BlobbyBob

Results 7 comments of BlobbyBob

Is there any way of building Nexmon at the moment on Raspberry Pi OS? While I'm able to download an older image which uses the 5.4 kernel, the raspberrypi-kernel-headers seem...

Of course, here you go: Script `test.py`: ```py import socket import scapy.layers.tls.all as tls client_hello = tls.TLSClientHello( ciphers=[ tls.TLS_CHACHA20_POLY1305_SHA256 ], ext=[ tls.TLS_Ext_ServerName(servernames=[tls.ServerName(servername=b"localhost")]), tls.TLS_Ext_ExtendedMasterSecret(), tls.TLS_Ext_EncryptThenMAC(), tls.TLS_Ext_SupportedGroups(groups=["x25519"]), tls.TLS_Ext_SupportedVersion_CH(versions=["TLS 1.3"]), tls.TLS_Ext_SignatureAlgorithms(sig_algs=["sha256+rsaepss"]), tls.TLS_Ext_KeyShare_CH(client_shares=[tls.KeyShareEntry(group="x25519")]), ],...

I also just discovered that the issue persists when announcing `TLS_AES_128_GCM_SHA256` as only cipher suite. Initially, I thought it was only a issue for Chacha due to the mentioned branching...

Thanks for your clarifications. I was aware of the second aspect but not of the first one. > We really need to have examples on https://scapy.readthedocs.io/ regarding various common TLS...

With `AIOHTTP_NO_EXTENSIONS=1` there seems to be no issue

I've narrowed the issue a bit down. It has to do with the `Upgrade: h2c` header in the request. A more minimal reproduction example: **Server** ```py import aiohttp.web async def...

If you still think it is an issue with `llhttp`, could you open an issue over there? I'm not familiar with that project, so the bug report would probably be...