Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update dependency TLS-Attacker to v6.3.3 #159

Open
wants to merge 26 commits into
base: master
Choose a base branch
from

Conversation

c-southwest
Copy link
Contributor

Currently, server fuzzing implementations learning can produce result, but the result is not correct;
client fuzzing implemtations has runtime error and cannot complete handshake yet.

(Reference TLS-Attacker Commit 49af57bb871219fa2427dc33621e4e2cae42d10c)
(Reference TLS-Attacker Commit 6b0c072fdeec33b41d44031c19b21e6f4dd1db61)
(Reference TLS-Attacker Commit a4fab98ea9b5856d3fab218dc6d34bbc5cdb4560)
(Reference TLS-Attacker Commit 30260caf1fa15ce2ed061191dc8c6c1a0e321dac)
(Reference TLS-Attacker Commit 2adb191ffb001abe609228c71f77af5da1d3da5a)
(Reference TLS-Attacker Commit 8a75161ea63160b4a1dac620c9407715f80785ea)
…ateEntryList

(Reference TLS-Attacker Commit 8cbdfa82067eae9c9159c13fc42b278fc93fe55c, 1e40faa3f2cd411a8e5fc33bf89930a8f8c09227)
(Reference TLS-Attacker Commit 1e40faa3f2cd411a8e5fc33bf89930a8f8c09227)
(Reference TLS-Attacker Commit 8f3bba03adb36dd04f4dae8ed6a3e4b1749de22c, 8cbdfa82067eae9c9159c13fc42b278fc93fe55c)
fix maven dependency:analyze
And can fix runtime error "Exception in thread "main" java.lang.NoClassDefFoundError: org/xbill/DNS/TextParseException" without adding extra dependency
So when we test Client implementations, the socket client address and port will be set
(Reference TLS-Attacker Commit 6f663747dc4ad109e229020e1489e2ff66393319, since they removed similar logic inside ServerUdpTransportHandler.java)
…y generated.

And also stop the warning logs from protocol.preparator.CertificateMessagePreparator.
After this fix, we can learn output RSA_CERTIFICATE instead of RSA_PKCS1_CERTIFICATE
…ectly set, and prevent unexpected X509Context reset.
@c-southwest c-southwest force-pushed the update-tls-attacker-to-633 branch from 7b80d73 to dc95cca Compare February 8, 2025 23:39
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant