Skip to content
This repository has been archived by the owner on Dec 6, 2023. It is now read-only.

Releases: google/nogotofail

v1.2.0

11 Sep 00:45
Compare
Choose a tag to compare

Been too long since a version bump, so 1.2 is born.
Changes:

  • Bazle support for building the Android companion app
  • Precondition checks for handlers to avoid loading if required files
    aren't present.
  • Support for -x/--extrasdir to specify the location of required files
    (such as trusted-cert.pem, replace.png, etc).
  • Improved some documentation
  • Detection of weak ciphers in client connections
  • Detection of devices with the superfish CA installed
  • More support for parsing TLS records
  • Exciting bug fixes for some uncommon blocking conditions

v1.1.0

06 Feb 18:34
Compare
Choose a tag to compare

Changes since 1.0:

Improved connection throughput and reduced latency.

Add serverkeyreplace TLS/SSL attack to test that clients verify that the
server possesses the private key corresponding to the SSL certificate
that was presented to the client.

Data handlers that can modify the connection data are now run
probabilistically with the same probability as set with -p or by the
client. Passive detection handlers will still run on all connections.

Nogotofail clients will now receive vulnerability notifications when
HTTP is detected. To prevent spamming the Android client supports muting
on a per (application, vulnerability) level.

Removed the -a and -v nogotofail.mitm flags and made them default.
The -b and -q flags were added to bridge all connections from
non-clients and limit logging respectively.

Improved robustness of earlyCCS TLS/SSL attack.

Added a basic android test app under nogotofail/test/android with a
handful of vulnerabilities.

1.0.0 release

11 Nov 23:22
Compare
Choose a tag to compare

First!

Nothing major has changed since open sourcing, this is just to get a tagged release up and to push us toward a more standard workflow with versions and a dev branch.