Skip to content

Dummy TLS server which does not support renegotitation to test TLS clients

Notifications You must be signed in to change notification settings

ckcr4lyf/no-rfc5746

Repository files navigation

no-rfc5746

Just a simple TLS server which does not support secure renegotiation (https://www.rfc-editor.org/rfc/rfc5746).

This is useful to test TLS clients which need to be able to connect to such servers, as newer TLS libraries (such as OpenSSLv3) may return an error by default.

The purpose was to illustrate a bug in NodeJS: nodejs/node#48143

Usage

Just run the server via node server.mjs , and then try to connect to it via a TLS client.

By default, this would fail on OpenSSL >3 , and it is OK on OpenSSL 1.1.1

If you want to access a public instance, I host it at: "https://rfc5746.mywaifu.best:4433" . If the service seems to be down please open an issue.

Example with cURL (openSSL 3.0.8)
$ curl -v https://127.0.0.1:4433
*   Trying 127.0.0.1:4433...
* Connected to 127.0.0.1 (127.0.0.1) port 4433 (#0)
* ALPN: offers h2,http/1.1
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
*  CAfile: /etc/ssl/certs/ca-certificates.crt
*  CApath: none
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (OUT), TLS alert, handshake failure (552):
* OpenSSL/3.0.8: error:0A000152:SSL routines::unsafe legacy renegotiation disabled
* Closing connection 0
curl: (35) OpenSSL/3.0.8: error:0A000152:SSL routines::unsafe legacy renegotiation disabled
Example with openssl s_client (OpenSSL 3.0.8 7 Feb 2023)
$ openssl s_client -connect 127.0.0.1:4433
CONNECTED(00000003)
40271E309C7F0000:error:0A000152:SSL routines:final_renegotiate:unsafe legacy renegotiation disabled:ssl/statem/extensions.c:893:
---
no peer certificate available
---
No client certificate CA names sent
---
SSL handshake has read 49 bytes and written 304 bytes
Verification: OK
---
New, (NONE), Cipher is (NONE)
Secure Renegotiation IS NOT supported
Compression: NONE
Expansion: NONE
No ALPN negotiated
SSL-Session:
    Protocol  : TLSv1.2
    Cipher    : 0000
    Session-ID:
    Session-ID-ctx:
    Master-Key:
    PSK identity: None
    PSK identity hint: None
    SRP username: None
    Start Time: 1684839458
    Timeout   : 7200 (sec)
    Verify return code: 0 (ok)
    Extended master secret: no
---

About

Dummy TLS server which does not support renegotitation to test TLS clients

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages