- Awesome SSL/TLS Hacks
Protocol Name | Release Date | Author | RFC |
---|---|---|---|
SSL 1.0 | N/A | Netscape | N/A |
SSL 2.0 | 1995 | Netscape | N/A |
SSL 3.0 | 1996 | Netscape | N/A |
TLS 1.0 | 1999-01 | IETF TLS Working Group | RFC 2246 |
TLS 1.1 | 2006-04 | IETF TLS Working Group | RFC 4346 |
TLS 1.2 | 2008-08 | IETF TLS Working Group | RFC 5246 |
TLS 1.3 | 2018-08 | IETF TLS Working Group | RFC 8446 |
Attack Name | Published Date | Affected Versions | Paper |
---|---|---|---|
Bleichenbacher | 2003-09 | SSL 3.0 | Klima, Vlastimil, Ondrej Pokorný, and Tomáš Rosa. "Attacking RSA-based sessions in SSL/TLS." International Workshop on Cryptographic Hardware and Embedded Systems. Springer, Berlin, Heidelberg, 2003. |
BEAST | 2011-05 | SSL 3.0 TLS 1.0 |
Rizzo, Juliano, and Thai Duong. "Here come the xor ninjas." In Ekoparty Security Conference, 2011. |
Lucky Thirteen | 2013-02 | SSL 3.0 TLS 1.0 TLS 1.1 TLS 1.2 |
Al Fardan, Nadhem J., and Kenneth G. Paterson. "Lucky thirteen: Breaking the TLS and DTLS record protocols." 2013 IEEE Symposium on Security and Privacy. IEEE, 2013. |
POODLE | 2014-10 | SSL 3.0 | Möller, Bodo, Thai Duong, and Krzysztof Kotowicz. "This POODLE bites: exploiting the SSL 3.0 fallback." Security Advisory (2014). |
DROWN | 2016-08 | SSL 2.0 | Aviram, Nimrod, et al. "DROWN: Breaking TLS Using SSLv2." 25th USENIX Security Symposium (USENIX Security 16). 2016. |
Attack Name | Published Date | Paper |
---|---|---|
CRIME | 2012-09 | Rizzo, Juliano, and Thai Duong. "The CRIME attack." Ekoparty Security Conference. 2012. |
TIME | 2013-03 | Be’ery, Tal, and Amichai Shulman. "A perfect CRIME? only TIME will tell." Black Hat Europe 2013 (2013). |
BREACH | 2013-03 | Prado, A., N. Harris, and Y. Gluck. "The BREACH Attack." (2013). |
Attack Name | Published Date | Paper |
---|---|---|
Adaptive chosen ciphertext attack | 1998-08 | Bleichenbacher, Daniel. "Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS# 1." Annual International Cryptology Conference. Springer, Berlin, Heidelberg, 1998. |
ROBOT | 2018-08 | Böck, Hanno, Juraj Somorovsky, and Craig Young. "Return Of Bleichenbacher’s Oracle Threat (ROBOT)." 27th USENIX Security Symposium (USENIX Security 18). 2018. |
Implementation | Original Release Date | Developed by | Written in |
---|---|---|---|
NSS | 1998-03 | Mozilla, AOL, Red Hat, Sun, Oracle, Google and others | C, Assembly |
OpenSSL | 1998-12 | OpenSSL Project | C, Assembly |
GnuTLS | 2000-03 | GnuTLS Project | C |
wolfSSL | 2006-02 | wolfSSL | C |
MbedTLS | 2009-01 | Arm | C |
BoringSSL | 2014-06 | C, C++, Go, Assembly | |
s2n | 2014-06 | Amazon | C |
LibreSSL | 2014-07 | OpenBSD Project | C, Assembly |
Rustls | 2016-08 | Joseph Birr-Pixton etc. | Rust |
Fizz | 2018-06 | C++ |
More information:
