Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/2831211.2831212guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

FLEXTLS: a tool for testing TLS implementations

Published: 10 August 2015 Publication History

Abstract

We present FLEXTLS, a tool for rapidly prototyping and testing implementations of the Transport Layer Security (TLS) protocol. FLEXTLS is built upon MITLS, a verified implementation of TLS, and hence protocol scenarios written in FLEXTLS can benefit from robust libraries for messaging and cryptography. Conversely, attack scripts in FLEXTLS can be used to evaluate and communicate the impact of new protocol vulnerabilities.
FLEXTLS was used to discover recent attacks on TLS implementations, such as SKIP and FREAK, as well as to program the first proof-of-concept demos for FREAK and Logjam. It is also being used to experiment with proposed designs of the upcoming version 1.3 of TLS. Our goal is to create a common platform where protocol analysts and practitioners can easily test TLS implementations and share protocol designs, attacks or proofs.

References

[1]
D. Adrian, K. Bhargavan, Z. Durumeric, P. Gaudry, M. Green, J.A. Halderman, N. Heninger, D. Springall, E. Thomé, L. Valenta, B. VanderSloot, E. Wustrow, S. Zanella-Béguelin, and P. Zimmermann. Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice. https://weakdh.org, May 2015.
[2]
B. Beurdouche, K. Bhargavan, A. Delignat-Lavaud, C. Fournet, M. Kohlweiss, A. Pironti, P-Y Strub, and J-K Zinzindohoué. A messy state of the union: Taming the composite state machines of TLS. In IEEE S&P (Oakland), 2015.
[3]
K. Bhargavan, A. Delignat-Lavaud, C. Fournet, A. Pironti, and P-Y. Strub. Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS. In IEEE S&P (Oakland), 2014.
[4]
K. Bhargavan, A. Delignat-Lavaud, A. Pironti, A. Langley, and M. Ray. Transport Layer Security (TLS) Session Hash and Extended Master Secret Extension. IETF Internet Draft, 2014.
[5]
K. Bhargavan, C. Fournet, M. Kohlweiss, A. Pironti, and P-Y Strub. Implementing TLS with verified cryptographic security. In IEEE S&P (Oakland), 2013.
[6]
K. Bhargavan, C. Fournet, M. Kohlweiss, A. Pironti, P-Y Strub, and S. Zanella-Béguelin. Proving the TLS handshake secure (as it is). In CRYPTO, 2014.
[7]
T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.2. IETF RFC 5246, 2008.
[8]
D.K. Gillmor. Negotiated finite field Diffie-Hellman ephemeral parameters for TLS. IETF Internet Draft, May 2015.
[9]
M. Kikuchi. How I discovered CCS Injection Vulnerability (CVE-2014-0224), June 2014.
[10]
H. Krawczyk, K.G. Paterson, and H. Wee. On the security of the TLS protocol: A systematic analysis. In CRYPTO, 2013.
[11]
A. Langley, N. Modadugu, and B. Moeller. Transport layer security (TLS) false start. IETF Internet Draft, 2015.
[12]
E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.3. Internet Draft, 2015.

Cited By

View all
  • (2024)SoK: Automated Software Testing for TLS LibrariesProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670871(1-12)Online publication date: 30-Jul-2024
  • (2019)EverparseProceedings of the 28th USENIX Conference on Security Symposium10.5555/3361338.3361440(1465-1482)Online publication date: 14-Aug-2019
  • (2019)Testing TLS using planning-based combinatorial methods and execution frameworkSoftware Quality Journal10.1007/s11219-018-9412-z27:2(703-729)Online publication date: 1-Jun-2019
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
WOOT'15: Proceedings of the 9th USENIX Conference on Offensive Technologies
August 2015
18 pages

Publisher

USENIX Association

United States

Publication History

Published: 10 August 2015

Author Tags

  1. attacks
  2. cryptographic protocols
  3. protocol testing
  4. transport layer security

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 12 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)SoK: Automated Software Testing for TLS LibrariesProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3670871(1-12)Online publication date: 30-Jul-2024
  • (2019)EverparseProceedings of the 28th USENIX Conference on Security Symposium10.5555/3361338.3361440(1465-1482)Online publication date: 14-Aug-2019
  • (2019)Testing TLS using planning-based combinatorial methods and execution frameworkSoftware Quality Journal10.1007/s11219-018-9412-z27:2(703-729)Online publication date: 1-Jun-2019
  • (2016)Systematic Fuzzing and Testing of TLS LibrariesProceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security10.1145/2976749.2978411(1492-1504)Online publication date: 24-Oct-2016

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media