trevp/tlslite

Extended Master Secret support

Closed this issue · 3 comments

Since tlslite supports session resumption and doesn't support ECDHE key exchange, it is vulnerable to the 3shake attack, as such, it should implement the draft-ietf-tls-session-hash-04.

Lack of implicit full certificate verification makes this attack especially easy to perform against tlslite.

Doesn't triple-handshake attack require renegotiation by the client? Which tlslite won't do?

the draft does mention that resumption will work for that too

I may be reading it wrong though...

I think resumption and renegotiation are both used?