I had tried TLS Fuzzer, and it worked for me.
I just wished that OpenSSL can do the similar things.
Thanks!
On Tue, Feb 26, 2019 at 9:56 PM Hubert Kario <hkario@xxxxxxxxxx> wrote:
On Tuesday, 26 February 2019 07:22:52 CET John Jiang wrote:
> Is it possible to check if peer implements middlebox compatibility by
> s_server/s_client?
> It looks the test tools don't care this point.
> For example, if a server doesn't send change_cipher_spec after
> HelloRetryRequest, s_client still feels fine.That's not bad. But can I
> setup these tools to check middlebox compatibility?
As Matt said, there's no human-readable output that shows that.
tlsfuzzer does verify if the server sends ChangeCipherSpec and at what
point in the connection (all scripts expect it right after ServerHello or
right after HelloRetryRequest depending on connection).
You can use
https://github.com/tomato42/tlsfuzzer/blob/master/scripts/test-tls13-conversation.py
https://github.com/tomato42/tlsfuzzer/blob/master/scripts/test-tls13-hrr.py
and
https://github.com/tomato42/tlsfuzzer/blob/master/scripts/test-tls13-session-resumption.py
respectively to test regular handshake, one with HelloRetryRequest
and one that performs session resumption.
--
Regards,
Hubert Kario
Senior Quality Engineer, QE BaseOS Security team
Web: www.cz.redhat.com
Red Hat Czech s.r.o., Purkyňova 115, 612 00 Brno, Czech Republic