boringssl/ssl/test/runner
David Benjamin 6df6540766 Add a draft TLS 1.3 anti-downgrade signal.
TLS 1.3 includes a server-random-based anti-downgrade signal, as a
workaround for TLS 1.2's ServerKeyExchange signature failing to cover
the entire handshake. However, because TLS 1.3 draft versions are each
doomed to die, we cannot deploy it until the final RFC. (Suppose a
draft-TLS-1.3 client checked the signal and spoke to a final-TLS-1.3
server. The server would correctly negotiate TLS 1.2 and send the
signal. But the client would then break. An anologous situation exists
with reversed roles.)

However, it appears that Cisco devices have non-compliant TLS 1.2
implementations[1] and copy over another server's server-random when
acting as a TLS terminator (client and server back-to-back).

Hopefully they are the only ones doing this. Implement a
measurement-only version with a different value. This sentinel must not
be enforced, but it will tell us whether enforcing it will cause
problems.

[1] https://www.ietf.org/mail-archive/web/tls/current/msg25168.html

Bug: 226
Change-Id: I976880bdb2ef26f51592b2f6b3b97664342679c8
Reviewed-on: https://boringssl-review.googlesource.com/24284
Commit-Queue: David Benjamin <davidben@google.com>
CQ-Verified: CQ bot account: commit-bot@chromium.org <commit-bot@chromium.org>
Reviewed-by: Adam Langley <agl@google.com>
2017-12-21 01:50:33 +00:00
..
curve25519 Sync vendored copies of Go poly1305 and curve25519. 2017-03-30 20:04:23 +00:00
ed25519 Support Ed25519 keys in BoGo. 2017-04-05 23:21:30 +00:00
poly1305 Sync vendored copies of Go poly1305 and curve25519. 2017-03-30 20:04:23 +00:00
alert.go
cert.pem
chacha20_poly1305_test.go
chacha20_poly1305.go
channel_id_key.pem
cipher_suites.go Remove RC4 remnants in runner. 2017-11-01 16:45:36 +00:00
common.go Add a draft TLS 1.3 anti-downgrade signal. 2017-12-21 01:50:33 +00:00
conn.go Remove deprecated TLS 1.3 variants. 2017-12-18 21:20:32 +00:00
deterministic.go
dtls.go Test DTLS record/packet packing more aggressively. 2017-10-13 17:32:55 +00:00
ecdsa_p224_cert.pem Support P-224 certificates as a server. 2017-02-27 21:27:39 +00:00
ecdsa_p224_key.pem Support P-224 certificates as a server. 2017-02-27 21:27:39 +00:00
ecdsa_p256_cert.pem
ecdsa_p256_key.pem
ecdsa_p384_cert.pem
ecdsa_p384_key.pem
ecdsa_p521_cert.pem
ecdsa_p521_key.pem
ed25519_cert.pem Support Ed25519 in TLS. 2017-04-06 15:30:17 +00:00
ed25519_key.pem Support Ed25519 in TLS. 2017-04-06 15:30:17 +00:00
fuzzer_mode.json Fix fuzzer mode suppressions. 2017-12-11 20:12:11 +00:00
handshake_client.go Add a draft TLS 1.3 anti-downgrade signal. 2017-12-21 01:50:33 +00:00
handshake_messages.go Remove deprecated TLS 1.3 variants. 2017-12-18 21:20:32 +00:00
handshake_server.go Add a draft TLS 1.3 anti-downgrade signal. 2017-12-21 01:50:33 +00:00
hkdf_test.go
hkdf.go
key_agreement.go Test RSA premaster unpad better. 2017-10-13 18:22:58 +00:00
key.pem
packet_adapter.go
prf.go Remove deprecated TLS 1.3 variants. 2017-12-18 21:20:32 +00:00
recordingconn.go Add DTLS fuzzers. 2017-09-07 22:26:50 +00:00
rsa_1024_cert.pem
rsa_1024_key.pem
rsa_chain_cert.pem
rsa_chain_key.pem
runner_test.go
runner.go Add a draft TLS 1.3 anti-downgrade signal. 2017-12-21 01:50:33 +00:00
shim_ticket.go
sign.go Support Ed25519 in TLS. 2017-04-06 15:30:17 +00:00
test_output.go
ticket.go Add Data-less Zero-RTT support. 2017-03-25 21:00:18 +00:00
tls.go Support Ed25519 keys in BoGo. 2017-04-05 23:21:30 +00:00