diff options
author | René Korthaus <[email protected]> | 2017-10-20 17:09:44 +0200 |
---|---|---|
committer | René Korthaus <[email protected]> | 2017-10-20 17:09:44 +0200 |
commit | 85c97aa989e93861f1623ac05fc4f8c7610f976d (patch) | |
tree | df22f8e3054eda63a0589d50fa7e105e2996b984 /src/lib | |
parent | 54eea9aba98c90d34b55b46b08a72bb8b88342b6 (diff) |
Fall back to default group if client does not send any DH groups
Diffstat (limited to 'src/lib')
-rw-r--r-- | src/lib/tls/msg_server_kex.cpp | 20 | ||||
-rw-r--r-- | src/lib/tls/tls_server.cpp | 1 |
2 files changed, 19 insertions, 2 deletions
diff --git a/src/lib/tls/msg_server_kex.cpp b/src/lib/tls/msg_server_kex.cpp index 0765e1bdc..ab75d3a9b 100644 --- a/src/lib/tls/msg_server_kex.cpp +++ b/src/lib/tls/msg_server_kex.cpp @@ -59,7 +59,25 @@ Server_Key_Exchange::Server_Key_Exchange(Handshake_IO& io, const std::vector<std::string>& dh_groups = state.client_hello()->supported_dh_groups(); - std::unique_ptr<DH_PrivateKey> dh(new DH_PrivateKey(rng, DL_Group(policy.choose_dh_group(dh_groups)))); + std::string group_name; + + // if the client does not send any DH groups in + // the supported groups extension, but does offer DH ciphersuites, + // we select a group arbitrarily + if (dh_groups.empty()) + { + group_name = policy.dh_group(); + } + else + { + group_name = policy.choose_dh_group(dh_groups); + } + + if (group_name.empty()) + throw TLS_Exception(Alert::HANDSHAKE_FAILURE, + "Could not agree on a DH group with the client"); + + std::unique_ptr<DH_PrivateKey> dh(new DH_PrivateKey(rng, DL_Group(group_name))); append_tls_length_value(m_params, BigInt::encode(dh->get_domain().get_p()), 2); append_tls_length_value(m_params, BigInt::encode(dh->get_domain().get_g()), 2); diff --git a/src/lib/tls/tls_server.cpp b/src/lib/tls/tls_server.cpp index fb8317a1c..9f1dfe1d1 100644 --- a/src/lib/tls/tls_server.cpp +++ b/src/lib/tls/tls_server.cpp @@ -193,7 +193,6 @@ uint16_t choose_ciphersuite( if(suite.valid() == false) continue; - // TODO supported groups SHOULD have preference over ciphersuite list if(suite.ecc_ciphersuite() && have_shared_ecc_curve == false) continue; |