We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
A side channel, so maybe not. Info https://hackaday.com/2020/09/11/security-this-week-racoons-in-my-tls-bypassing-frontends-and-obscurity/
The text was updated successfully, but these errors were encountered:
I haven't found the time to read https://raccoon-attack.com/ completely yet (hello to Paderborn and Bochum at least).
The exceptions might be worth to look into, maybe the reuse of ephemeral and non-ephemeral keys could be detected. But that's only an assumption.
Have you read about a PoC for detection? Wondering how SSLlabs is doing that.
Sorry, something went wrong.
I came here looking for such a thing ;)
No branches or pull requests
A side channel, so maybe not.
Info
https://hackaday.com/2020/09/11/security-this-week-racoons-in-my-tls-bypassing-frontends-and-obscurity/
The text was updated successfully, but these errors were encountered: