Re: Call for testing TLS 1.3

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




On 23/05/18 12:39, John Jiang wrote:
> Hi,
> If just using s_server and s_client, can I test the TLS 1.3 features,
> likes HelloRetryRequest and resumption?

Yes.

To create a normal (full handshake) TLSv1.3 connection just use
s_server/s_client in the normal way, e.g.

$ openssl s_server -cert cert.pem -key key.pem
$ openssl s_client

To test resumption first create a full handshake TLSv1.3 connection and
save the session:

$ openssl s_server -cert cert.pem -key key.pem
$ openssl s_client -sess_out session.pem

Close the s_client instance by entering "Q" followed by enter. Then
(without closing the s_server instance) resume the session:

$ openssl s_client -sess_in session.pem


A HelloRetryRequest will occur if the key share provided by the client
is not acceptable to the server. By default the client will send an
X25519 key share, so if the server does not accept that group then an
HRR will result, e.g.

$ openssl s_server -cert cert.pem -key key.pem -groups P-256
$ openssl s_client


Of course a HelloRetryRequest all happens at the protocol layer and is
invisible as far as a user of the command line apps is concerned. You
will have to look at what happens "on the wire" to actually see it in
action - for example by using wireshark. Alternatively you can compile
OpenSSL with the "enable-ssl-trace" option, and pass the "-trace" flag
to s_server or s_client to see what protocol messages are being exchanged.

Matt



> 
> 2018-04-29 18:43 GMT+08:00 Kurt Roeckx <kurt@xxxxxxxxx
> <mailto:kurt@xxxxxxxxx>>:
> 
>     The upcomming OpenSSL 1.1.1 release will have TLS 1.3 support. TLS
>     1.3 brings a lot of changes that might cause incompatibility. For
>     an overview see https://wiki.openssl.org/index.php/TLS1.3
>     <https://wiki.openssl.org/index.php/TLS1.3>
> 
>     We are considering if we should enable TLS 1.3 by default or not,
>     or when it should be enabled. For that, we would like to know how
>     applications behave with the latest beta release.
> 
>     When testing this, it's important that both sides of the
>     connection support the same TLS 1.3 draft version. OpenSSL
>     currently implements draft 26. We would like to see tests
>     for OpenSSL acting as client and server.
> 
>     https://github.com/tlswg/tls13-spec/wiki/Implementations
>     <https://github.com/tlswg/tls13-spec/wiki/Implementations> lists
>     other TLS 1.3 implementations and the draft they currently
>     support. Note that the versions listed there might not be for the
>     latest release. It also lists some https test servers.
> 
>     We would really like to see a diverse set of applictions being
>     tested. Please report any results you have to us.
> 
> 
>     Kurt
> 
>     -- 
>     openssl-users mailing list
>     To unsubscribe:
>     https://mta.openssl.org/mailman/listinfo/openssl-users
>     <https://mta.openssl.org/mailman/listinfo/openssl-users>
> 
> 
> 
> 
-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users



[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux