Skip to content
Merged
Show file tree
Hide file tree
Changes from 30 commits
Commits
Show all changes
32 commits
Select commit Hold shift + click to select a range
29581ce
Add TLS Hanshake defragmentation tests
waleed-elmelegy-arm Jan 24, 2025
e11d8c9
Improve TLS handshake defragmentation tests
waleed-elmelegy-arm Jan 28, 2025
8870b99
Fix typo in TLS Handshake defrafmentation tests
waleed-elmelegy-arm Jan 29, 2025
5b7c8bb
Remove unnecessary string check in handshake defragmentation tests
waleed-elmelegy-arm Jan 29, 2025
1b2590b
Require openssl to support TLS 1.3 in handshake defragmentation tests
waleed-elmelegy-arm Jan 29, 2025
e9b0884
Add client authentication to handshake defragmentation tests
waleed-elmelegy-arm Jan 29, 2025
826fc5c
Remove unneeded mtu option from handshake fragmentation tests
waleed-elmelegy-arm Jan 29, 2025
57f61f8
Enforce client authentication in handshake fragmentation tests
waleed-elmelegy-arm Jan 30, 2025
99f4691
Add a comment to elaborate using split_send_frag in handshake defragm…
waleed-elmelegy-arm Jan 30, 2025
be59ab5
Add guard to handshake defragmentation tests for client certificate
waleed-elmelegy-arm Jan 31, 2025
5fc8d3f
Test Handshake defragmentation only for TLS 1.3 only for small values
waleed-elmelegy-arm Jan 31, 2025
c5f1ba3
Add missing client certificate check in handshake defragmentation tests
waleed-elmelegy-arm Jan 31, 2025
afb428e
ssl-opt: Updated the keywords to look up during handshake fragmentati…
minosgalanakis Feb 5, 2025
9886fd1
ssl-opt: Added requires_openssl_3_x to defragmentation tests.
minosgalanakis Feb 7, 2025
502da02
ssl-opt: Adjusted the wording on handshake fragmentation tests.
minosgalanakis Feb 7, 2025
1d47ceb
ssl-opt: Dependency resolving set to use to requires_protocol_version…
minosgalanakis Feb 8, 2025
48aa2de
ssl-opt: Added tls 1.2 tests for HS defragmentation.
minosgalanakis Feb 9, 2025
871469a
ssl-opt: Added negative-assertion testing, (HS Fragmentation disabled)
minosgalanakis Feb 18, 2025
03ae352
ssl-opt: Added handshake fragmentation tests for 4 byte fragments.
minosgalanakis Feb 18, 2025
79693bf
ssl-opt: Added negative tests for handshake fragmentation.
minosgalanakis Feb 18, 2025
e6dbf49
ssl-opt: Updated documentation.
minosgalanakis Feb 18, 2025
2622aea
ChangeLog: Updated the entry for tls-hs-defragmentation
minosgalanakis Feb 19, 2025
ee8e7c3
ssl-opt: Added coverage for hs defragmentation TLS 1.2 tests.
minosgalanakis Feb 20, 2025
4335125
ssl-opt: Replaced max_send_frag with split_send_frag
minosgalanakis Feb 20, 2025
065b89c
ssl-opt.sh: Disabled HS Defrag Tests for TLS1.2 where len < 16
minosgalanakis Feb 24, 2025
bb1bd8b
ssl-opt: Removed redundant dependencies: requires_openssl_3_x
minosgalanakis Feb 24, 2025
618ad79
ssl-opt: Updated documentation of HS-Defrag tests.
minosgalanakis Feb 27, 2025
21e4f21
analyze_outcomes: Temporary disabled 3 HS Degragmentation tests.
minosgalanakis Feb 27, 2025
19d857d
ssl-opt: Minor typos and documentation fixes.
minosgalanakis Feb 27, 2025
4834826
ssl-opt: Adjusted reference hs defragmentation tests.
minosgalanakis Feb 27, 2025
97a24eb
ssl-opt: Removed dependencies for HS defrag negative tests.
minosgalanakis Feb 27, 2025
5764816
ssl-opt: Re-introduce certificate dependency for HS negative tests.
minosgalanakis Feb 27, 2025
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
7 changes: 7 additions & 0 deletions ChangeLog.d/tls-hs-defrag-in.txt
Original file line number Diff line number Diff line change
Expand Up @@ -3,3 +3,10 @@ Bugfix
by the spec. Lack of support was causing handshake failures with some
servers, especially with TLS 1.3 in practice (though both protocol
version could be affected in principle, and both are fixed now).
The initial fragment for each handshake message must be at least 4 bytes.

Server-side, defragmentation of the ClientHello message is only
supported if the server accepts TLS 1.3 (regardless of whether the
ClientHello is 1.3 or 1.2). That is, servers configured (either
at compile time or at runtime) to only accept TLS 1.2 will
still fail the handshake if the ClientHello message is fragmented.
5 changes: 5 additions & 0 deletions tests/scripts/analyze_outcomes.py
Original file line number Diff line number Diff line change
Expand Up @@ -53,6 +53,11 @@ def _has_word_re(words: typing.Iterable[str],
# https://github.com/Mbed-TLS/mbedtls/issues/9581
'Opaque key for server authentication: invalid key: decrypt with ECC key, no async',
'Opaque key for server authentication: invalid key: ecdh with RSA key, no async',
# Temporary disable Handshake defragmentation tests until mbedtls
# pr #10011 has been merged.
'Handshake defragmentation on client: len=4, TLS 1.2',
'Handshake defragmentation on client: len=5, TLS 1.2',
'Handshake defragmentation on client: len=13, TLS 1.2'
],
'test_suite_config.mbedtls_boolean': [
# We never test with CBC/PKCS5/PKCS12 enabled but
Expand Down
Loading