Extended Master Secret support
Closed this issue · 3 comments
tomato42 commented
Since tlslite
supports session resumption and doesn't support ECDHE key exchange, it is vulnerable to the 3shake attack, as such, it should implement the draft-ietf-tls-session-hash-04.
Lack of implicit full certificate verification makes this attack especially easy to perform against tlslite
.
trevp commented
Doesn't triple-handshake attack require renegotiation by the client? Which tlslite won't do?
tomato42 commented
the draft does mention that resumption will work for that too
I may be reading it wrong though...
trevp commented
I think resumption and renegotiation are both used?