_version_unittest.cc View 1 1 chunk +1 line, -1 line 0 comments Download
M external_tests/ssl_gtest/tls_agent.h View 1 3 chunks +11 lines, -12 lines 0 comments Download
M external_tests/ssl_gtest/tls_agent.cc View 1 3 chunks +14 lines, -3 lines 0 comments Download
M external_tests/ssl_gtest/tls_connect.cc View 1 1 chunk +19 lines, -15 lines 0 comments Download
M external_tests/ssl_gtest/tls_filter.h View 1 2 chunks +18 lines, -1 line 0 comments Download
M external_tests/ssl_gtest/tls_filter.cc View 1 chunk +8 lines, -0 lines 0 comments Download
M external_tests/ssl_gtest/tls_parser.h View 2 chunks +1 line, -2 lines 0 comments Download
M lib/ssl/SSLerrs.h View 1 1 chunk +9 lines, -0 lines 0 comments Download
M lib/ssl/dtlscon.c View 1 4 chunks +18 lines, -6 lines 0 comments Download
M lib/ssl/ssl3con.c View 1 2 21 chunks +128 lines, -59 lines 0 comments Download
M lib/ssl/ssl3ext.c View 1 3 chunks +15 lines, -6 lines 0 comments Download
M lib/ssl/sslcon.c View 1 chunk +1 line, -1 line 0 comments Download
M lib/ssl/sslerr.h View 1 2 1 chunk +3 lines, -0 lines 0 comments Download
M lib/ssl/sslimpl.h View 1 5 chunks +36 lines, -13 lines 0 comments Download
M lib/ssl/sslinfo.c View 1 chunk +3 lines, -7 lines 0 comments Download
M lib/ssl/sslsecur.c View 2 chunks +9 lines, -3 lines 0 comments Download
M lib/ssl/sslsock.c View 2 chunks +4 lines, -8 lines 0 comments Download
M lib/ssl/tls13con.h View 1 chunk +1 line, -1 line 0 comments Download
M lib/ssl/tls13con.c View 1 23 chunks +507 lines, -189 lines 0 comments Download

Messages

Total messages: 7
ekr-rietveld
This is looking pretty good but I'm kind of sad about the null ciphersuite jiggery-pokery. ...
7 years, 8 months ago (2016-08-29 17:21:18 UTC) #1
mt
Fixed, mostly
7 years, 7 months ago (2016-09-01 12:51:30 UTC) #2
ekr-rietveld
I didn't see your comments on this bug, so I don't know what "Fixed, Mostly" ...
7 years, 7 months ago (2016-09-02 01:21:09 UTC) #3
mt
Damn I'm not liking rietveld very much right now. https://codereview.appspot.com/301660044/diff/1/external_tests/ssl_gtest/ssl_0rtt_unittest.cc File external_tests/ssl_gtest/ssl_0rtt_unittest.cc (right): https://codereview.appspot.com/301660044/diff/1/external_tests/ssl_gtest/ssl_0rtt_unittest.cc#newcode164 external_tests/ssl_gtest/ssl_0rtt_unittest.cc:164: ...
7 years, 7 months ago (2016-09-02 14:42:30 UTC) #4
mt
I have a couple of things that I'd like to get some feedback on before ...
7 years, 7 months ago (2016-09-09 01:28:46 UTC) #5
mt
Small tweaks
7 years, 7 months ago (2016-09-09 08:14:52 UTC) #6
ekr-rietveld
7 years, 7 months ago (2016-09-10 18:13:50 UTC) #7
https://codereview.appspot.com/301660044/diff/1/external_tests/ssl_gtest/ssl_...
File external_tests/ssl_gtest/ssl_damage_unittest.cc (right):

https://codereview.appspot.com/301660044/diff/1/external_tests/ssl_gtest/ssl_...
external_tests/ssl_gtest/ssl_damage_unittest.cc:58:
server_->CheckErrorCode(SSL_ERROR_BAD_MAC_READ);
On 2016/09/02 14:42:29, mt wrote:
> On 2016/08/29 17:21:19, ekr-rietveld wrote:
> > Why did this change?
> 
> In the old code, the server was able to read the alert that the client sent
> because it sent the alert with the handshake traffic keys and the server was
> expecting to see those keys.  Now that I pushed the cipher spec changes in the
> client back to where it sends its second round, all the alert sending (which
has
> to happen while in "read mode" rather than "write mode" due to the arrangement
> of locks), happens while the client is still writing cleartext. 
> 
> I could fix this, but it would mean having two different places where we set
the
> handshake cipher spec depending on whether we were doing 0-RTT or not.  That
> would mean for the client:
> 
>  - with 0-RTT, we would send alerts with the 0-RTT keys and defer switching
> cipher spec until we have read all the server's flight.
>  - without 0-RTT, we would set the handshake cipher spec after receiving the
> ServerHello.
> 
> (That this was a single tweak suggests that we don't have a lot of testing of
> failures on the client's second round.  Maybe we need to work more on that.)
> 
> I decided not to complicate things further by setting cipher specs in two
> places, but I'm less sure about it now, alerts are sort-of nice to be able to
> read... WDYT?

I think it's fine for now.
Sign in to reply to this message.

Powered by Google App Engine
RSS Feeds Recent Issues | This issue
This is Rietveld f62528b