Skip to content

Releases: tls-attacker/TLS-Attacker

TLS-Attacker v6.1.4

30 Sep 16:01
Compare
Choose a tag to compare

Changes

  • Implemented new X.509-Attacker dependency enabling TLS-Attacker to generate arbitrary certificates dynamically at runtime
  • Replaced Bouncycastle certificate parsing with X.509-Attacker parsers
  • First constants of TLS-Attacker have been moved to Protocol-Attacker to achieve a unified interface for other protocols
  • Added cache for KeyShareCalculator to speed up public key compuations
  • Fixed bug in RSA PSS salt generation
  • Fixed bug in HTTP header parsing
  • Fixed key handling bug in 0-RTT handshakes
  • Fixed incorrect RSA PKCS#1v1.5 padding structure for RSA moduli that are not divisible by 8
  • Fixed NullPointerExceptions caused by improper extension handling

TLS-Attacker v5.3.0

07 Jul 08:43
Compare
Choose a tag to compare

Changes

  • Added support for chinese SM cipher suites in TLS 1.3
  • Fixed encryption issue when using client authentication in TLS 1.3
  • Fixed a bug for reexecuted WorkflowTraces caused by manipulated LayerConfiguration
  • Fixed a bug which caused only the first pre-defined DTLS fragment to be used by the DtlsFragmentLayer

TLS-Attacker v5.2.1

15 Jun 12:50
Compare
Choose a tag to compare

Starting with this release, we attribute the Technology Innovation Institute (@tiiuae) in the license header to reflect the extensive contributions made by its researchers.

Changes

  • Set default WorkflowTraceType to DYNAMIC_HANDSHAKE so the user does not have to specify the negotiated key exchange algorithm before execution
  • Added flag for automatic extension selection in ServerHello and EncryptedExtensions (defaults to off for backwards compatibility)
  • Fixed NullPointerExceptions for pseudo cipher suites (e.g SCSV) enforced in Server Hello

TLS-Attacker v5.1.6

17 Mar 08:35
Compare
Choose a tag to compare

The new version of TLS-Attacker introduces a layer system, which better separates protocols and parts of protocols in the code. This also facilitates the implementation of new application protocols besides HTTP. The user is now also able to define custom protocol layer stacks. Large parts of TLS-Attacker have been refactored for this purpose.

Changes

  • Introduced layer system with clear separation of fragment layer, record layer, message layer and HTTP layer
  • Refactored parsing to use separate streams for sub structures of messages, such as extensions within handshake messages
  • Added support for encrypted Client Hello messages
  • Fixed inconsistent use of generic classes which caused issues for some IDEs
  • Unified client port reuse across TCP and UDP transport handlers

TLS-Attacker v4.0.2

16 Nov 13:39
Compare
Choose a tag to compare

What's Changed

  • Adjusted artifact ID to match guidelines
  • Implemented EXPORT cipher suite handling for server
  • Implemented Signature Algorithm Cert extension
  • Improved certificate selection for server
  • Fixed EOF detection in transport handler
  • Fixed sockets not closed correctly for WorkflowExecutionExceptions
  • Fixed SSL2 messages missing in output of ReceiveAction
  • Integrated Bill of Materials (BOM)
  • Bumped dependency versions

Full Changelog: 3.8.1...v4.0.2

TLS-Attacker 3.8.1

18 Jul 15:35
a680d64
Compare
Choose a tag to compare

Changes:

  • Fixed Null Pointer Exception in EarlyCCSAction
  • Fixed RuntimeException in ECDHEClientKeyExchangeMessage when FFDHE group was negotiated
  • Fixed ARIA_256_GCM cipher suites
  • Fixed CertificateTypeExtension handling
  • Fixed wrong interpretation of FFDHE key share byte values (thanks @SidolFreiburg)

TLS-Attacker 3.8.0

08 Jun 20:49
74c7dd7
Compare
Choose a tag to compare

Added new Smart Chooser Classes for smarter record size limits
Added TLS-Attacker proxy module prototype, which allows to use TLS-Attacker as SslSockets
Fixed a ClassCastException in the CertificateStatusParser
Removed the Attacks module. Scanning capabilities were move to https://github.com/tls-attacker/TLS-Scanner while exploits are currently reworked to be more user friendly within their own module
Fixed a Bug which caused TLS-Attacker to be unable to parse incoming records with more than ~127 bytes of padding in CBC mode
Fixed Timing Attacks TransportHandler.
Introduced overwriteable Callbacks before and after handshake execution
Introduced FFDH Named Groups
Better SessionID / SessionTicket support
TLS-Attacker is now running on Java 11
More control over DTLS fragment layer in workflowTrace
Better handling of DTLS retransmissions
TLS-Attacker can now also send DTLS retransmissions
Custom TLS PRF implementation (no longer relying on BC)
Introduced new "IGNORE_UNEXPECTED_KEY_UPDATE_MESSAGES" and "IGNORE_UNEXPECTED_APP_DATA" Action options
Introduced new actions: ChangeReadEpoch, ChangeReadSequenceNumber, ChangeWriteEpoch, ChangeWriteSequenceNumber, SendMessagesFromLastFlight and SendRecordsFromLastFlight
Introduced KeyUpdates for TLS 1.3
Removed TLS 1.3 draft code
Deleted Forensic Module
Fixed a bug which caused invalid nonces for ChachaPoly in DTLS
Added warnings when workflowtraces are loaded (manually) but they still contain "originalValues" from previous executions
Introduced RSA-SKE message (RSA-Export)
Fixed Illegal Reflective Access Bug (PseudoRandomFunction)
Reworked certificate generation scripts
Minor fixes and code improvements

TLS-Attacker 3.2b

18 Dec 12:48
Compare
Choose a tag to compare

TLS-Attacker 3.2 with log4shell fix

TLS-Attacker 3.7.2

17 Dec 16:36
9f686c1
Compare
Choose a tag to compare

Fixes log4shell

TLS-Attacker 3.7.1

16 Jun 11:33
Compare
Choose a tag to compare

Fixed certificates