Penetration Testing mailing list archives
Re: TLS implementation test
From: Julien <prospi () gmail com>
Date: Sat, 21 Oct 2006 14:05:13 +0200
Hi ,
Also, does your implementation do perform correct client/server certificate validation?
Yes, it's implemented...
If someone adds or removes encrypted data, or modifies it in transit, will your implementation detect it?
I don't don't know for the moment. By reading the design docs I think it have to detect this kind of "attack". Thanks all 2006/10/21, Tim <tim-pentest () sentinelchicken org>:
> I have to test TLS implementation on our product. Ths goal is not to > discover a threat in TLS but to find threat in our implementation. > In my test I'll do : > - MitM > - Replay attack (I think it will not be possible because of TLS timestamps ) > - Dos > - Sniffing (to check that all communications are encrypted) > > What other tests could be done ? Well, there's always modification. If someone adds or removes encrypted data, or modifies it in transit, will your implementation detect it? This is particularly important when using stream cipher based ciphersuites. Also, does your implementation do perform correct client/server certificate validation? It's a pretty complex process, and other major implementations have had bugs in the past in this area. good luck, tim
------------------------------------------------------------------------ This List Sponsored by: Cenzic Need to secure your web apps? Cenzic Hailstorm finds vulnerabilities fast. Click the link to buy it, try it or download Hailstorm for FREE. http://www.cenzic.com/products_services/download_hailstorm.php?camp=701600000008bOW ------------------------------------------------------------------------
Current thread:
- TLS implementation test Julien (Oct 20)
- Re: TLS implementation test Kurt Seifried (Oct 21)
- Re: TLS implementation test Tim (Oct 21)
- Re: TLS implementation test Julien (Oct 21)
- Re: TLS implementation test Julien (Oct 24)
- Re: TLS implementation test Ariel Waissbein (Oct 24)