mirror of
https://github.com/drwetter/testssl.sh.git
synced 2025-12-15 03:32:05 +01:00
Test for vulnerability to Bleichenbacher attack
This PR adds a test to check whether a server that supports ciphers suites that use RSA key transport (TLS_RSA) are vulnerable to Bleichenbacher attacks (see http://archiv.infsec.ethz.ch/education/fs08/secsem/bleichenbacher98.pdf).
This commit is contained in:
committed by
David Cooper
parent
7e62dc3192
commit
5de873f8bc
@@ -260,6 +260,9 @@ Security headers (X\-Frame\-Options, X\-XSS\-Protection, \.\.\., CSP headers)
|
||||
\fB\-T, \-\-ticketbleed\fR Checks for Ticketbleed memory leakage in BigIP loadbalancers\.
|
||||
.
|
||||
.P
|
||||
\fB\-BB, \-\-robot\fR Checks for vulnerability to Bleichenbacher attacks\.
|
||||
.
|
||||
.P
|
||||
\fB\-R, \-\-renegotiation\fR Tests renegotiation vulnerabilities\. Currently there\'s a check for "Secure Renegotiation" and for "Secure Client\-Initiated Renegotiation"\. Please be aware that vulnerable servers to the latter can likely be DoSed very easily (HTTP)\. A check for "Insecure Client\-Initiated Renegotiation" is not yet implemented\.
|
||||
.
|
||||
.P
|
||||
|
||||
Reference in New Issue
Block a user