A modern solution for identifying, monitoring, and selecting configurations for SSL/TLS deployment

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

1 Scopus citations

Abstract

Some of the well-known vulnerabilities like DROWN, POODLE, and Heartbleed affect a subset of all possible configurations of protocols and cipher-suites in SSL/TLS protocol. Recently, new vulnerabilities are also frequently discovered and could be used to mount attacks on systems whose configurations are not updated in time or were misconfigured from the start. Thus, we provide an overview of the landscape of vulnerabilities relating to SSL/TLS protocol versions with estimated risk levels. Selecting the best configuration for a given use-case is a time-consuming task and testing a given configuration of a server for all known vulnerabilities is also difficult. Thus, there is a great motivation to create a new tool that abstracts the tedious parts of this process. Our new software solution can automatically scan and rate the configuration of servers and help in selecting suitable ones. The goal is to simplify testing and evaluation of server-side configurations of SSL/TLS and ciphersuites for the community and thus the software is released as an open source.

Original languageBritish English
Title of host publicationStudies in Computational Intelligence
PublisherSpringer Verlag
Pages78-88
Number of pages11
DOIs
StatePublished - 2019

Publication series

NameStudies in Computational Intelligence
Volume788
ISSN (Print)1860-949X

Keywords

  • BEAST attack
  • CRIME and BREACH attack
  • Heartbleed attack
  • Privacy
  • Renegotiaition attack
  • Security
  • SSL
  • TLS
  • TLS handshake

Fingerprint

Dive into the research topics of 'A modern solution for identifying, monitoring, and selecting configurations for SSL/TLS deployment'. Together they form a unique fingerprint.

Cite this