You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The following Extesions are sendable and receivable but are currently not completely functional:
75
85
- ALPN
76
86
- Cached Info
@@ -236,8 +246,8 @@ Further examples on attacks and further explanations on TLS-Attacker can be foun
236
246
237
247
## Advanced Features
238
248
Some Actions require context, or configuration to be executed correctly. For exmaple, if TLS-Attacker tries to send a ClientHello message, it needs to know which values to
239
-
put into the message like which Ciphersuites or which protocol version to put. TLS-Attacker draws this information from a configuration file (default located in TLS-Core/src/main/resources/default_config.xml).
240
-
Values which are determined at runtime are stored in the TlsContext. When a value which is normally selected from the current connection state is missing (because a message was not yet received), the default value from the Config is selected. You can specify your own configuration file from command line with the "-config" parameter. Note that if you dont explicitly define a default value in the config file, TLS-Attacker fills
249
+
put into the message, eg. which Ciphersuites or which protocol version to use. TLS-Attacker draws this information from a configuration file (default located in TLS-Core/src/main/resources/default_config.xml).
250
+
Values which are determined at runtime are stored in the TlsContext. When a value which is normally selected from the context is missing (because a message was not yet received), the default value from the Config is selected. You can specify your own configuration file from command line with the "-config" parameter. Note that if you do not explicitly define a default value in the config file, TLS-Attacker fills
241
251
this gap with hardcoded values (which are equal to the provided default config). More details on how to customize TLS-Attacker can be found in the wiki.
242
252
243
253
## Acknowledgements
@@ -249,6 +259,10 @@ The following people have contributed code to the TLS-Attacker Project:
249
259
- Matthias Terlinde: More TLS-Extensions
250
260
- Nurullah Erinola: TLS 1.3 Support
251
261
- Lucas Hartmann: TLS-MitM Workflows
262
+
- Florian Linsner: PSK
263
+
- Pierre Tilhaus: Code quality improvements
264
+
265
+
Additionally we would like to thank all the other people who have contributed code to the project.
252
266
253
267
Further contributions and pull requests are welcome.
0 commit comments