Some notes
about how TLS v1.2
(Transport Layer Security) works.
The goal explain what is going on in a network traffic dump,
the role of the different TLS extensions,
the impact of the different cipher suites on security, etc.
It includes several diagrams and many references.
The Diffie-Hellman (DH) key exchange (and variants thereof) is widely used
in many protocols
(such as TLS, SSH, IKE (IPSec), Signal, etc.)
to bootstrap some symmetric key material
which may then be used to secure communication channel between two parties.
This introduction
focuses on the different ways the DH key exchange
is used in practice
in several protocols (especially TLS)
and the impact of these different approaches on the security.
This is intended as a prelude for the upcoming next episodes
about how TLS works.
Manually inspecting the content of a French COVID-19 vaccination certificate QR code.
The main intent is to show with a concrete example
which data is actually included in the certificate.
Cross-origin/same-site request forgery to RCE in chromedriver
Published:
I found a cross-origin/same-site request forgery vulnerability
in chromedriver.
It was rejected (won't fix) because it is only
possible to trigger this from the cross-origin/same-site and not cross-site.
In practice, it means it is really only possible to trigger this from another
localhost-bound web application.
A Cross-Site Request Forgery (CSRF) vulnerability I found in
GeckoDriver which could be used to execute arbitrary shell commands.
CVE-2020-15660
has been assigned to this vulnerability.
This was fixed by GeckoDriver v0.27.0
in 2020-07-27.
This is bug #1648964.
I found that pupnp was vulnerable to DNS rebinding attacks.
npupnp, a fork a pupnp, was impacted as well.
This is demonstrated using Gerbera a UPnP MediaServer.
A quick summary about how DNS rebinding attacks work.
The main motivation for this post is to have
a diagram to show when explaining DNS-rebinding attacks.