spoofzu / DeepViolet

Tool for introspection of SSL\TLS sessions

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

DeepViolet Features/Improvement Grab Bag

spoofzu opened this issue · comments

These are Improvements(I) not targeted to a release; however, future assigned features will come from this area. Improvement numbers (e.g., I3) are provided for easy reference, not intended to communicate priority.

TLS 1.3
On the horizon. Need to investigate what changes are involved to support.

Include vulnerability analysis
Perform analysis for various attacks against TLS. This has been requested by a several people as being a valuable feature for them. Begin preparation to support vuln analysis. Need some basic framework to communicate user adjustable feature settings in a flexible way. After the framework is added I will see what time is remain to begin vuln analysis. It's anticipated to not be very useful at first.

Handshake Simulation
Simulate different web browsers and operating systems to assess impact to negotiated cipher suites.

STARTTLS Support
Support for email and other services.

Suppress HTTP headers
Consider the idea of turning this off in the reference implementation reports by default. The reason is that headers have sensitive information, cookie session ids, etc. Those using the tool may not consider this when taking screen shots and sharing on the Internet. Best approach is to default securely.

Improve scoring system
Consider moving to a scoring system similar to Qualys SSL Labs scoring and TLS Observatory. Today there is no analysis, with the exception of a strong, medium, and weak evaluation of cipher suites. This will make sense if we include vulnerability analysis to DV.

Include vulnerability analysis
Perform analysis for various attacks against TLS. This has been requested by a several people as being a valuable feature for them.

Certificate Transparency
Consider including CT. CT is useful to identify: misissued certificates, rogue CA's, and stolen certificates. Ref: certificate-transparency.org

Cloud Scale
Several attendees at Black Hat EU 2016 mentioned popular TLS/SSL scanning tools today are organized around scanning a single server. Cloud scale solutions do not exist.

JSON
Several attendees at Black Hat EU 2016 mentioned exporting reports in JSON would be a big compatibility benefit. Easy integration with Splunk was one example.

Misc
Check for the following supported features and include them in the UI: Forward Secrecy, OCSP Stapling, HSTS - HTTPS Strict Transport Security, HPKP - Public Key Pinning Extension for HTTP(see Qualys blog), Extended Validation, Warn Soon to Expire Certs, etc

RELATED DOCUMENTATION
Qualys TLS Threat Model
OWASP Transport Layer Protection Cheat Sheet
OpenJDK Inspirational Code

Maybe also interesting : Insecure renegotiation, interoperability issues, system clock mismatches, DH vulns, forward secrecy, protocol downgrade, client side TLS issues, client side TLS certificates evaluation
nice threat model : https://www.ssllabs.com/downloads/SSL_Threat_Model.png

Android SSL has it's own issues; wilcard certificates should be flagged as well as private IP certificates (19.168.x.x networks and so on) . OWASP website has some great info : https://www.owasp.org/index.php/Transport_Layer_Protection_Cheat_Sheet

Regarding Qualys ratings, Today there is no vulnerability analysis, with the exception of a strong, medium, and weak evaluation of cipher suites. A rating system will make sense if we include vulnerability analysis to DV. For now, I added this as improvement (#I5).

Threat Model, I think your point here is that we should use the threat model to drive the future features, good idea. I will include the link in the improvement list.

SSL Diagnostic Tool, not sure the point you make posting the tool other than a Java tool is available.

Certificate Transparency, I will add this to our list. I know there's a Java API available but even so I'm sure it would be significant work. A super cool idea!

Android SSL, once again today I don't perform any vulnerability analysis. I will include the cheat sheet link so we keep in the forefront of our consideration.
Thanks Sytze! Great ideas.

Thanks !