Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

GnuTLS/OpenSSL - signature_algorithms #15

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

mrc0mmand
Copy link
Member

@mrc0mmand mrc0mmand commented Mar 27, 2017

This PR adds a new test, which tests signature_algorithms extension between GnuTLS and OpenSSL libraries. When client certificates are used, signature algorithms used for the client authentication are verified as well, even though they are not part of the signature_algorithms extension.

As this test requires TLSv1.2, whose implementation is not good enough in GnuTLS on RHEL 6, it's disabled by default on this OS version.

Unfortunately, it requires features from RHEL/CentOS 7.4, so it's going to fail until this version is released.

@mrc0mmand mrc0mmand requested a review from tomato42 March 27, 2017 17:59
@mrc0mmand mrc0mmand force-pushed the gnutls-openssl-signature_algorithms branch from 593e31e to e4d9ec1 Compare March 27, 2017 18:38
rlAssertGrep "Server Signature: ${S_NAME[$idx]}" "$rlRun_LOG"
rlAssertGrep "Client Signature: ${S_NAME[$idx]}" "$rlRun_LOG"

rlRun "kill $openssl_pid" 0,1
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

what purpose has -verify_return_error if we then ignore server crashing/exiting because of errors?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

-verify_return_error won't close/crash the server if the client certificate is invalid, but yes, it would be wise to check for potential segfault after a successful handshake

options+=(--x509certfile ${S_CLNT_CERT[$idx]})
options+=(--x509keyfile ${S_CLNT_KEY[$idx]})

rlRun -s "${options[*]} localhost < /dev/null"
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

why not a proper HTTP/1.1 request?

@mrc0mmand mrc0mmand force-pushed the gnutls-openssl-signature_algorithms branch from e4d9ec1 to 87e9960 Compare May 2, 2017 20:19
@mrc0mmand
Copy link
Member Author

Changes:

  • proper HTTP 1.1 requests
  • catch potential segfault after a successful connection


rlJournalStart
rlPhaseStartSetup
rlAssertRpm $PACKAGE
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

When there's rlAssertRpm --all (below) there's no need for rlAssertRpm $PACKAGE

@tomato42
Copy link
Member

tomato42 commented May 5, 2017

We need to wait for 7.4 release

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants