We found out that many TLS implementations are still vulnerable to different variations of a 19-year old Bleichenbacher's attack. Since Hanno argued to have an attack name, we called it ROBOT: https://robotattack.org
Given the new attack variants, we released a new version of TLS-Attacker 2.2, which covers our vulnerabilities.
TLS-Attacker allows you to automatically send differently formatted PKCS#1 encrypted messages and observe the server behavior:
In case the server responds with different error messages, it is most likely vulnerable. The following example provides an example of a vulnerable server detection output:
In this case TLS-Attacker identified that sending different PKCS#1 messages results in different server responses (the record contents are different).
Given the new attack variants, we released a new version of TLS-Attacker 2.2, which covers our vulnerabilities.
Bleichenbacher's attack from 1998
In 1998, Daniel Bleichenbacher discovered that the error messages given by SSL servers for errors in the PKCS #1 1.5 padding allow an adversary to execute an adaptive-chosen ciphertext attack. This attack also belongs to the category of padding oracle attacks. By performing the attack, the adversary exploits different responses returned by the server that decrypts the requests and validates the PKCS#1 1.5 padding. Given such a server, the attacker can use it as an oracle and decrypt ciphertexts.
We refer to one of our previous blog posts for more details.
OK, so what is new in our research?
In our research we performed scans of several well-known hosts and found out many of them are vulnerable to different forms of the attack. In the original paper, an oracle was constructed from a server that responded with different TLS alert messages. In 2014, further side-channels like timings were exploited. However, all the previous studies have considered mostly open source implementations. Only a few vulnerabilities have been found.
In our scans we could identify more than seven vulnerable products and open source software implementations, including F5, Radware, Cisco, Erlang, Bouncy Castle, or WolfSSL. We identified new side-channels triggered by incomplete protocol flows or TCP socket states.
For example, some F5 products would respond to a malformed ciphertext located in the ClientKeyExchange message with a TLS alert 40 (handshake failure) but allow connections to timeout if the decryption was successful. We could observe this behaviour only when sending incomplete TLS handshakes missing ChangeCipherSpec and Finished messages.
See our paper for more interesting results.
Release of TLS-Attacker 2.2
These new findings motivated us to implement the complete detection of Bleichenbacher attacks in our TLS-Attacker. Before our research, TLS-Attacker had implemented a basic Bleichenbacher attack evaluation with full TLS protocol flows. We extended this evaluation with shortened protocol flows with missing ChangeCipherSpec and Finished messages, and implemented an oracle detection based on TCP timeouts and duplicated TLS alerts. In addition, Robert (@ic0ns) added many fixes and merged features like replay attacks on 0-RTT in TLS 1.3.
You can find the newest version release here: https://github.com/RUB-NDS/TLS-Attacker/releases/tag/v2.2
$ java -jar Attacks.jar bleichenbacher -connect [host]:[port]
14:12:42 [main] CONSOLE attacks.impl.Attacker - A server is considered vulnerable to this attack if it responds differently to the test vectors.
14:12:42 [main] CONSOLE attacks.impl.Attacker - A server is considered secure if it always responds the same way.
14:12:49 [main] CONSOLE attacks.impl.Attacker - Found a difference in responses in the Complete TLS protocol flow with CCS and Finished messages.
14:12:49 [main] CONSOLE attacks.impl.Attacker - The server seems to respond with different record contents.
14:12:49 [main] INFO attacks.Main - Vulnerable:true
Related links
- What Is Hacking Tools
- Top Pentest Tools
- Nsa Hack Tools
- Android Hack Tools Github
- Free Pentest Tools For Windows
- Pentest Tools Apk
- What Is Hacking Tools
- Hacker Tools Free Download
- New Hack Tools
- What Are Hacking Tools
- Hacker Tools For Pc
- Pentest Tools Github
- Hacking Tools For Kali Linux
- Pentest Tools List
- Pentest Tools For Mac
- How To Install Pentest Tools In Ubuntu
- Hacks And Tools
- Pentest Tools Nmap
- Hacking Tools Name
- Pentest Tools For Android
- Pentest Tools Linux
- Hacker Techniques Tools And Incident Handling
- Hacking Tools Hardware
- New Hacker Tools
- Pentest Tools Bluekeep
- Hacker Tools 2019
- World No 1 Hacker Software
- Ethical Hacker Tools
- Termux Hacking Tools 2019
- Hacking Tools Download
- Pentest Tools Port Scanner
- New Hacker Tools
- Hacking Tools Github
- Top Pentest Tools
- Tools 4 Hack
- Hacker Tools 2019
- Hacker
- Hacker Tools
- Underground Hacker Sites
- Hacker Tools 2020
- Best Hacking Tools 2020
- Hack Tools Download
- Pentest Tools Linux
- Install Pentest Tools Ubuntu
- Hacking Tools Online
- Pentest Tools For Ubuntu
- Hack Website Online Tool
- Bluetooth Hacking Tools Kali
- Blackhat Hacker Tools
- Pentest Tools Bluekeep
- Beginner Hacker Tools
- Pentest Recon Tools
- Hackrf Tools
- Pentest Tools Online
- Blackhat Hacker Tools
- Free Pentest Tools For Windows
- Hack Website Online Tool
- Hacker Tools Apk Download
- Hacking Tools Usb
- Blackhat Hacker Tools
- Hacking Tools Name
- Computer Hacker
- Hacker Tools Free
- Hacking Tools Download
- Hacking Tools Pc
- Pentest Tools Github
- Hacker Tools Software
- Black Hat Hacker Tools
- Hacking Tools 2019
- Hacking Tools 2020
- Pentest Tools Android
- Nsa Hack Tools
- Pentest Tools Website Vulnerability
- Hack Tools
- Hacking Tools Free Download
- Github Hacking Tools
- What Is Hacking Tools
- Computer Hacker
- Pentest Tools
- Hacking Tools And Software
- Pentest Tools Find Subdomains
- Hacking Tools Name
- Pentest Tools Alternative
- Top Pentest Tools
- Hacker
- Hack Tools
- Pentest Tools Windows
- Black Hat Hacker Tools
- Hack Tools Github
- Hacking Tools For Beginners
- Hacking Tools Online
- Hackers Toolbox
- Hack Tools For Pc
- Hack Apps
- New Hack Tools
- Top Pentest Tools
- How To Make Hacking Tools
- Wifi Hacker Tools For Windows
- Pentest Tools Port Scanner
- Hacking Tools Name
- New Hacker Tools
- Hack Tools Github
- Pentest Tools Windows
- Hacking Tools Mac
- Hacker Tools For Ios
- Pentest Tools Apk
- Hacking Tools And Software
- Hacks And Tools
- Hack Tool Apk No Root
- Pentest Tools Url Fuzzer
- Tools Used For Hacking
- Hacker Tools Free
- Physical Pentest Tools
- Hack Tools For Ubuntu
- Hackers Toolbox
- Hacking Tools Kit
- Hack Tools Mac
- Hacker Tools Apk
- Hacker Tools List
- Hacker Tools Windows
- Install Pentest Tools Ubuntu
- Hacking Tools For Games
- Install Pentest Tools Ubuntu
- Wifi Hacker Tools For Windows
- Best Hacking Tools 2020
- Pentest Tools
- Hacking Tools
- Black Hat Hacker Tools
- Hack Tools Pc
- Hacking Tools For Games
- Hacker Tools Hardware
- Pentest Tools Download
- Best Hacking Tools 2020
- Hack App
- Pentest Box Tools Download
- Hacker Security Tools
- Nsa Hacker Tools
- Github Hacking Tools
No comments:
Post a Comment