We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 35a187b commit 3d7adaeCopy full SHA for 3d7adae
ChangeLog.d/tls-hs-defrag-in.txt
@@ -3,3 +3,10 @@ Bugfix
3
by the spec. Lack of support was causing handshake failures with some
4
servers, especially with TLS 1.3 in practice (though both protocol
5
version could be affected in principle, and both are fixed now).
6
+ The initial fragment for each handshake message must be at least 4 bytes.
7
+
8
+ Server-side, defragmentation of the ClientHello message is only
9
+ supported if the server accepts TLS 1.3 (regardless of whether the
10
+ ClientHello is 1.3 or 1.2). That is, servers configured (either
11
+ at compile time or at runtime) to only accept TLS 1.2 will
12
+ still fail the handshake if the ClientHello message is fragmented.
0 commit comments