You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Problem:
Right now we only test s2n's client implementation against s2n's server, OpenSSL server, and a few external domains here.
We'd like our client side integration tests to be more robust at catching some of the "long tail" of possible TLS compatibility bugs with more uncommon TLS libraries.
Proposed Solution:
Update s2n_client_endpoint_handshake_test.py to read domains to handshake with from a file (Eg top_10k_domains.txt) instead of the list of 8 domains currently used. We should be able to create a script to generate our own shortened list from free Top 1 million lists such as Alexa Top Sites or Cisco Top Million Domains.
By adding so many more domains to this test, we'll probably also need to implement additional checks to catch and ignore false positives. One simple check we could do would be to perform two TLS handshakes, one with OpenSSL client and one with s2n client, and only fail the integration test if OpenSSL is successful, but s2n fails or vice/versa.
The text was updated successfully, but these errors were encountered:
Problem:
Right now we only test s2n's client implementation against s2n's server, OpenSSL server, and a few external domains here.
We'd like our client side integration tests to be more robust at catching some of the "long tail" of possible TLS compatibility bugs with more uncommon TLS libraries.
Proposed Solution:
Update
s2n_client_endpoint_handshake_test.py
to read domains to handshake with from a file (Egtop_10k_domains.txt
) instead of the list of 8 domains currently used. We should be able to create a script to generate our own shortened list from free Top 1 million lists such as Alexa Top Sites or Cisco Top Million Domains.By adding so many more domains to this test, we'll probably also need to implement additional checks to catch and ignore false positives. One simple check we could do would be to perform two TLS handshakes, one with OpenSSL client and one with s2n client, and only fail the integration test if OpenSSL is successful, but s2n fails or vice/versa.
The text was updated successfully, but these errors were encountered: