Skip to content

Commit b4c28dc

Browse files
committed
Some minor adjustments for the upcoming release. Mainly renames
1 parent 174455a commit b4c28dc

File tree

8 files changed

+14
-16
lines changed

8 files changed

+14
-16
lines changed

Attacks/src/main/java/de/rub/nds/tlsattacker/attacks/config/AttackConfig.java

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ public boolean isSkipConnectionCheck() {
2727
return skipConnectionCheck;
2828
}
2929

30-
public void setSkipConnectionCheck(boolean withConnectiviyCheck) {
31-
this.skipConnectionCheck = withConnectiviyCheck;
30+
public void setSkipConnectionCheck(boolean skipConnectionCheck) {
31+
this.skipConnectionCheck = skipConnectionCheck;
3232
}
3333
}

Attacks/src/main/java/de/rub/nds/tlsattacker/attacks/impl/Attacker.java

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,7 @@ public Attacker(AttConfig config) {
3737
}
3838

3939
public void attack() {
40+
LOGGER.debug("Attackign with: " + this.getClass().getSimpleName());
4041
if (!config.isSkipConnectionCheck()) {
4142
if (!canConnect()) {
4243
LOGGER.log(LogLevel.CONSOLE_OUTPUT, "Cannot reach Server. Is the server online?");
@@ -47,6 +48,7 @@ public void attack() {
4748
}
4849

4950
public Boolean checkVulnerability() {
51+
LOGGER.debug("Checking: " + this.getClass().getSimpleName());
5052
if (!config.isSkipConnectionCheck()) {
5153
if (!canConnect()) {
5254
LOGGER.log(LogLevel.CONSOLE_OUTPUT, "Cannot reach Server. Is the server online?");

Attacks/src/main/java/de/rub/nds/tlsattacker/attacks/impl/BleichenbacherAttacker.java

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -98,8 +98,7 @@ private EqualityError isVulnerable(BleichenbacherWorkflowType bbWorkflowType, Li
9898
for (int i = 0; i < responseFingerprintList.size(); i++) {
9999
ResponseFingerprint fingerprint = responseFingerprintList.get(i);
100100
Pkcs1Vector pkcs1Vector = pkcs1Vectors.get(i);
101-
LOGGER.debug("\n PKCS#1 vector: {}\n Fingerprint: {}", pkcs1Vector.getDescription(),
102-
fingerprint.toString());
101+
LOGGER.debug("\n PKCS#1 vector: {}\n Fingerprint: {}", pkcs1Vector.getDescription(), fingerprint.toString());
103102
}
104103
ResponseFingerprint fingerprint = responseFingerprintList.get(0);
105104
for (int i = 1; i < responseFingerprintList.size(); i++) {

Attacks/src/main/java/de/rub/nds/tlsattacker/attacks/impl/PaddingOracleAttacker.java

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -159,7 +159,6 @@ private byte[] createPaddingBytes(int padding) {
159159

160160
@Override
161161
public Boolean isVulnerable() {
162-
LOGGER.log(LogLevel.CONSOLE_OUTPUT, "Testing for PaddingOracle...");
163162
int macSize = AlgorithmResolver.getMacAlgorithm(tlsConfig.getDefaultSelectedProtocolVersion(),
164163
tlsConfig.getDefaultSelectedCipherSuite()).getSize();
165164
int blockSize = AlgorithmResolver.getCipher(tlsConfig.getDefaultSelectedCipherSuite())
@@ -194,8 +193,8 @@ public Boolean isVulnerable() {
194193

195194
}
196195
LOGGER.log(LogLevel.CONSOLE_OUTPUT,
197-
"A server is considered vulnerable to this attack if he responds differently to these testvectors.");
198-
LOGGER.log(LogLevel.CONSOLE_OUTPUT, "A server is considered not vulnerable if he always responds the same way.");
196+
"A server is considered vulnerable to this attack if it responds differently to the test vectors.");
197+
LOGGER.log(LogLevel.CONSOLE_OUTPUT, "A server is considered secure if it always responds the same way.");
199198

200199
for (List<ResponseFingerprint> list : responseMap.values()) {
201200
ResponseFingerprint fingerprint = list.get(0);

Attacks/src/main/java/de/rub/nds/tlsattacker/attacks/impl/PskBruteForcerAttackClient.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -131,7 +131,7 @@ private void executeProtocolFlowToClient() {
131131
try {
132132
decryptor.decrypt(trace.getReceivingActions().get(1).getReceivedRecords().get(2));
133133
} catch (CryptoException E) {
134-
LOGGER.info("neeeeeeeeeeeeein");
134+
E.printStackTrace();
135135
}
136136

137137
} catch (NoSuchAlgorithmException ex) {

Attacks/src/main/java/de/rub/nds/tlsattacker/attacks/impl/PskBruteForcerAttackServer.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -111,7 +111,7 @@ public Boolean isVulnerable() {
111111
LOGGER.log(LogLevel.CONSOLE_OUTPUT, "Vulnerable (probably), Server uses PSK");
112112
return true;
113113
} else {
114-
LOGGER.log(LogLevel.CONSOLE_OUTPUT, "Not Vulnerable (probably), Server not uses PSK");
114+
LOGGER.log(LogLevel.CONSOLE_OUTPUT, "Not Vulnerable (probably), Server does not use PSK");
115115
return false;
116116
}
117117
}

Attacks/src/main/java/de/rub/nds/tlsattacker/attacks/impl/WinshockAttacker.java

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,8 +25,6 @@
2525
import de.rub.nds.tlsattacker.core.workflow.WorkflowTraceUtil;
2626
import de.rub.nds.tlsattacker.core.workflow.factory.WorkflowConfigurationFactory;
2727
import de.rub.nds.tlsattacker.core.workflow.factory.WorkflowTraceType;
28-
import org.apache.logging.log4j.LogManager;
29-
import org.apache.logging.log4j.Logger;
3028

3129
/**
3230
* Allows to execute the Winshock attack, by setting the CertificateVerify

TLS-Core/src/main/java/de/rub/nds/tlsattacker/core/constants/FiniteFieldGroups.java

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,11 +13,11 @@
1313
* @author Robert Merget <robert.merget@rub.de>
1414
*/
1515
public enum FiniteFieldGroups {
16-
ffdhe2048(new byte[] { 01, 00 }),
17-
ffdhe3072(new byte[] { 01, 01 }),
18-
ffdhe4096(new byte[] { 01, 02 }),
19-
ffdhe6144(new byte[] { 01, 03 }),
20-
ffdhe8192(new byte[] { 01, 04 });
16+
FFDHE2048(new byte[] { 01, 00 }),
17+
FFDHE3072(new byte[] { 01, 01 }),
18+
FFDHE4096(new byte[] { 01, 02 }),
19+
FFDHE6144(new byte[] { 01, 03 }),
20+
FFDHE8192(new byte[] { 01, 04 });
2121

2222
private final byte[] value;
2323

0 commit comments

Comments
 (0)