Skip to content

Unit Tests for "dummy" EncryptedClientHello #5697

@alexw91

Description

@alexw91

Problem:

Some TLS Clients (Browsers) are sending dummy EncryptedClientHello values (filled with a stream of 0xFF bytes) to all TLS server endpoints they connect to so that ISP's and middleboxes can't just block all TLS ClientHellos that send an EncryptedClientHello extension.

Need By Date:

None

Solution:

s2n-tls server already correctly handles this case by ignoring unknown TLS extensions, but we should add an explicit unit test that ensures we don't regress on this behavior, and verifies that s2n-tls ignores invalid ECH extensions.

Requirements / Acceptance Criteria:

What must a solution address in order to solve the problem? How do we know the solution is complete?

Out of scope:

Supporting EncryptedClientHello extension

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions