We found out that many TLS implementations are still vulnerable to different variations of a 19-year old Bleichenbacher's attack. Since Hanno argued to have an attack name, we called it ROBOT: https://robotattack.org
Given the new attack variants, we released a new version of TLS-Attacker 2.2, which covers our vulnerabilities.
TLS-Attacker allows you to automatically send differently formatted PKCS#1 encrypted messages and observe the server behavior:
In case the server responds with different error messages, it is most likely vulnerable. The following example provides an example of a vulnerable server detection output:
In this case TLS-Attacker identified that sending different PKCS#1 messages results in different server responses (the record contents are different).
Given the new attack variants, we released a new version of TLS-Attacker 2.2, which covers our vulnerabilities.
Bleichenbacher's attack from 1998
In 1998, Daniel Bleichenbacher discovered that the error messages given by SSL servers for errors in the PKCS #1 1.5 padding allow an adversary to execute an adaptive-chosen ciphertext attack. This attack also belongs to the category of padding oracle attacks. By performing the attack, the adversary exploits different responses returned by the server that decrypts the requests and validates the PKCS#1 1.5 padding. Given such a server, the attacker can use it as an oracle and decrypt ciphertexts.
We refer to one of our previous blog posts for more details.
OK, so what is new in our research?
In our research we performed scans of several well-known hosts and found out many of them are vulnerable to different forms of the attack. In the original paper, an oracle was constructed from a server that responded with different TLS alert messages. In 2014, further side-channels like timings were exploited. However, all the previous studies have considered mostly open source implementations. Only a few vulnerabilities have been found.
In our scans we could identify more than seven vulnerable products and open source software implementations, including F5, Radware, Cisco, Erlang, Bouncy Castle, or WolfSSL. We identified new side-channels triggered by incomplete protocol flows or TCP socket states.
For example, some F5 products would respond to a malformed ciphertext located in the ClientKeyExchange message with a TLS alert 40 (handshake failure) but allow connections to timeout if the decryption was successful. We could observe this behaviour only when sending incomplete TLS handshakes missing ChangeCipherSpec and Finished messages.
See our paper for more interesting results.
Release of TLS-Attacker 2.2
These new findings motivated us to implement the complete detection of Bleichenbacher attacks in our TLS-Attacker. Before our research, TLS-Attacker had implemented a basic Bleichenbacher attack evaluation with full TLS protocol flows. We extended this evaluation with shortened protocol flows with missing ChangeCipherSpec and Finished messages, and implemented an oracle detection based on TCP timeouts and duplicated TLS alerts. In addition, Robert (@ic0ns) added many fixes and merged features like replay attacks on 0-RTT in TLS 1.3.
You can find the newest version release here: https://github.com/RUB-NDS/TLS-Attacker/releases/tag/v2.2
$ java -jar Attacks.jar bleichenbacher -connect [host]:[port]
14:12:42 [main] CONSOLE attacks.impl.Attacker - A server is considered vulnerable to this attack if it responds differently to the test vectors.
14:12:42 [main] CONSOLE attacks.impl.Attacker - A server is considered secure if it always responds the same way.
14:12:49 [main] CONSOLE attacks.impl.Attacker - Found a difference in responses in the Complete TLS protocol flow with CCS and Finished messages.
14:12:49 [main] CONSOLE attacks.impl.Attacker - The server seems to respond with different record contents.
14:12:49 [main] INFO attacks.Main - Vulnerable:true
Related posts
- Android Hack Tools Github
- Pentest Tools Subdomain
- Install Pentest Tools Ubuntu
- Hack Tools Github
- Pentest Tools Nmap
- Pentest Tools
- Hacker Tools Apk
- Hacking Tools For Beginners
- Hackers Toolbox
- Hacker Tools
- Hack Tools For Pc
- Hacking Tools For Kali Linux
- Easy Hack Tools
- Pentest Tools Alternative
- Nsa Hacker Tools
- Hacker Security Tools
- Hacker Tool Kit
- Hack Tools
- Computer Hacker
- Hack Apps
- Pentest Tools Windows
- What Is Hacking Tools
- Pentest Tools For Windows
- Growth Hacker Tools
- Pentest Tools Alternative
- Hacker Tools List
- Hacks And Tools
- Usb Pentest Tools
- Hacking Tools Hardware
- New Hacker Tools
- Pentest Tools Framework
- Hacker Tools For Mac
- Hacker Tools
- Pentest Tools Url Fuzzer
- Game Hacking
- Pentest Automation Tools
- Hacker Tools Linux
- Hack Tool Apk No Root
- Hacker Tools For Pc
- Pentest Tools For Mac
- Pentest Tools Windows
- Hacking Tools For Kali Linux
- Pentest Tools Review
- Hack Tools For Mac
- Hak5 Tools
- Hacking Tools Online
- Hack Tools Mac
- Hacker Tools Apk Download
- Hack Tools Pc
- Pentest Tools Website
- How To Install Pentest Tools In Ubuntu
- Hack Tools For Games
- What Are Hacking Tools
- Hacking Tools Hardware
- Hacker Tools For Ios
- Hacking Apps
- Pentest Tools Download
- Hacker Tools Windows
- Hacker Tools Software
- Hack Website Online Tool
- Hacker Tools For Ios
- Hacker Tools Hardware
- Nsa Hack Tools
- Hacking Tools Free Download
- Pentest Tools Apk
- Hacker Hardware Tools
- Hack Rom Tools
- Pentest Tools Windows
- Hacker Security Tools
- Hacker Tool Kit
- Hacking Tools For Games
- Hacker Tools
- New Hack Tools
- Pentest Tools Online
- Pentest Tools For Android
- Hacking Tools For Kali Linux
- Hack Tools For Pc
- Hacking Tools For Beginners
- Wifi Hacker Tools For Windows
- Growth Hacker Tools
- Hack Website Online Tool
- Pentest Tools Windows
- Hacker Tools Mac
- Hacking Tools Windows 10
- Pentest Tools Kali Linux
- Black Hat Hacker Tools
- Pentest Tools Url Fuzzer
- Hacker Tools Hardware
- Hack Tools
- Hacker Tools Free Download
- Hacker Tools For Mac
- Hacker Tools Software
- Pentest Tools List
- Pentest Tools Windows
- Hack Tools For Games
- Hackrf Tools
- Pentest Tools Apk
- Pentest Tools
- Hacking Tools For Windows 7
- Computer Hacker
- Pentest Reporting Tools
- Hacker Tools Software
- Pentest Tools Framework
- Pentest Tools Bluekeep
- Hacker
- Hacking Tools Name
- Best Hacking Tools 2019
- Pentest Box Tools Download
- Install Pentest Tools Ubuntu
- Pentest Tools For Android
- Bluetooth Hacking Tools Kali
- Hacking Tools Hardware
- Hack Tools For Mac
- Hack Tools Online
- Hacking Apps
- Hacker Tools 2020
- Hack App
- Hacker Tools Github
- Hacking Tools 2020
- Hacking Tools Pc
- Pentest Tools Kali Linux
- Hacking Tools Download
- Hack Tools
- Hacking Tools Hardware
- Hackrf Tools
- Best Hacking Tools 2019
- Beginner Hacker Tools
- Hacking App
- Pentest Tools For Mac
- Hack Apps
- Pentest Tools For Android
- Hak5 Tools
- Hak5 Tools
- Best Hacking Tools 2020
- Hack Tools 2019
- Hacking Tools For Windows 7
- Hacking Tools Usb
- Hak5 Tools
- Hacking Tools Kit
- Pentest Tools Apk
- Hacker Hardware Tools
- Hack Tool Apk
- Black Hat Hacker Tools
- Hacking Tools Windows
- Pentest Tools For Ubuntu
- Hack Rom Tools
No comments:
Post a Comment