]> Cypherpunks repositories - gostls13.git/commit
crypto/tls: match compression method alert across versions
authorDaniel McCarney <daniel@binaryparadox.net>
Fri, 16 May 2025 17:44:53 +0000 (13:44 -0400)
committerDaniel McCarney <daniel@binaryparadox.net>
Wed, 21 May 2025 19:58:42 +0000 (12:58 -0700)
commitdeb9a7e4ad8552a5f366877e626c223dea0e9d9b
tree6c83bb7cc415d7bc2ce776bd2f0da0e05c2d7a2d
parentcb7fe2a05c0a84e25c082b3741087cccb906b675
crypto/tls: match compression method alert across versions

When a pre-TLS 1.3 server processes a client hello message that
indicates compression methods that don't include the null compression
method, send an illegal parameter alert.

Previously we did this for TLS 1.3 server handshakes only, and the
legacy TLS versions used alertHandshakeFailure for this circumstance. By
switching this to alertIllegalParameter we use a consistent alert across
all TLS versions, and can also enable the NoNullCompression-TLS12 BoGo
test we were skipping.

Updates #72006

Change-Id: I27a2cd231e4b8762b0d9e2dbd3d8ddd5b87fd5ce
Reviewed-on: https://go-review.googlesource.com/c/go/+/673736
TryBot-Bypass: Daniel McCarney <daniel@binaryparadox.net>
Reviewed-by: Roland Shoemaker <roland@golang.org>
Reviewed-by: Filippo Valsorda <filippo@golang.org>
Reviewed-by: David Chase <drchase@google.com>
src/crypto/tls/bogo_config.json
src/crypto/tls/handshake_server.go