Text file
src/crypto/tls/bogo_config.json
1 {
2 "DisabledTests": {
3 "*-Async": "We don't support boringssl concept of async",
4
5 "TLS-ECH-Client-Reject-NoClientCertificate-TLS12": "We won't attempt to negotiate 1.2 if ECH is enabled",
6 "TLS-ECH-Client-Reject-TLS12": "We won't attempt to negotiate 1.2 if ECH is enabled",
7 "TLS-ECH-Client-TLS12-RejectRetryConfigs": "We won't attempt to negotiate 1.2 if ECH is enabled",
8 "TLS-ECH-Client-Rejected-OverrideName-TLS12": "We won't attempt to negotiate 1.2 if ECH is enabled",
9 "TLS-ECH-Client-Reject-TLS12-NoFalseStart": "We won't attempt to negotiate 1.2 if ECH is enabled",
10 "TLS-ECH-Client-TLS12SessionTicket": "We won't attempt to negotiate 1.2 if ECH is enabled",
11 "TLS-ECH-Client-TLS12SessionID": "We won't attempt to negotiate 1.2 if ECH is enabled, and we don't support session ID resumption",
12
13 "TLS-ECH-Client-Reject-ResumeInnerSession-TLS12": "We won't attempt to negotiate 1.2 if ECH is enabled (we could possibly test this if we had the ability to indicate not to send ECH on resumption?)",
14
15 "TLS-ECH-Client-Reject-EarlyDataRejected": "Go does not support early (0-RTT) data",
16
17 "TLS-ECH-Client-NoNPN": "We don't support NPN",
18
19 "TLS-ECH-Client-ChannelID": "We don't support sending channel ID",
20 "TLS-ECH-Client-Reject-NoChannelID-TLS13": "We don't support sending channel ID",
21 "TLS-ECH-Client-Reject-NoChannelID-TLS12": "We don't support sending channel ID",
22
23 "TLS-ECH-Client-GREASE-IgnoreHRRExtension": "We don't support ECH GREASE because we don't fallback to plaintext",
24 "TLS-ECH-Client-NoSupportedConfigs-GREASE": "We don't support ECH GREASE because we don't fallback to plaintext",
25 "TLS-ECH-Client-GREASEExtensions": "We don't support ECH GREASE because we don't fallback to plaintext",
26 "TLS-ECH-Client-GREASE-NoOverrideName": "We don't support ECH GREASE because we don't fallback to plaintext",
27
28 "TLS-ECH-Client-UnsolicitedInnerServerNameAck": "We don't allow sending empty SNI without skipping certificate verification, TODO: could add special flag to bogo to indicate 'empty sni'",
29
30 "TLS-ECH-Client-NoSupportedConfigs": "We don't support fallback to cleartext when there are no valid ECH configs",
31 "TLS-ECH-Client-SkipInvalidPublicName": "We don't support fallback to cleartext when there are no valid ECH configs",
32
33 "TLS-ECH-Server-EarlyData": "Go does not support early (0-RTT) data",
34 "TLS-ECH-Server-EarlyDataRejected": "Go does not support early (0-RTT) data",
35
36 "MLKEMKeyShareIncludedSecond": "BoGo wants us to order the key shares based on its preference, but we don't support that",
37 "MLKEMKeyShareIncludedThird": "BoGo wants us to order the key shares based on its preference, but we don't support that",
38 "PostQuantumNotEnabledByDefaultInClients": "We do enable it by default!",
39 "*-Kyber-TLS13": "We don't support Kyber, only ML-KEM (BoGo bug ignoring AllCurves?)",
40
41 "*-RSA_PKCS1_SHA256_LEGACY-TLS13": "We don't support the legacy PKCS#1 v1.5 codepoint for TLS 1.3",
42 "*-Verify-RSA_PKCS1_SHA256_LEGACY-TLS12": "Likewise, we don't know how to handle it in TLS 1.2, so we send the wrong alert",
43 "*-VerifyDefault-*": "Our signature algorithms are not configurable, so there is no difference between default and supported",
44 "Ed25519DefaultDisable-*": "We support Ed25519 by default",
45 "NoCommonSignatureAlgorithms-TLS12-Fallback": "We don't support the legacy RSA exchange (without tlsrsakex=1)",
46
47 "*_SHA1-TLS12": "We don't support SHA-1 in TLS 1.2 (without tlssha1=1)",
48 "Agree-Digest-SHA1": "We don't support SHA-1 in TLS 1.2 (without tlssha1=1)",
49 "ServerAuth-SHA1-Fallback*": "We don't support SHA-1 in TLS 1.2 (without tlssha1=1), so we fail if there are no signature_algorithms",
50
51 "Agree-Digest-SHA256": "We select signature algorithms in peer preference order. We should consider changing this.",
52
53 "V2ClientHello-*": "We don't support SSLv2",
54 "SendV2ClientHello*": "We don't support SSLv2",
55 "*QUIC*": "No QUIC support",
56 "Compliance-fips*": "No FIPS",
57 "*DTLS*": "No DTLS",
58 "SendEmptyRecords*": "crypto/tls doesn't implement spam protections",
59 "SendWarningAlerts*": "crypto/tls doesn't implement spam protections",
60 "SendUserCanceledAlerts-TooMany-TLS13": "crypto/tls doesn't implement spam protections",
61 "TooManyKeyUpdates": "crypto/tls doesn't implement spam protections (TODO: I think?)",
62 "KyberNotEnabledByDefaultInClients": "crypto/tls intentionally enables it",
63 "JustConfiguringKyberWorks": "we always send a X25519 key share with Kyber",
64 "KyberKeyShareIncludedSecond": "we always send the Kyber key share first",
65 "KyberKeyShareIncludedThird": "we always send the Kyber key share first",
66 "GREASE-Server-TLS13": "We don't send GREASE extensions",
67 "SendBogusAlertType": "sending wrong alert type",
68 "*Client-P-224*": "no P-224 support",
69 "*Server-P-224*": "no P-224 support",
70 "CurveID-Resume*": "unexposed curveID is not stored in the ticket yet",
71 "BadRSAClientKeyExchange-4": "crypto/tls doesn't check the version number in the premaster secret - see processClientKeyExchange comment",
72 "BadRSAClientKeyExchange-5": "crypto/tls doesn't check the version number in the premaster secret - see processClientKeyExchange comment",
73 "SupportTicketsWithSessionID": "We don't support session ID resumption",
74 "ResumeTLS12SessionID-TLS13": "We don't support session ID resumption",
75 "TrustAnchors-*": "We don't support draft-beck-tls-trust-anchor-ids",
76 "PAKE-Extension-*": "We don't support PAKE",
77 "*TicketFlags": "We don't support draft-ietf-tls-tlsflags",
78
79 "BothMLKEMAndKyber-MLKEM1024": "We don't support ML-KEM 1024 KEX",
80 "CurveTest-Client-MLKEM1024-TLS13": "We don't support ML-KEM 1024 KEX",
81 "CurveTest-Invalid-MLKEMEncapKeyNotReduced-Server-MLKEM1024-TLS13": "We don't support ML-KEM 1024 KEX",
82 "CurveTest-Invalid-PadKeyShare-Client-MLKEM1024-TLS13": "We don't support ML-KEM 1024 KEX",
83 "CurveTest-Invalid-PadKeyShare-Server-MLKEM1024-TLS13": "We don't support ML-KEM 1024 KEX",
84 "CurveTest-Invalid-TruncateKeyShare-Client-MLKEM1024-TLS13": "We don't support ML-KEM 1024 KEX",
85 "CurveTest-Invalid-TruncateKeyShare-Server-MLKEM1024-TLS13": "We don't support ML-KEM 1024 KEX",
86 "CurveTest-Server-MLKEM1024-TLS13": "We don't support ML-KEM 1024 KEX",
87 "JustConfiguringMLKEMWorks-MLKEM1024": "We don't support ML-KEM 1024 KEX",
88 "NotJustMLKEMKeyShare-MLKEM1024": "We don't support ML-KEM 1024 KEX",
89 "TwoMLKEMs": "We don't support ML-KEM 1024 KEX",
90 "MLKEMKeyShareIncludedSecond-MLKEM1024": "We don't support ML-KEM 1024 KEX",
91 "MLKEMKeyShareIncludedSecond-X25519MLKEM768": "We don't support ML-KEM 1024 KEX",
92 "MLKEMKeyShareIncludedThird-MLKEM1024": "We don't support ML-KEM 1024 KEX",
93
94 "MLKEMKeyShareIncludedThird-X25519MLKEM768": "We don't return key shares in client preference order",
95
96 "ECDSAKeyUsage-*": "We don't enforce ECDSA KU",
97
98 "RSAKeyUsage-*": "We don't enforce RSA KU",
99
100 "CheckLeafCurve": "TODO: first pass, this should be fixed",
101 "KeyUpdate-RequestACK": "TODO: first pass, this should be fixed",
102 "SupportedVersionSelection-TLS12": "TODO: first pass, this should be fixed",
103 "UnsolicitedServerNameAck-TLS-TLS1": "TODO: first pass, this should be fixed",
104 "TicketSessionIDLength-33-TLS-TLS1": "TODO: first pass, this should be fixed",
105 "UnsolicitedServerNameAck-TLS-TLS11": "TODO: first pass, this should be fixed",
106 "TicketSessionIDLength-33-TLS-TLS11": "TODO: first pass, this should be fixed",
107 "UnsolicitedServerNameAck-TLS-TLS12": "TODO: first pass, this should be fixed",
108 "TicketSessionIDLength-33-TLS-TLS12": "TODO: first pass, this should be fixed",
109 "UnsolicitedServerNameAck-TLS-TLS13": "TODO: first pass, this should be fixed",
110 "RenegotiationInfo-Forbidden-TLS13": "TODO: first pass, this should be fixed",
111 "EMS-Forbidden-TLS13": "TODO: first pass, this should be fixed",
112 "SendUnsolicitedOCSPOnCertificate-TLS13": "TODO: first pass, this should be fixed",
113 "SendUnsolicitedSCTOnCertificate-TLS13": "TODO: first pass, this should be fixed",
114 "SendUnknownExtensionOnCertificate-TLS13": "TODO: first pass, this should be fixed",
115 "Resume-Server-NoTickets-TLS1-TLS1-TLS": "TODO: first pass, this should be fixed",
116 "Resume-Server-NoTickets-TLS11-TLS11-TLS": "TODO: first pass, this should be fixed",
117 "Resume-Server-NoTickets-TLS12-TLS12-TLS": "TODO: first pass, this should be fixed",
118 "Resume-Server-NoPSKBinder": "TODO: first pass, this should be fixed",
119 "Resume-Server-PSKBinderFirstExtension": "TODO: first pass, this should be fixed",
120 "Resume-Server-PSKBinderFirstExtension-SecondBinder": "TODO: first pass, this should be fixed",
121 "Resume-Server-NoPSKBinder-SecondBinder": "TODO: first pass, this should be fixed",
122 "Resume-Server-OmitPSKsOnSecondClientHello": "TODO: first pass, this should be fixed",
123 "Renegotiate-Server-Forbidden": "TODO: first pass, this should be fixed",
124 "Renegotiate-Client-Forbidden-1": "TODO: first pass, this should be fixed",
125 "UnknownExtension-Client": "TODO: first pass, this should be fixed",
126 "UnknownUnencryptedExtension-Client-TLS13": "TODO: first pass, this should be fixed",
127 "UnofferedExtension-Client-TLS13": "TODO: first pass, this should be fixed",
128 "UnknownExtension-Client-TLS13": "TODO: first pass, this should be fixed",
129 "SendClientVersion-RSA": "TODO: first pass, this should be fixed",
130 "NoCommonCurves": "TODO: first pass, this should be fixed",
131 "PointFormat-EncryptedExtensions-TLS13": "TODO: first pass, this should be fixed",
132 "TLS13-SendNoKEMModesWithPSK-Server": "TODO: first pass, this should be fixed",
133 "TLS13-DuplicateTicketEarlyDataSupport": "TODO: first pass, this should be fixed",
134 "Basic-Client-NoTicket-TLS-Sync": "TODO: first pass, this should be fixed",
135 "Basic-Server-RSA-TLS-Sync": "TODO: first pass, this should be fixed",
136 "Basic-Client-NoTicket-TLS-Sync-SplitHandshakeRecords": "TODO: first pass, this should be fixed",
137 "Basic-Server-RSA-TLS-Sync-SplitHandshakeRecords": "TODO: first pass, this should be fixed",
138 "Basic-Client-NoTicket-TLS-Sync-PackHandshake": "TODO: first pass, this should be fixed",
139 "Basic-Server-RSA-TLS-Sync-PackHandshake": "TODO: first pass, this should be fixed",
140 "PartialSecondClientHelloAfterFirst": "TODO: first pass, this should be fixed",
141 "PartialServerHelloWithHelloRetryRequest": "TODO: first pass, this should be fixed",
142 "TrailingDataWithFinished-Server-TLS1": "TODO: first pass, this should be fixed",
