Skip to content

Simulating a DoS attack - Client SSL Renegotiation - mod_ssl 2.4.37 & openssl 1.1.1

Notifications You must be signed in to change notification settings

nanobug8/SIMPY_DoS

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

SIMPY_DoS

Simulating a DoS attack - Client SSL Renegotiation - mod_ssl 2.4.37 & openssl 1.1.1

CVE 2019-0190

Requirements: SimPy version 2.3.1

This code simulates with SimPy parallel SSLConnection and many Renegotiation for each SSLConnection.

Variables: time >> represents the CPU time of full handshake. (You can observe, capture, and test your CPU time for packets involve in full handsake process) R >> Renegotiations N >> SSLConnections in parallel

Varying this values, you can see differents results on the simulations. Note that time of CPU depends on Cypher Algorithm and the CPU itself

You can check https://vincent.bernat.ch/en/blog/2011-ssl-dos-mitigation (https://github.com/vincentbernat/ssl-dos) to get more detailed info for your simulation.

About

Simulating a DoS attack - Client SSL Renegotiation - mod_ssl 2.4.37 & openssl 1.1.1

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages