mirror of
				https://github.com/drwetter/testssl.sh.git
				synced 2025-10-31 13:55:25 +01:00 
			
		
		
		
	Test for vulnerability to Bleichenbacher attack
This PR adds a test to check whether a server that supports ciphers suites that use RSA key transport (TLS_RSA) are vulnerable to Bleichenbacher attacks (see http://archiv.infsec.ethz.ch/education/fs08/secsem/bleichenbacher98.pdf).
This commit is contained in:
		 David Cooper
					David Cooper
				
			
				
					committed by
					
						 David Cooper
						David Cooper
					
				
			
			
				
	
			
			
			 David Cooper
						David Cooper
					
				
			
						parent
						
							7e62dc3192
						
					
				
				
					commit
					5de873f8bc
				
			| @@ -176,6 +176,8 @@ If the server provides no matching record in Subject Alternative Name (SAN) but | ||||
|  | ||||
| `-T, --ticketbleed`		Checks for Ticketbleed memory leakage in BigIP loadbalancers. | ||||
|  | ||||
| `-BB, --robot`		Checks for vulnerability to Bleichenbacher attacks. | ||||
|  | ||||
| `-R, --renegotiation`           Tests renegotiation vulnerabilities. Currently there's a check for "Secure Renegotiation" and for "Secure Client-Initiated Renegotiation". Please be aware that vulnerable servers to the latter can likely be DoSed very easily (HTTP). A check for "Insecure Client-Initiated Renegotiation" is not yet implemented. | ||||
|  | ||||
| `-C, --compression, --crime`    Checks for CRIME ("Compression Ratio Info-leak Made Easy") vulnerability in TLS. CRIME in SPDY is not yet being checked for. | ||||
|   | ||||
		Reference in New Issue
	
	Block a user