143 "PartialClientKeyExchangeWithClientHello": "TODO: first pass, this should be fixed",
144 "TrailingDataWithFinished-Resume-Server-TLS1": "TODO: first pass, this should be fixed",
145 "TrailingDataWithFinished-Resume-Client-TLS11": "TODO: first pass, this should be fixed",
146 "TrailingDataWithFinished-Client-TLS1": "TODO: first pass, this should be fixed",
147 "TrailingDataWithFinished-Client-TLS11": "TODO: first pass, this should be fixed",
148 "TrailingDataWithFinished-Client-TLS12": "TODO: first pass, this should be fixed",
149 "TrailingDataWithFinished-Client-TLS13": "TODO: first pass, this should be fixed",
150 "PartialNewSessionTicketWithServerHelloDone": "TODO: first pass, this should be fixed",
151 "TrailingDataWithFinished-Server-TLS11": "TODO: first pass, this should be fixed",
152 "TrailingDataWithFinished-Server-TLS12": "TODO: first pass, this should be fixed",
153 "TrailingDataWithFinished-Resume-Server-TLS11": "TODO: first pass, this should be fixed",
154 "TrailingDataWithFinished-Resume-Client-TLS12": "TODO: first pass, this should be fixed",
155 "TrailingDataWithFinished-Resume-Server-TLS12": "TODO: first pass, this should be fixed",
156 "TrailingDataWithFinished-Resume-Client-TLS13": "TODO: first pass, this should be fixed",
157 "TrailingDataWithFinished-Resume-Client-TLS1": "TODO: first pass, this should be fixed",
158 "TrailingMessageData-ClientHello-TLS": "TODO: first pass, this should be fixed",
159 "TrailingMessageData-ServerHello-TLS": "TODO: first pass, this should be fixed",
160 "TrailingMessageData-ServerCertificate-TLS": "TODO: first pass, this should be fixed",
161 "TrailingMessageData-ServerHelloDone-TLS": "TODO: first pass, this should be fixed",
162 "TrailingMessageData-ServerKeyExchange-TLS": "TODO: first pass, this should be fixed",
163 "TrailingMessageData-CertificateRequest-TLS": "TODO: first pass, this should be fixed",
164 "TrailingMessageData-CertificateVerify-TLS": "TODO: first pass, this should be fixed",
165 "TrailingMessageData-ServerFinished-TLS": "TODO: first pass, this should be fixed",
166 "TrailingMessageData-ClientKeyExchange-TLS": "TODO: first pass, this should be fixed",
167 "TrailingMessageData-TLS13-ClientHello-TLS": "TODO: first pass, this should be fixed",
168 "TrailingMessageData-ClientFinished-TLS": "TODO: first pass, this should be fixed",
169 "TrailingMessageData-NewSessionTicket-TLS": "TODO: first pass, this should be fixed",
170 "TrailingMessageData-ClientCertificate-TLS": "TODO: first pass, this should be fixed",
171 "TrailingMessageData-TLS13-CertificateRequest-TLS": "TODO: first pass, this should be fixed",
172 "TrailingMessageData-TLS13-ServerCertificateVerify-TLS": "TODO: first pass, this should be fixed",
173 "TrailingMessageData-TLS13-EncryptedExtensions-TLS": "TODO: first pass, this should be fixed",
174 "TrailingMessageData-TLS13-ClientCertificate-TLS": "TODO: first pass, this should be fixed",
175 "TrailingMessageData-TLS13-ClientCertificateVerify-TLS": "TODO: first pass, this should be fixed",
176 "TrailingMessageData-TLS13-ServerCertificate-TLS": "TODO: first pass, this should be fixed",
177 "SkipEarlyData-TLS13": "TODO: first pass, this should be fixed",
178 "DuplicateKeyShares-TLS13": "TODO: first pass, this should be fixed",
179 "Server-TooLongSessionID-TLS13": "TODO: first pass, this should be fixed",
180 "Client-TooLongSessionID": "TODO: first pass, this should be fixed",
181 "Client-ShortSessionID": "TODO: first pass, this should be fixed",
182 "TLS12NoSessionID-TLS13": "TODO: first pass, this should be fixed",
