summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2021-09-24 Fix sbearssl send_environment protocolLaurent Bercot
Signed-off-by: Laurent Bercot <ska@appnovation.com>
2021-09-24 Log client decision on s6-ucspitls[cd] -v2Laurent Bercot
Signed-off-by: Laurent Bercot <ska@appnovation.com>
2021-08-10 Update dependencies2.5.0.0Laurent Bercot
Signed-off-by: Laurent Bercot <ska@appnovation.com>
2021-08-10 Adapt to skalibs-2.11.0.0Laurent Bercot
Signed-off-by: Laurent Bercot <ska@appnovation.com>
2021-07-23 Prepare for 2.5.0.0; remove minidentdLaurent Bercot
Signed-off-by: Laurent Bercot <ska@appnovation.com>
2021-06-03 CosmeticsLaurent Bercot
2021-06-03 Inline functionsLaurent Bercot
2021-06-03 Don't hardcode ecdsa signature implementation in sni_policyLaurent Bercot
2021-06-02 Work around incredible libtls stupidityLaurent Bercot
2021-06-02 Correctly clean up the environment for -zLaurent Bercot
2021-06-02 Debug session. Now works.Laurent Bercot
The environment given to the application still needs to be cleaned up of SNI variables.
2021-06-01Merge branch 'dev'Laurent Bercot
This add full client certificate support, as well as tentative SNI functionality
2021-06-01 Add servername to storagedevLaurent Bercot
2021-06-01 Make stuff buildLaurent Bercot
Still not working: we need to add servername to the storage
2021-06-01 Add all the missing pieces for sni_policyLaurent Bercot
sbearssl_server_init_and_run is yet unchanged, the next step is to rewrite it using the new primitives.
2021-05-30 bugfix: -l option in s6-tlsserver takes an argLaurent Bercot
2021-05-30 Start work on bearssl server-side sniLaurent Bercot
2021-05-28 Server-side SNI, libtls versionLaurent Bercot
Implementation for bearssl coming soon.
2021-05-27 All good, remove debug instructionsLaurent Bercot
2021-05-27 Remove backtraces; add verification impls to server enginesLaurent Bercot
2021-05-27 Add backtrace invocation to debug spurious get_pkey callLaurent Bercot
2021-05-25 More debug commandsLaurent Bercot
2021-05-22 bugfix: tcpserver should unignore SIGPIPELaurent Bercot
2021-05-21 Trivial syscall number optimizationLaurent Bercot
2021-05-20 Debugging iterationLaurent Bercot
2021-05-20 Add an x509 engine wrapping minimal. NOT FUNCTIONAL, FOR TESTING.Laurent Bercot
2021-05-18 Prepare for 2.4.2.0; implement client certificates with bearsslLaurent Bercot
Also send a bit more environment with libtls
2021-05-08 sbearssl cosmetic fixesLaurent Bercot
2021-04-15 version: 2.4.1.1v2.4.1.1Laurent Bercot
2021-04-13 Prepare for 2.4.1.1Laurent Bercot
2021-04-11 Do not compile or link into /dev/nullLaurent Bercot
2021-04-09 Real noexecstack fix: make strip less greedyLaurent Bercot
2021-04-08 noexecstack only works in LDFLAGSLaurent Bercot
2021-02-16 More doc fixesLaurent Bercot
2021-02-15 version: 2.4.1.0v2.4.1.0Laurent Bercot
2021-02-07 Add link to s6-networking man pagesLaurent Bercot
2021-02-04 More doc fixesLaurent Bercot
2021-02-04 Doc fixes, thanks flexibeastLaurent Bercot
2021-01-28 Remove SSL_TLS_SNI_SERVERNAME (instead of defined but empty) if no SNILaurent Bercot
2021-01-28 Prepare for 2.4.1.0; add SSL_TLS_SNI_SERVERNAMELaurent Bercot
2021-01-18 Tiny code and doc fixesLaurent Bercot
2021-01-13 Implement handshake timeout for libtls backendLaurent Bercot
2021-01-13 Accept --enable-ssl=libtls -_-Laurent Bercot
2021-01-10 version: 2.4.0.0v2.4.0.0Laurent Bercot
2021-01-03 Document optional execlineLaurent Bercot
2020-12-29 configure should be executable >.>Laurent Bercot
2020-12-28Don't put -fno-stack-protector in default CFLAGSLaurent Bercot
2020-12-18 configure fixLaurent Bercot
2020-12-09 Get rid of webipc.hLaurent Bercot
2020-12-07 Change -K semantics: timeout *during handshake*, not afterwardsLaurent Bercot
- the TLS tunnel itself should be transparent so it has no business shutting down the connection no matter how long the app takes - there's still an undetectable situation on some kernels where EOF doesn't get transmitted from the network, and the engine is in the handshake, and it can't do anything but wait forever. A timeout is useful here: dawg, your peer is never going to send any more data, you should just give up. - if the situation happens after the handshake, the *app* should have a timeout and die. The tunnel will follow suit. - libtls has a blocking tls_handshake() blackbox, we cannot give it a timeout. Too bad, use bearssl.