Age | Commit message (Collapse) | Author | |
---|---|---|---|
2021-10-18 | Fix error case in readbigpem | Laurent Bercot | |
Signed-off-by: Laurent Bercot <ska@appnovation.com> | |||
2021-09-24 | Fix sbearssl send_environment protocol | Laurent Bercot | |
Signed-off-by: Laurent Bercot <ska@appnovation.com> | |||
2021-09-24 | Log client decision on s6-ucspitls[cd] -v2 | Laurent Bercot | |
Signed-off-by: Laurent Bercot <ska@appnovation.com> | |||
2021-08-10 | Adapt to skalibs-2.11.0.0 | Laurent Bercot | |
Signed-off-by: Laurent Bercot <ska@appnovation.com> | |||
2021-07-23 | Prepare for 2.5.0.0; remove minidentd | Laurent Bercot | |
Signed-off-by: Laurent Bercot <ska@appnovation.com> | |||
2021-06-03 | Cosmetics | Laurent Bercot | |
2021-06-03 | Inline functions | Laurent Bercot | |
2021-06-03 | Don't hardcode ecdsa signature implementation in sni_policy | Laurent Bercot | |
2021-06-02 | Work around incredible libtls stupidity | Laurent Bercot | |
2021-06-02 | Correctly clean up the environment for -z | Laurent Bercot | |
2021-06-02 | Debug session. Now works. | Laurent Bercot | |
The environment given to the application still needs to be cleaned up of SNI variables. | |||
2021-06-01 | Merge branch 'dev' | Laurent Bercot | |
This add full client certificate support, as well as tentative SNI functionality | |||
2021-06-01 | Add servername to storagedev | Laurent Bercot | |
2021-06-01 | Make stuff build | Laurent Bercot | |
Still not working: we need to add servername to the storage | |||
2021-06-01 | Add all the missing pieces for sni_policy | Laurent Bercot | |
sbearssl_server_init_and_run is yet unchanged, the next step is to rewrite it using the new primitives. | |||
2021-05-30 | bugfix: -l option in s6-tlsserver takes an arg | Laurent Bercot | |
2021-05-30 | Start work on bearssl server-side sni | Laurent Bercot | |
2021-05-28 | Server-side SNI, libtls version | Laurent Bercot | |
Implementation for bearssl coming soon. | |||
2021-05-27 | All good, remove debug instructions | Laurent Bercot | |
2021-05-27 | Remove backtraces; add verification impls to server engines | Laurent Bercot | |
2021-05-27 | Add backtrace invocation to debug spurious get_pkey call | Laurent Bercot | |
2021-05-25 | More debug commands | Laurent Bercot | |
2021-05-22 | bugfix: tcpserver should unignore SIGPIPE | Laurent Bercot | |
2021-05-21 | Trivial syscall number optimization | Laurent Bercot | |
2021-05-20 | Debugging iteration | Laurent Bercot | |
2021-05-20 | Add an x509 engine wrapping minimal. NOT FUNCTIONAL, FOR TESTING. | Laurent Bercot | |
2021-05-18 | Prepare for 2.4.2.0; implement client certificates with bearssl | Laurent Bercot | |
Also send a bit more environment with libtls | |||
2021-05-08 | sbearssl cosmetic fixes | Laurent Bercot | |
2021-01-28 | Remove SSL_TLS_SNI_SERVERNAME (instead of defined but empty) if no SNI | Laurent Bercot | |
2021-01-28 | Prepare for 2.4.1.0; add SSL_TLS_SNI_SERVERNAME | Laurent Bercot | |
2021-01-18 | Tiny code and doc fixes | Laurent Bercot | |
2021-01-13 | Implement handshake timeout for libtls backend | Laurent Bercot | |
2020-12-09 | Get rid of webipc.h | Laurent Bercot | |
2020-12-07 | Change -K semantics: timeout *during handshake*, not afterwards | Laurent Bercot | |
- the TLS tunnel itself should be transparent so it has no business shutting down the connection no matter how long the app takes - there's still an undetectable situation on some kernels where EOF doesn't get transmitted from the network, and the engine is in the handshake, and it can't do anything but wait forever. A timeout is useful here: dawg, your peer is never going to send any more data, you should just give up. - if the situation happens after the handshake, the *app* should have a timeout and die. The tunnel will follow suit. - libtls has a blocking tls_handshake() blackbox, we cannot give it a timeout. Too bad, use bearssl. | |||
2020-11-30 | Fix build with skalibs 2.10.0.0; document dependencies | Laurent Bercot | |
2020-11-26 | Convert to new exec.h syntax | Laurent Bercot | |
2020-11-26 | That exit condition is really hard to get right >.> | Laurent Bercot | |
2020-11-26 | Fix engine exit condition for sbearssl | Laurent Bercot | |
2020-11-23 | minidentd QoL fix | Laurent Bercot | |
2020-11-23 | stls client: prefer CAFILE, warn on CADIR use, because libtls is broken | Laurent Bercot | |
2020-11-23 | Fix more bugs; disable renegociation in bearssl client | Laurent Bercot | |
2020-11-22 | Fix a few bugs. sbearssl appears to be working. | Laurent Bercot | |
2020-11-22 | Add SSL_PROTOCOL and SSL_CIPHER support, fix some bugs | Laurent Bercot | |
2020-11-22 | Add documentation, fix tiny privdrop bug | Laurent Bercot | |
2020-11-21 | Move all tls stuff into its own subdir | Laurent Bercot | |
2020-11-21 | Add s6-ucspitlsc | Laurent Bercot | |
2020-11-21 | Prepare for 2.4.0.0 | Laurent Bercot | |
2020-11-21 | Privs can only be dropped after reading key files. | Laurent Bercot | |
2020-11-20 | Refactor tls code to support ucspi-tls | Laurent Bercot | |
That includes: - new architecture: the tls binary is now a child of the app instead of the other way around - the sbearssl_run engine now takes a post-handshake callback. This allows s6-tlsc and s6-tlsd to only exec into the app when the handshake succeeds (which was already the case with libressl). - new binaries s6-tlsc-io and s6-tlsd-io encapsulate the crypto code; they init and run the engine, connecting to 4 already open fds (stdin/stdout = network, argv[1] and argv[2] = local) - s6-tlsc is now a simple wrapper around s6-tlsc-io - s6-tlsd is now a simple wrapper around s6-tlsd-io - new binary: s6-ucspitlsd, which is also a wrapper around s6-tlsd-io, but differently: the parent execs the app which should be ucspi-tls-aware, the child waits for a command from the parent and execs into s6-tlsd-io if it receives it. | |||
2020-05-06 | Add -e option to s6-tlsserver | Laurent Bercot | |