i have specific scenario
openssl: accept tls connection , transfer process , openssl secure renegotiation
here, p1 process forks child process c1. scenario works fine. no issues this.
now, want have done mitm proxy.
the mitm proxy fails @ step no.12. ssl_do_handshake returns ('ssl routines', 'ssl3_read_bytes', 'unknown alert type')
on client side.
the mitm proxy should understand ssl_do_handshake
@ step no.12 , should not stop it.
i want application support deep packet inspection proxies, hence testing scenario.
have tested mitmproxy, burp proxy , fiddler had no luck.
how can through step no.12?
basic unit testing can done with:
$ openssl s_client -connect www.cisco.com:443 [snip... lot of openssl output] --- head / http/1.0 r renegotiating [snip... certificate info] verify return:1: <connection remains alive>
Comments
Post a Comment