summaryrefslogtreecommitdiff
path: root/src
diff options
context:
space:
mode:
authortb <>2021-03-20 08:12:53 +0000
committertb <>2021-03-20 08:12:53 +0000
commita79c4fc17f39242945d156bd886ed7e9c406b8ad (patch)
treedffd18d5898d3aa2a961d751d7ca8e0932d98dd7 /src
parentd0d6b7864dc01a292f38d632aa3e5a1272252ef7 (diff)
downloadopenbsd-a79c4fc17f39242945d156bd886ed7e9c406b8ad.tar.gz
openbsd-a79c4fc17f39242945d156bd886ed7e9c406b8ad.tar.bz2
openbsd-a79c4fc17f39242945d156bd886ed7e9c406b8ad.zip
Add new test-tls13-multiple-ccs-messages.py
This is a test that checks for NSS's CCS flood DoS CVE-2020-25648. The test script currently fails on LibreSSL and OpenSSL 1.1.1j because it sends invalid records with version 0x0300 instead of 0x0303. We have the ccs_seen logic corresponding to NSS's fix: https://hg.mozilla.org/projects/nss/rev/57bbefa793232586d27cee83e74411171e128361 but we do allow up to two CCS due to an interop issue with Fizz, so at least one of the tests will likey be broken once the record version is fixed.
Diffstat (limited to 'src')
-rw-r--r--src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py9
1 files changed, 8 insertions, 1 deletions
diff --git a/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py b/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py
index 9053ec71ef..0a5bc0a870 100644
--- a/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py
+++ b/src/regress/lib/libssl/tlsfuzzer/tlsfuzzer.py
@@ -1,4 +1,4 @@
1# $OpenBSD: tlsfuzzer.py,v 1.22 2021/01/27 20:16:58 tb Exp $ 1# $OpenBSD: tlsfuzzer.py,v 1.23 2021/03/20 08:12:53 tb Exp $
2# 2#
3# Copyright (c) 2020 Theo Buehler <tb@openbsd.org> 3# Copyright (c) 2020 Theo Buehler <tb@openbsd.org>
4# 4#
@@ -243,6 +243,13 @@ tls13_failing_tests = TestGroup("failing TLSv1.3 tests", [
243 '-e', 'x448 - right-truncated key_share', 243 '-e', 'x448 - right-truncated key_share',
244 ]), 244 ]),
245 245
246 # The test sends records with protocol version 0x0300 instead of 0x0303
247 # and currently fails with OpenSSL and LibreSSL for theis reason.
248 # We have the logic corresponding to NSS's fix for CVE-2020-25648
249 # https://hg.mozilla.org/projects/nss/rev/57bbefa793232586d27cee83e74411171e128361
250 # so should not be affected by this issue.
251 Test("test-tls13-multiple-ccs-messages.py"),
252
246 # https://github.com/openssl/openssl/issues/8369 253 # https://github.com/openssl/openssl/issues/8369
247 Test("test-tls13-obsolete-curves.py"), 254 Test("test-tls13-obsolete-curves.py"),
248 255