-
Notifications
You must be signed in to change notification settings - Fork 92
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Handshake that only works when forcing TLS10 #134
Comments
a |
Thanks for your answer. :) Can you confirm that I'm reading the rfc correctly?
A server that receive a TLS12 hello but doesn't support it should response with a TLS10 hello, which this server clearly doesn't. If that automatic downgrade is in the rfc, I understand why one would want to do it manually for bad servers. However, I also understand not wanting to some shady retry logic for some crummy servers. Anyway, I've got my workaround (manually forcing TLS10), and you do have a point, so we can close this if you want. |
There's a bunch of unclear stuff from the RFC; namely there's 2 differents versions send by packet, one in the Record Layer, one in the Handshake layer. Typically openssl send the Record Layer to TLS10, but the Handshake to TLS12. |
FYI: TLS 1.3 uses the TLS 1.0 value in all record headers to cheat broken intermediate boxes. |
Hello
I've got some troubles connecting to a server (sadly, it's behind firewall). When trying to connect without specifying any TLS version, I get the following error:
However, if I force TLS 1.0, the handshake continues without troubles:
I found how to force the TLS version on my client (wreq), but since my knowledge of TLS is limited, I wonder: is this because of a buggy server? Since other implementations of tls seems to handle this (curl uses TLS 1.0 without forcing), should this be supported? If so, can I help?
Thanks a lot!
The text was updated successfully, but these errors were encountered: