Hi folks,

BoringSSL has developed a test harness[1] that consists of a fork of Go’s
crypto/tls package (recently dubbed “BoGo" at the Berlin hackathon) plus a
test runner that allows BoGo to be run against the TLS stack under test.
BoGo can be configured to behave in a number of unexpected ways that
violate the TLS standard, thus enabling the testing of many scenarios that
would be otherwise difficult to obtain with a standard stack. We (David
Benjamin and Eric Rescorla) have been getting it to work with NSS and
wanted to let others know in case they might find it useful.

This system was initially designed to work with BoringSSL, but in principle
can be used with any stack. The portability is still a little rough, and
we'll likely make changes as we get more experience here, but it has
already been used to test NSS[2] and OpenSSL[3]. We've written up some
notes at [4].

The test suite should be fairly extensive for DTLS and TLS 1.2 (giving
around 75% line coverage in BoringSSL’s TLS code at last count). It tests
TLS 1.3 as well, though those tests are still in progress. They track
BoringSSL’s in-progress TLS 1.3 implementation.

David and Eric

[1] https://boringssl.googlesource.com/boringssl/+/master/ssl/test/
[2]
https://hg.mozilla.org/projects/nss/file/tip/external_tests/nss_bogo_shim
[3] https://github.com/google/openssl-tests
[4]
https://boringssl.googlesource.com/boringssl/+/master/ssl/test/PORTING.md
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to