Hi,

After reading the documentation:
https://wiki.mozilla.org/Security:Renegotiation, I am curious and want to
confirm if I understood a couple of facts correctly.

1. At one point it is said in the document that:

Unfortunately, when a server is using the vulnerable SSL/TLS protocol
version, it is impossible for the browser to know whether a site is
protected or vulnerable (i.e whether session renegotiation is enabled or
disabled on the server).

So does this mean that when the server is using older SSL/TLS protocol
version, whether server has Renegotiation set to On or Off can not be
detected by browsers?

2. security.ssl.treat_unsafe_
negotiation_as_broken: This option is used to know whether RFC 5746 is
followed by current protocol. So if we see error
(<domain> : server does not support RFC 5746, see CVE-2009-3555)
in the error log then we are sure that server is using older SSL/TLS
protocol but we will not be sure if renegotiation is set to on or off. Is
this correct?

Though it is recommended to upgrade to latest SSL/TLS protocol, what impact
on user experience/security it makes if I set renegotiation set to Off on
server side and continue using old protocol?

Please let me know if I have misunderstood anything.
If already discussed somewhere can you please point me to thread?

Thanks in advance.

-Abhijeet
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to