Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bug/tls frag incomplete/v51 #7794

Closed

Conversation

victorjulien and others added 30 commits August 30, 2022 12:16
The TLS record header is parsed in streaming mode still, but once the
record size is known we tell the app-layer API to give us the full
record.

Ticket: OISF#5481
TCP Buffering is now done in the app-layer using the incomplete API, on
the SSL/TLS record level. TLS level fragmentation will be implemented
separately.
Implement TLS record defrag for handshake messages.

Ticket: OISF#5183.
These tests are incompatible with the incomplete API usage and should
have been pcap based tests in the first place.
Resolves RustSec issues in time and chrono:
- https://rustsec.org/advisories/RUSTSEC-2020-0071
- https://rustsec.org/advisories/RUSTSEC-2020-0159

Ticket: OISF#5259.

Ammended by Victor Julien to bump to 0.14 instead of 0.13.
Don't set TLS_DECODER_EVENT_INVALID_HANDSHAKE_MESSAGE event on encrypted
handshake messages.
In preparation for client cert handling.
Code cleanups that work on per direction "connp" instead of hard coding
to the server side.
Parse client cerificates and store them in the state similar to how
this is done for server certificates.

Update "progress" handling to not consider the TLS handshake complete
if the server indicated a client cert was needed.
Enable client logging in extended mode.

Add "client", "client_certificate" and "client_chain", where the latter two
depend on "client".
Cert chain is a list of pointers into this buffer, so can't use a
stream slice approach.
@victorjulien
Copy link
Member Author

replaced by #7796

@victorjulien victorjulien deleted the bug/tls-frag-incomplete/v51 branch July 17, 2023 11:33
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
3 participants