> From: openssl-users [mailto:openssl-users-boun...@openssl.org] On Behalf Of 
> Sai Teja Chowdary
> Sent: Friday, December 29, 2017 21:44

> I am using OpenSSL client to create a custom TLS client which can send or 
> manipulate the default TLS handshake
> messages so that i can test for any bugs in our TLS server implementation. I 
> spent about 4 months in reading OpenSSL
> code and making changes and adding new arguments to modify the default 
> client. So in that process i came across the
> WPACKET API. For framing SSL records I had to use it. 

I can't help with your specific issue. I don't know the 1.1.x codebase (my 
teams are still using 1.0.2). But I'd suggest that perhaps OpenSSL is not the 
ideal starting point for this.

When security researchers do this sort of thing - generate specific TLS 
messages to test a peer implementation - they often use a scripting language 
with suitable add-on modules, such as Python with the ssl, cryptography, and 
gmpy2 modules. While these scripts are often quick-and-dirty, they're probably 
easier to modify. So you might look at various open-source TLS test scripts, 
such as the one Hanno Böck wrote for ROBOT (see robotattack.org).

There are also various open-source test frameworks for TLS, such as 
TLSPretense. I don't have any experience with them myself, but it's worth 
taking a look.

-- 
Michael Wojcik 
Distinguished Engineer, Micro Focus 



-- 
openssl-users mailing list
To unsubscribe: https://mta.openssl.org/mailman/listinfo/openssl-users

Reply via email to