Description of problem:
When server receives encrypted record that is longer than 2^14 but shorter than 2^14 + 2048 it is not rejected by the server as invalid
Version-Release number of selected component (if applicable):
Steps to Reproduce:
1. run tlsfuzzer test-chacha20.py 'too big plaintext' against NSS server
too big plaintext ...
Error encountered while processing node <tlsfuzzer.expect.ExpectAlert object at 0x1105dd0> (child: <tlsfuzzer.expect.ExpectClose object at 0x1105e10>) with last message being: <tlslite.messages.Message object at 0x129ca50>
Error while processing
Traceback (most recent call last):
File "tlsfuzzer/scripts/test-chacha20.py", line 348, in main
File "/tmp/tmp.V7WHFppAb2/tlsfuzzer/tlsfuzzer/runner.py", line 167, in run
AssertionError: Unexpected message from peer: ApplicationData(len=162)
(record rejected with alert decompression_failure or record_overflow depending on record size)
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.
For information on the advisory, and where to find the updated
files, follow the link below.
If the solution does not work for you, open a new bug report.