You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I ran something like s2nc -c default_tls13 -i www.amazon.com 443 and generated a packet capture. Here is the signature_algorithm extension
Solution:
Avoid writing duplicated values to the signature_algorithm{_cert} extensions.
Does this change what S2N sends over the wire? : Yes, this proposal will change s2n client from sending duplicate signature scheme values to a single value.
Problem:
When using s2n with modern security policies, s2n client will send duplicate signature_algorithm extension values. This appears related to how s2n writes entries from it's signature scheme preference list: https://github.com/aws/s2n-tls/blob/main/tls/s2n_signature_scheme.c#L321
I ran something like
s2nc -c default_tls13 -i www.amazon.com 443
and generated a packet capture. Here is the signature_algorithm extensionSolution:
Avoid writing duplicated values to the signature_algorithm{_cert} extensions.
Requirements / Acceptance Criteria:
Out of scope:
N/A
The text was updated successfully, but these errors were encountered: