Skip to content

A collection of SSL/TLS security related resources (keep on updating...)

License

Notifications You must be signed in to change notification settings

jgj212/awesome-tls-hacks

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 

Repository files navigation

Awesome SSL/TLS Hacks

Contents

SSL/TLS Protocol History

Protocol Name Release Time Author RFC
SSL 1.0 N/A Netscape N/A
SSL 2.0 1995 Netscape N/A
SSL 3.0 1996 Netscape N/A
TLS 1.0 1999/01 IETF TLS Working Group RFC 2246
TLS 1.1 2006/04 IETF TLS Working Group RFC 4346
TLS 1.2 2008/08 IETF TLS Working Group RFC 5246
TLS 1.3 2018/08 IETF TLS Working Group RFC 8446

SSL/TLS Hacks

Cryptographic Issues

CBC Issues

Attack Name Published Time Affected Version Paper
Bleichenbacher 2003/09 SSL 3.0 Klima, Vlastimil, Ondrej Pokorný, and Tomáš Rosa. "Attacking RSA-based sessions in SSL/TLS." International Workshop on Cryptographic Hardware and Embedded Systems. Springer, Berlin, Heidelberg, 2003.
BEAST 2011/05 SSL 3.0, TLS 1.0 Rizzo, Juliano, and Thai Duong. "Here come the xor ninjas." In Ekoparty Security Conference, 2011.
Lucky Thirteen 2013/02 SSL 3.0, TLS 1.0/1.1/1.2 Al Fardan, Nadhem J., and Kenneth G. Paterson. "Lucky thirteen: Breaking the TLS and DTLS record protocols." 2013 IEEE Symposium on Security and Privacy. IEEE, 2013.
POODLE 2014/10 SSL 3.0 Möller, Bodo, Thai Duong, and Krzysztof Kotowicz. "This POODLE bites: exploiting the SSL 3.0 fallback." Security Advisory (2014).
DROWN 2016/08 SSL 2.0 Aviram, Nimrod, et al. "DROWN: Breaking TLS Using SSLv2." 25th USENIX Security Symposium (USENIX Security 16). 2016.

RC4 Issues

Attack Name Published Time Paper
Single-byte Bias & Double-byte Bias 2013/07 AlFardan, Nadhem, et al. "On the Security of RC4 in TLS." Presented as part of the 22nd USENIX Security Symposium (USENIX Security 13). 2013.
N/A 2015/03 Garman, Christina, Kenneth G. Paterson, and Thyla Van der Merwe. "Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS." 24th USENIX Security Symposium (USENIX Security 15). 2015.
Bar-Mitzva 2015/03 Mantin, Itsik. "Bar-Mitzva Attack: Breaking SSL with 13-Year Old RC4 Weakness." Black Hat Asia (2015).
N/A 2015/07 Vanhoef, Mathy, and Frank Piessens. "All your biases belong to us: Breaking RC4 in WPA-TKIP and TLS." 24th USENIX Security Symposium (USENIX Security 15). 2015.

Compression Issues

Attack Name Published Time Paper
CRIME 2012/09 Rizzo, Juliano, and Thai Duong. "The CRIME attack." Ekoparty Security Conference. 2012.
TIME 2013/03 Be’ery, Tal, and Amichai Shulman. "A perfect CRIME? only TIME will tell." Black Hat Europe 2013 (2013).
BREACH 2013/03 Prado, A., N. Harris, and Y. Gluck. "The BREACH Attack." (2013).

Implementation Issues

Attack Name Published Time Paper
OpenSSL Heartbleed 2014/04 Durumeric, Zakir, et al. "The matter of heartbleed." Proceedings of the 2014 conference on internet measurement conference. 2014.
Triple Handshake 2014/05 Bhargavan, Karthikeyan, et al. "Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS." 2014 IEEE Symposium on Security and Privacy. IEEE, 2014.
FREAK 2015/05 Beurdouche, Benjamin, et al. "A messy state of the union: Taming the composite state machines of TLS." 2015 IEEE Symposium on Security and Privacy. IEEE, 2015.
Logjam 2015/10 Adrian, David, et al. "Imperfect forward secrecy: How Diffie-Hellman fails in practice." Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 2015.
SLOTH 2016/02 Bhargavan, Karthikeyan, and Gaëtan Leurent. "Transcript Collision Attacks: Breaking Authentication in TLS, IKE, and SSH." In Network and Distributed System Security Symposium (NDSS). 2016.

Some Open Source Implementations of TLS

Implementation Developed by Written in
BoringSSL Google C, C++, Go, assembly
Fizz Facebook C++
GnuTLS GnuTLS Project C
LibreSSL OpenBSD Project C, assembly
MatrixSSL PeerSec Networks C
OpenSSL OpenSSL Project C, assembly
S2n Amazon C
wolfSSL wolfSSL C

Glossary

Abbreviation Explanation
SSL Secure Sockets Layer
TLS Transport Layer Security
IETF Internet Engineering Task Force
POODLE Padding Oracle On Downgrade Legacy Encryption
DROWN Decrypting RSA using Obsolete and Weakened eNcryption
CRIME Compression Ratio Info-leak Made Easy
TIME Timing Info-leak Made Easy
BREACH Browser Reconnaissance & Exfiltration via Adaptive Compression of Hypertext
FREAK Factoring RSA Export Keys

About

A collection of SSL/TLS security related resources (keep on updating...)

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published