Releases: tls-attacker/TLS-Attacker
TLS-Attacker 3.1
Bug fix released.
-temporary fix of montgomery curve unsupported operation exception
-fix for explicit sni setting
TLS-Attacker 3.0
DTLS 1.0 and DTLS 1.2 support (Thanks to Paul Fiterau Brostean)
TLS ECCPWD Support (Dragonfly) (Thanks to Alexander Freiherr von Buddenbrock)
Integration of new EC Library:
-TLS-Attacker now supports computations on invalid curve points out of the box
-All non ECDSA code is now more streamlined
All standardized elliptic curves are now functional (ECDSA excluded)
Support for CCM_8 ciphersuites
Cleaner Client API (ConnectionDelegate)
Removed HostnameDelegate
Removed a lot of legacy code which was not used anymore
Fixed a bug which prevented Camellia GCM to not work properly
Server DHE PublicKey now gets correctly computed at runtime
ServerTcpTransportHandler now correctly handles Timeouts
Fixed selection of parameters server side on various locations
KeyShareExtension in Draft versions now works better
Fixed an off by one error in nearly empty WorkflowTraces when look at them with the WorkflowTraceUtil
Unicode Domains are now supported
SNI is now handled better by the client delegate
RSA PMS ProtocolVersion is now a modifiableVariable and can be modified more easily
WorkflowExecutor now throws an exception if BouncyCastle is not loaded at runtime
Fixed a bug in the parsing of long server hello lenght fields
Fixed a bug in the extraction of Fingerprints in the BleichenbacherAttack
Lots of smaller fixes
TLS-Attacker 2.9
-various regressions fixted (mostly STARTTLS)
-bug fixes
TLS-Attacker 2.8
-Bug fix in Attacks.jar
-TLS 1.3 fix
-Attribution preparations
TLS-Attacker 2.7
TLS-Attacker 2.6
-Better support for parallel executions
-GOST support
-Various Bugfixes
-A lot of refactoring
-TLS 1.3 (RFC) support
-Automatic certificate selection (server)
-Better PaddingOracle detection / more sophisticated strategies
-Better logging
TLS-Attacker 2.5
- Null Ciphers
- Anon Ciphers
- Bugfixes
- EarlyCCS improvements
- STARTTLS
- pretty XML
TLS-Attacker 2.4
- TLS-PSK for client and server
- DROWN attack test
- TLS forensic (for reparsing packets)
- Recording transport handler (the protocol flow can be recorded and resent again)
- bug fixes
TLS-Attacker 2.3
- Readded Attack Code
- Added Config Display Filter
- Fixed bugs in Client Authentication
- Minor Tweaks
TLS-Attacker 2.2
- 0-RTT replay attack examples
- Better padding oracle detection checks (CBC and Bleichenbacher)
- Small bug fixes found during fuzzing