183 "Server-TooLongSessionID-TLS12": "TODO: first pass, this should be fixed",
184 "EmptyEncryptedExtensions-TLS13": "TODO: first pass, this should be fixed",
185 "SkipEarlyData-SecondClientHelloEarlyData-TLS13": "TODO: first pass, this should be fixed",
186 "EncryptedExtensionsWithKeyShare-TLS13": "TODO: first pass, this should be fixed",
187 "HelloRetryRequest-DuplicateCurve-TLS13": "TODO: first pass, this should be fixed",
188 "HelloRetryRequest-DuplicateCookie-TLS13": "TODO: first pass, this should be fixed",
189 "HelloRetryRequest-Unknown-TLS13": "TODO: first pass, this should be fixed",
190 "SendPostHandshakeChangeCipherSpec-TLS13": "TODO: first pass, this should be fixed",
191 "EmptyExtensions-ClientHello-TLS1": "TODO: first pass, this should be fixed",
192 "OmitExtensions-ClientHello-TLS1": "TODO: first pass, this should be fixed",
193 "EmptyExtensions-ClientHello-TLS12": "TODO: first pass, this should be fixed",
194 "OmitExtensions-ClientHello-TLS12": "TODO: first pass, this should be fixed",
195 "EmptyExtensions-ClientHello-TLS11": "TODO: first pass, this should be fixed",
196 "OmitExtensions-ClientHello-TLS11": "TODO: first pass, this should be fixed",
197 "DuplicateCertCompressionExt-TLS12": "TODO: first pass, this should be fixed",
198 "DuplicateCertCompressionExt-TLS13": "TODO: first pass, this should be fixed",
199 "Client-RejectJDK11DowngradeRandom": "TODO: first pass, this should be fixed",
200 "CheckClientCertificateTypes": "TODO: first pass, this should be fixed",
201 "CheckECDSACurve-TLS12": "TODO: first pass, this should be fixed",
202 "ALPNClient-RejectUnknown-TLS-TLS1": "TODO: first pass, this should be fixed",
203 "ALPNClient-RejectUnknown-TLS-TLS11": "TODO: first pass, this should be fixed",
204 "ALPNClient-RejectUnknown-TLS-TLS12": "TODO: first pass, this should be fixed",
205 "ALPNClient-RejectUnknown-TLS-TLS13": "TODO: first pass, this should be fixed",
206 "ClientHelloPadding": "TODO: first pass, this should be fixed",
207 "TLS13-ExpectTicketEarlyDataSupport": "TODO: first pass, this should be fixed",
208 "TLS13-EarlyData-TooMuchData-Client-TLS-Sync": "TODO: first pass, this should be fixed",
209 "TLS13-EarlyData-TooMuchData-Client-TLS-Sync-SplitHandshakeRecords": "TODO: first pass, this should be fixed",
210 "TLS13-EarlyData-TooMuchData-Client-TLS-Sync-PackHandshake": "TODO: first pass, this should be fixed",
211 "WrongMessageType-TLS13-EndOfEarlyData-TLS": "TODO: first pass, this should be fixed",
212 "TrailingMessageData-TLS13-EndOfEarlyData-TLS": "TODO: first pass, this should be fixed",
213 "SendHelloRetryRequest-2-TLS13": "TODO: first pass, this should be fixed",
214 "EarlyData-SkipEndOfEarlyData-TLS13": "TODO: first pass, this should be fixed",
215 "EarlyData-Server-BadFinished-TLS13": "TODO: first pass, this should be fixed",
216 "EarlyData-UnexpectedHandshake-Server-TLS13": "TODO: first pass, this should be fixed",
217 "EarlyData-CipherMismatch-Client-TLS13": "TODO: first pass, this should be fixed",
218
219 "Resume-Server-UnofferedCipher-TLS13": "TODO: first pass, this should be fixed",
220 "GarbageCertificate-Server-TLS13": "TODO: 2025/06 BoGo update, should be fixed",
221 "WrongMessageType-TLS13-ClientCertificate-TLS": "TODO: 2025/06 BoGo update, should be fixed",
222 "KeyUpdate-Requested": "TODO: 2025/06 BoGo update, should be fixed",
223 "AppDataBeforeTLS13KeyChange-*": "TODO: 2025/06 BoGo update, should be fixed"
224 },
225 "ErrorMap": {
226 ":ECH_REJECTED:": ["tls: server rejected ECH"]
227 }
228 }
229
View as plain text