[langsec-discuss] Breaking X.509 cert validation with frankencerts
Meredith L. Patterson
clonearmy at gmail.com
Sun Apr 6 18:26:41 UTC 2014
Oh, that's clever. I'd been headed down the symbolic-execution path for
X.509 parse tree differentials, but GA fuzzing bred from real-world certs
and synthetic cert parts is both hilarious and clearly effective. I wonder
if we should invite them for an afternoon presentation, if they'll be
around in time.
On Sun, Apr 6, 2014 at 8:14 PM, Will Sargent <will.sargent at gmail.com> wrote:
> It turns out that X.509 is sufficiently complex that you can fuzz
> certificates by stitching together seeds into a "frankencert" and use them
> to find holes in TLS implementations. They find 208 differences in between
> implementations, including some nasty ones in MatrixSSL and GnuTLS.
> langsec-discuss mailing list
> langsec-discuss at mail.langsec.org
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the langsec-discuss