Skip to content

Commit

Permalink
Merge pull request #870 from tlsfuzzer/bad-timing-tests
Browse files Browse the repository at this point in the history
Remove and update bad timing tests
  • Loading branch information
tomato42 committed Oct 23, 2023
2 parents 504b443 + 794b75a commit 423d47e
Show file tree
Hide file tree
Showing 5 changed files with 10 additions and 1,222 deletions.
13 changes: 5 additions & 8 deletions docs/source/timing-analysis.rst
Original file line number Diff line number Diff line change
Expand Up @@ -17,16 +17,13 @@ Bleichenbacher against RSA key exchange. You can test for it using the
<https://github.com/tomato42/tlsfuzzer/blob/master/scripts/test-bleichenbacher-timing-pregenerate.py>`_
script.

While we also include another script to do Bleichenbacher side-channel
testing
(`test-bleichenbacher-timing.py
<https://github.com/tomato42/tlsfuzzer/blob/master/scripts/test-bleichenbacher-timing.py>`_)
and one to test de-padding and verifying MAC values in CBC ciphertexts
While we also include script to do side-channel
testing for de-padding and verifying MAC values in CBC ciphertexts
(`test-lucky13.py
<https://github.com/tomato42/tlsfuzzer/blob/master/scripts/test-lucky13.py>`_,
the Lucky Thirteen attack), they do not use similarly robust approach
the Lucky Thirteen attack), it does not use similarly robust approach
as the ``test-bleichenbacher-timing-pregenerate.py`` script, which
may cause them to report false positives.
may cause it to report false positives.


Environment setup
Expand Down Expand Up @@ -352,7 +349,7 @@ Bleichenbacher test is extended to use the timing functionality:
.. code:: bash
PYTHONPATH=. python scripts/test-bleichenbacher-timing.py -i lo
PYTHONPATH=. python scripts/test-bleichenbacher-timing-pregenerate.py -i lo
By default, if ``dpkt`` dependency is available, the extraction will run right
after the timing packet capture.
Expand Down

0 comments on commit 423d47e

Please sign in to comment.