1. 08 1月, 2002 1 次提交
  2. 24 9月, 2001 1 次提交
  3. 24 7月, 2001 1 次提交
    • G
      - New INSTALL document describing different ways to build "tunala" and · 3866752e
      Geoff Thorpe 提交于
        possible problems.
      - New file breakage.c handles (so far) missing functions.
      - Get rid of some signed/unsigned/const warnings thanks to solaris-cc
      - Add autoconf/automake input files, and helper scripts to populate missing
        (but auto-generated) files.
      
      This change adds a configure.in and Makefile.am to build everything using
      autoconf, automake, and libtool - and adds "gunk" scripts to generate the
      various files those things need (and clean then up again after). This means
      that "autogunk.sh" needs to be run first on a system with the autotools,
      but the resulting directory should be "configure"able and compilable on
      systems without those tools.
      3866752e
  4. 12 2月, 2001 1 次提交
    • G
      This change was a quick experiment that I'd wanted to try that works quite · 282d8b1c
      Geoff Thorpe 提交于
      well (and is a good demonstration of how encapsulating the SSL in a
      memory-based state machine can make it easier to apply to different
      situations).
      
      The change implements a new command-line switch "-flipped <0|1>" which, if
      set to 1, reverses the usual interpretation of a client and server for SSL
      tunneling. Normally, an ssl client (ie. "-server 0") accepts "cleartext"
      connections and conducts SSL/TLS over a proxied connection acting as an SSL
      client. Likewise, an ssl server (ie. "-server 1") accepts connections and
      conducts SSL/TLS (as an SSL server) over them and passes "cleartext" over
      the proxied connection. With "-flipped 1", an SSL client (specified with
      "-server 0") in fact accepts SSL connections and proxies clear, whereas an
      SSL server ("-server 1") accepts clear and proxies SSL. NB: most of this
      diff is command-line handling, the actual meat of the change is simply the
      line or two that plugs "clean" and "dirty" file descriptors into the item
      that holds the state-machine - reverse them and you get the desired
      behaviour.
      
      This allows a network server to be an SSL client, and a network client to
      be an SSL server. Apart from curiosity value, there's a couple of possibly
      interesting applications - SSL/TLS is inherently vulnerable to trivial DoS
      attacks, because the SSL server usually has to perform a private key
      operation first, even if the client is authenticated. With this scenario,
      the network client is the SSL server and performs the first private key
      operation, whereas the network server serves as the SSL client. Another
      possible application is when client-only authentication is required (ie.
      the underlying protocol handles (or doesn't care about) authenticating the
      server). Eg. an SSL/TLS version of 'ssh' could be concocted where the
      client's signed certificate is used to validate login to a server system -
      whether or not the client needs to validate who the server is can be
      configured at the client end rather than at the server end (ie. a complete
      inversion of what happens in normal SSL/TLS).
      
      NB: This is just an experiment/play-thing, using "-flipped 1" probably
      creates something that is interoperable with exactly nothing. :-)
      282d8b1c
  5. 06 2月, 2001 1 次提交
  6. 21 12月, 2000 3 次提交
    • G
      Re-order the options in tunala and add command switches like s_server for · 895959b7
      Geoff Thorpe 提交于
      disabling different SSL/TLS protocol versions.
      895959b7
    • G
      This adds support to 'tunala' for supplying DH parameters (without which it · 1cc0b0a6
      Geoff Thorpe 提交于
      will not support EDH cipher suites). The parameters can either be loaded
      from a file (via "-dh_file"), generated by the application on start-up
      ("-dh_special generate"), or be standard DH parameters (as used in
      s_server, etc).
      1cc0b0a6
    • G
      Some minor changes to the "tunala" demo. · beb23252
      Geoff Thorpe 提交于
      * Seal off some buffer functions so that only the higher-level IO functions
        are exposed.
      
      * Using the above change to buffer, add support to tunala for displaying
        traffic totals when a tunnel closes. Useful in debugging and analysis -
        you get to see the total encrypted traffic versus the total tunneled
        traffic. This shows not only how much expansion your data suffers from
        SSL (a lot if you send/receive a few bytes at a time), but also the
        overhead of SSL handshaking relative to the payload sent through the
        tunnel. This is controlled by the "-out_totals" switch to tunala.
      
      * Fix and tweak some bits in the README.
      
      Eg. sample output of "-out_totals" from a tunnel client when tunneling a brief
      "telnet" session.
      
      Tunnel closing, traffic stats follow
          SSL (network) traffic to/from server;     7305 bytes in,     3475 bytes out
          tunnelled data to/from server;            4295 bytes in,      186 bytes out
      beb23252
  7. 30 11月, 2000 2 次提交
    • G
      * Fix a slight bug in the state-machine. This caused the client end of a · 3465dd38
      Geoff Thorpe 提交于
        tunnel to not pro-actively close down when failing an SSL handshake.
      
      * Change the cert-chain callback - originally this was the same one used in
        s_client and s_server but the output's as ugly as sin, so I've prettied
        tunala's copy output up a bit (and made the output level configurable).
      
      * Remove the superfluous "errors" from the SSL state callback - these are just
        non-blocking side-effects.
      3465dd38
    • G
      More little changes to the tunala demo; · a9376dbf
      Geoff Thorpe 提交于
      * A little bit of code-cleanup
      * Reformat the usage string (not so wide)
      * Allow adding an alternative (usually DSA) cert/key pair (a la s_server)
      * Allow control over cert-chain verify depth
      a9376dbf
  8. 29 11月, 2000 3 次提交
  9. 02 11月, 2000 2 次提交