https://en.wikipedia.org/wiki/Comparison_of_TLS_implementations
Major Version | Original Release Date | Last Minor Version | Last Update Date |
---|---|---|---|
0.9.1 | 1998-12-23 | 0.9.1c | 1998-12-23 |
0.9.2 | 1999-03-22 | 0.9.2b | 1999-04-06 |
0.9.3 | 1999-05-25 | 0.9.3a | 1999-05-27 |
0.9.4 | 1999-08-09 | 0.9.4 | 1999-08-09 |
0.9.5 | 2000-02-28 | 0.9.5a | 2000-04-01 |
0.9.6 | 2000-09-24 | 0.9.6m | 2004-03-17 |
0.9.7 | 2002-12-31 | 0.9.7m | 2007-02-23 |
0.9.8 | 2005-07-05 | 0.9.8zh | 2015-12-03 |
1.0.0 | 2010-03-29 | 1.0.0t | 2015-12-03 |
1.0.1 | 2012-03-14 | 1.0.1u | 2016-09-22 |
1.0.2 | 2015-01-22 | 1.0.2u | 2019-12-20 |
1.1.0 | 2016-08-25 | 1.1.0l | 2019-09-10 |
1.1.1 LTS | 2018-09-11 | 1.1.1w | 2023-09-01 |
3.0.0 LTS | 2021-09-07 | 3.0.14 | 2024-09-03 |
3.1.0 | 2023-03-14 | 3.1.6 | 2024-09-03 |
3.2.0 | 2023-09-23 | 3.2.3 | 2024-09-03 |
3.3.0 | 2024-04-09 | 3.3.2 | 2024-09-03 |
3.4.0 | 2024-10-22 | 3.4.0 | 2024-10-22 |
More information:
https://en.wikipedia.org/wiki/OpenSSL
CVE ID | Disclosure Date | Type | Analysis |
---|---|---|---|
CVE-2019-3560 | 2019-02-26 | Server Side DoS | Facebook Fizz integer overflow vulnerability (CVE-2019-3560) |
CVE-2019-11924 | 2019-08-09 | Server Side Memory Leak | Facebook Fizz memory leak vulnerability (CVE-2019-11924) reproduce and analysis |
CVE-2020-25648 | 2020-05-28 | Server Side DoS | Mozilla NSS TLS 1.3 CCS Flood remote DoS Attack |
CVE-2021-3449 | 2021-03-25 | Server Side DoS | CVE-2021-3449 OpenSSL <1.1.1k DoS exploit |
tlsfuzzer
https://github.com/tomato42/tlsfuzzer
boofuzz
https://github.com/jtpereyda/boofuzz
Fuzzowski
https://github.com/nccgroup/fuzzowski
AFLNet
https://github.com/aflnet/aflnet
Python built-in TLS wrapper
https://docs.python.org/3.11/library/ssl.html
Go Package tls
https://golang.org/pkg/crypto/tls/
tlslite-ng: TLS implementation in pure python
https://github.com/tomato42/tlslite-ng
Scapy: the Python-based interactive packet manipulation program & library
https://github.com/secdev/scapy/
SSLyze: Fast and powerful SSL/TLS scanning library
https://github.com/nabla-c0d3/sslyze
testSSL: Testing TLS/SSL encryption
https://github.com/drwetter/testssl.sh
Qualys SSL Labs online tests
https://www.ssllabs.com/projects/index.html
The New Illustrated TLS Connection
https://tls13.ulfheim.net/
Stellastra TLS Cipher Suite DB
https://stellastra.com/cipher-suite
Abbreviation | Explanation |
---|---|
SSL | Secure Sockets Layer |
TLS | Transport Layer Security |
IETF | Internet Engineering Task Force |
POODLE | Padding Oracle On Downgrade Legacy Encryption |
DROWN | Decrypting RSA using Obsolete and Weakened eNcryption |
CRIME | Compression Ratio Info-leak Made Easy |
TIME | Timing Info-leak Made Easy |
BREACH | Browser Reconnaissance & Exfiltration via Adaptive Compression of Hypertext |
FREAK | Factoring RSA Export Keys |