Re: s_server/s_client on checking middlebox compatibility

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tuesday, 26 February 2019 07:22:52 CET John Jiang wrote:
> Is it possible to check if peer implements middlebox compatibility by
> s_server/s_client?
> It looks the test tools don't care this point.
> For example, if a server doesn't send change_cipher_spec after
> HelloRetryRequest, s_client still feels fine.That's not bad. But can I
> setup these tools to check middlebox compatibility?

As Matt said, there's no human-readable output that shows that.

tlsfuzzer does verify if the server sends ChangeCipherSpec and at what
point in the connection (all scripts expect it right after ServerHello or
right after HelloRetryRequest depending on connection).

You can use
https://github.com/tomato42/tlsfuzzer/blob/master/scripts/test-tls13-conversation.py
https://github.com/tomato42/tlsfuzzer/blob/master/scripts/test-tls13-hrr.py
and
https://github.com/tomato42/tlsfuzzer/blob/master/scripts/test-tls13-session-resumption.py
respectively to test regular handshake, one with HelloRetryRequest
and one that performs session resumption.

-- 
Regards,
Hubert Kario
Senior Quality Engineer, QE BaseOS Security team
Web: www.cz.redhat.com
Red Hat Czech s.r.o., Purkyňova 115, 612 00  Brno, Czech Republic

Attachment: signature.asc
Description: This is a digitally signed message part.


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux