Skip to content
This repository has been archived by the owner on Dec 6, 2023. It is now read-only.

Bump version to 1.1.0 #61

Merged
merged 1 commit into from
Feb 6, 2015
Merged

Bump version to 1.1.0 #61

merged 1 commit into from
Feb 6, 2015

Conversation

chadbrubaker
Copy link
Contributor

Changes since 1.0:

Add serverkeyreplace TLS/SSL attack to test that clients verify that the
server possesses the private key corresponding to the SSL certificate
that was presented to the client.

Data handlers that can modify the connection data are now run
probabilistically with the same probability as set with -p or by the
client. Passive detection handlers will still run on all connections.

Nogotofail clients will now receive vulnerability notifications when
HTTP is detected. To prevent spamming the Android client supports muting
on a per (application, vulnerability) level.

Removed the -a and -v nogotofail.mitm flags and made them default.
The -b and -q flags were added to bridge all connections from
non-clients and limit logging respectively.

Improved connection throughput and make calls to the nogotofail clients
non-blocking.

Improved robustness of earlyCCS TLS/SSL attack.

Added a basic android test app under nogotofail/test/android with a
handful of vulnerabilities.

@klyubin
Copy link
Contributor

klyubin commented Feb 6, 2015

LGTM. I'd place "Improved stability and throughput. Reduced latency." at the very top. You can probably drop "nogotofail clients non-blocking" -- it's too much of a low-level detail for such a high-level summary.

Changes since 1.0:

Improved connection throughput and reduced latency.

Add serverkeyreplace TLS/SSL attack to test that clients verify that the
server possesses the private key corresponding to the SSL certificate
that was presented to the client.

Data handlers that can modify the connection data are now run
probabilistically with the same probability as set with -p or by the
client. Passive detection handlers will still run on all connections.

Nogotofail clients will now receive vulnerability notifications when
HTTP is detected. To prevent spamming the Android client supports muting
on a per (application, vulnerability) level.

Removed the -a and -v nogotofail.mitm flags and made them default.
The -b and -q flags were added to bridge all connections from
non-clients and limit logging respectively.

Improved robustness of earlyCCS TLS/SSL attack.

Added a basic android test app under nogotofail/test/android with a
handful of vulnerabilities.
chadbrubaker added a commit that referenced this pull request Feb 6, 2015
@chadbrubaker chadbrubaker merged commit 378756a into dev Feb 6, 2015
@chadbrubaker chadbrubaker deleted the v1.1.0 branch February 6, 2015 18:35
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants