LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 02-09-2018, 11:44 AM   #1
danmartinj
Member
 
Registered: Oct 2009
Posts: 117

Rep: Reputation: 1
Understanding SSL/TLS On Protocols Other Than HTTPS


Hello,

My company wanted me to look at testing the security of a device we might be purchasing or at the very least working with in the near future. Anyhow, the specifications say it uses TLS with X.509 certificates. I setup the client IDE on a windows workstation and connected to the remote device and it did exchange certificates "according to IDE". Anyhow, I setup a kali linux VM in bridged mode on the local host and conducted a MITM attack which worked at all traffic between host workstation and remote device was captured.

Now looking through the captured file I see lots of UDP traffic between the client and remote device. With Wireshark I can see the data payload, I do not see any TLS negotiation "but maybe that was done when the certificates was originally setup", if I run strings on the pcap file I can see recognized words "like the name of the company that produced the products".

Long story short, I would like to prove without a doubt the traffic is not using SSL/TLS before I go crying wolf to my boss, however I do not understand it enough to be confident. Is there any other way I can prove TLS is not being used?

R
Joe
 
Old 02-09-2018, 12:56 PM   #2
sundialsvcs
LQ Guru
 
Registered: Feb 2004
Location: SE Tennessee, USA
Distribution: Gentoo, LFS
Posts: 10,659
Blog Entries: 4

Rep: Reputation: 3938Reputation: 3938Reputation: 3938Reputation: 3938Reputation: 3938Reputation: 3938Reputation: 3938Reputation: 3938Reputation: 3938Reputation: 3938Reputation: 3938
I think you have enough evidence to make your case now.

TLS/SSL would always begin with a secure negotiation of secret session-keys, initially protected by the public key information, an all of the traffic between the two machines would be incomprehensible, from beginning to end. If you're seeing plain text, stuff is not being enciphered. If you don't see the key-handshake, it's not even being attempted.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Alert (TA17-075A) HTTPS Interception Weakens TLS Security tronayne Linux - Security 1 03-17-2017 09:18 AM
LXer: HTTPS DROWN flaw: Security bods' hearts sink as tatty protocols wash away web crypto LXer Syndicated Linux News 0 03-02-2016 03:20 AM
Ssl/tls jmomlhm Linux - Software 3 09-08-2012 01:53 AM
php/HttpRequest/https: A TLS packet with unexpected length was received eantoranz Programming 1 05-30-2010 06:40 AM
SSL vs. TLS X11 Linux - Security 8 12-17-2002 03:39 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 12:42 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration