<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Testing for POODLE_TLS Manually</title>
	<atom:link href="http://www.exploresecurity.com/testing-for-poodle_tls-manually/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.exploresecurity.com/testing-for-poodle_tls-manually/</link>
	<description>IT security tools, techniques and commentary</description>
	<lastBuildDate>Sun, 07 Sep 2025 03:12:25 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.6.1</generator>
	<item>
		<title>By: Jerome</title>
		<link>http://www.exploresecurity.com/testing-for-poodle_tls-manually/#comment-21886</link>
		<dc:creator>Jerome</dc:creator>
		<pubDate>Tue, 17 Oct 2017 10:54:02 +0000</pubDate>
		<guid isPermaLink="false">http://www.exploresecurity.com/?p=362#comment-21886</guid>
		<description><![CDATA[Hi - as the output says &quot;no definitive result&quot; and this is covered by both the message and the last line of this article...&quot;one of the reasons for this is that the server does not support any of the small number of cipher suites offered by &lt;em&gt;tlslite&lt;/em&gt;&quot;. In other words the &lt;em&gt;tlslite&lt;/em&gt; library only supports a handful of simple cipher suites and if the server you&#039;re testing doesn&#039;t support any of them, the connection fails. You can check this by comparing the cipher suites offered in the Client Hello issued by the tool with those known to be supported by the server.]]></description>
		<content:encoded><![CDATA[<p>Hi &#8211; as the output says &#8220;no definitive result&#8221; and this is covered by both the message and the last line of this article&#8230;&#8221;one of the reasons for this is that the server does not support any of the small number of cipher suites offered by <em>tlslite</em>&#8220;. In other words the <em>tlslite</em> library only supports a handful of simple cipher suites and if the server you&#8217;re testing doesn&#8217;t support any of them, the connection fails. You can check this by comparing the cipher suites offered in the Client Hello issued by the tool with those known to be supported by the server.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: jhone</title>
		<link>http://www.exploresecurity.com/testing-for-poodle_tls-manually/#comment-21880</link>
		<dc:creator>jhone</dc:creator>
		<pubDate>Tue, 17 Oct 2017 07:23:05 +0000</pubDate>
		<guid isPermaLink="false">http://www.exploresecurity.com/?p=362#comment-21880</guid>
		<description><![CDATA[i have made the require changes but this was showing the error i have posted]]></description>
		<content:encoded><![CDATA[<p>i have made the require changes but this was showing the error i have posted</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: jhone</title>
		<link>http://www.exploresecurity.com/testing-for-poodle_tls-manually/#comment-21879</link>
		<dc:creator>jhone</dc:creator>
		<pubDate>Tue, 17 Oct 2017 07:21:59 +0000</pubDate>
		<guid isPermaLink="false">http://www.exploresecurity.com/?p=362#comment-21879</guid>
		<description><![CDATA[Attempting a normal TLS connection
- this failed with the error 
Attempting a POODLE-style TLS connection
- this failed with the same error
Check the hostname, or this could be because the server does not support any of the cipher suites we have to offer
Sorry, no definitive result]]></description>
		<content:encoded><![CDATA[<p>Attempting a normal TLS connection<br />
- this failed with the error<br />
Attempting a POODLE-style TLS connection<br />
- this failed with the same error<br />
Check the hostname, or this could be because the server does not support any of the cipher suites we have to offer<br />
Sorry, no definitive result</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Jerome</title>
		<link>http://www.exploresecurity.com/testing-for-poodle_tls-manually/#comment-6671</link>
		<dc:creator>Jerome</dc:creator>
		<pubDate>Wed, 13 Jan 2016 09:47:48 +0000</pubDate>
		<guid isPermaLink="false">http://www.exploresecurity.com/?p=362#comment-6671</guid>
		<description><![CDATA[Hi
You do get the theory right: the problem is that, while the TLS standard resolves the problem that plagued SSLv3, if the same code is re-used in the TLS implementation then the bug remains. In this case, whether or not TLS_FALLBACK_SCSV is supported is irrelevant as the attacker doesn&#039;t have to knock the connection down to SSLv3.
My motivation for the post was just to figure out how to do a test - but it&#039;s only one test, there may be other and/or better ways of doing it (and the library I&#039;m using is much more restricted in terms of ciphers it knows about). Ivan from SSL Labs &lt;a href=&quot;https://community.qualys.com/thread/14494&quot; rel=&quot;nofollow&quot;&gt;states&lt;/a&gt; that his check will &quot;negotiate a connection with the server, but using broken CBC padding. If the handshake succeeds, the server is considered vulnerable. We also submit a HTTP request and expect a response. So it should be pretty accurate&quot;. My script doesn&#039;t make a HTTP request but it does attempt to send a message with corrupted padding. On buggy implementations, perhaps the result depends on the TLS version or cipher suite that&#039;s negotiated even if &lt;em&gt;in theory&lt;/em&gt; it shouldn&#039;t make a difference. Overall I would favour SSL Lab&#039;s result, it should be more thorough, but you could always post a question on the community forum about this specific example - Ivan is usually very responsive. Do let me know if you decide to put a question up.
Jerome]]></description>
		<content:encoded><![CDATA[<p>Hi<br />
You do get the theory right: the problem is that, while the TLS standard resolves the problem that plagued SSLv3, if the same code is re-used in the TLS implementation then the bug remains. In this case, whether or not TLS_FALLBACK_SCSV is supported is irrelevant as the attacker doesn&#8217;t have to knock the connection down to SSLv3.<br />
My motivation for the post was just to figure out how to do a test &#8211; but it&#8217;s only one test, there may be other and/or better ways of doing it (and the library I&#8217;m using is much more restricted in terms of ciphers it knows about). Ivan from SSL Labs <a href="https://community.qualys.com/thread/14494" rel="nofollow">states</a> that his check will &#8220;negotiate a connection with the server, but using broken CBC padding. If the handshake succeeds, the server is considered vulnerable. We also submit a HTTP request and expect a response. So it should be pretty accurate&#8221;. My script doesn&#8217;t make a HTTP request but it does attempt to send a message with corrupted padding. On buggy implementations, perhaps the result depends on the TLS version or cipher suite that&#8217;s negotiated even if <em>in theory</em> it shouldn&#8217;t make a difference. Overall I would favour SSL Lab&#8217;s result, it should be more thorough, but you could always post a question on the community forum about this specific example &#8211; Ivan is usually very responsive. Do let me know if you decide to put a question up.<br />
Jerome</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Hubert</title>
		<link>http://www.exploresecurity.com/testing-for-poodle_tls-manually/#comment-6635</link>
		<dc:creator>Hubert</dc:creator>
		<pubDate>Fri, 08 Jan 2016 06:28:44 +0000</pubDate>
		<guid isPermaLink="false">http://www.exploresecurity.com/?p=362#comment-6635</guid>
		<description><![CDATA[I tested both IPs with test_poodle_tls.py and the result is &quot;The host does NOT appear to be vulnerable to POODLE_TLS&quot; for both.
Qualys marks one as vulnerable and one not.
The one that is marked vulnerable supports TLS_FALLBACK_SCSV:
openssl s_client -connect 184.106.184.118:443 -fallback_scsv -no_tls1_2

If I get the theory right, TLS implementations that re-use the SSLv3 code for the padding bytes check can be vulnerable to poodle even on a TLS connection.

The question is: Does test_poodle_tls.py work and only trigger when a TLS-implementation is using the SSLv3 padding bytes check and does Qualys not check for the actual vulnerability but just for the possibility of downgrade attacks (which make the connection cryptographically  less strong but don&#039;t enable an attack by themselves).

It would be nice to have a test server somewhere which exposes this poodle-tls issue (all servers I tested - the ones that Qualys complains about too - have been tested as not vulnerable by test_poodle_tls.py)

~Hubert]]></description>
		<content:encoded><![CDATA[<p>I tested both IPs with test_poodle_tls.py and the result is &#8220;The host does NOT appear to be vulnerable to POODLE_TLS&#8221; for both.<br />
Qualys marks one as vulnerable and one not.<br />
The one that is marked vulnerable supports TLS_FALLBACK_SCSV:<br />
openssl s_client -connect 184.106.184.118:443 -fallback_scsv -no_tls1_2</p>
<p>If I get the theory right, TLS implementations that re-use the SSLv3 code for the padding bytes check can be vulnerable to poodle even on a TLS connection.</p>
<p>The question is: Does test_poodle_tls.py work and only trigger when a TLS-implementation is using the SSLv3 padding bytes check and does Qualys not check for the actual vulnerability but just for the possibility of downgrade attacks (which make the connection cryptographically  less strong but don&#8217;t enable an attack by themselves).</p>
<p>It would be nice to have a test server somewhere which exposes this poodle-tls issue (all servers I tested &#8211; the ones that Qualys complains about too &#8211; have been tested as not vulnerable by test_poodle_tls.py)</p>
<p>~Hubert</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Jerome</title>
		<link>http://www.exploresecurity.com/testing-for-poodle_tls-manually/#comment-6610</link>
		<dc:creator>Jerome</dc:creator>
		<pubDate>Tue, 05 Jan 2016 13:05:13 +0000</pubDate>
		<guid isPermaLink="false">http://www.exploresecurity.com/?p=362#comment-6610</guid>
		<description><![CDATA[Hi Ben
You&#039;re testing two different IPs there - you tested www.finalsite.com which is 23.202.173.5, whereas judging by the URL SSL Labs was testing finalsite.com which is at 184.106.184.118.
Jerome]]></description>
		<content:encoded><![CDATA[<p>Hi Ben<br />
You&#8217;re testing two different IPs there &#8211; you tested <a href="http://www.finalsite.com" rel="nofollow">http://www.finalsite.com</a> which is 23.202.173.5, whereas judging by the URL SSL Labs was testing finalsite.com which is at 184.106.184.118.<br />
Jerome</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Ben</title>
		<link>http://www.exploresecurity.com/testing-for-poodle_tls-manually/#comment-6600</link>
		<dc:creator>Ben</dc:creator>
		<pubDate>Sun, 03 Jan 2016 19:57:07 +0000</pubDate>
		<guid isPermaLink="false">http://www.exploresecurity.com/?p=362#comment-6600</guid>
		<description><![CDATA[Hi Jerome, I do not know if you can see this, but this is something I&#039;d still like to ask.

After running a test on www.finalsite.com , your script told me that it is not vulnerable. However, after executing the Qualys SSL Test: https://www.ssllabs.com/ssltest/analyze.html?d=finalsite.com&amp;s=184.106.184.118 one of the IPs for this site resulted to be shown as &quot;vulnerable to TLS POODLE attack&quot;. I do not know whether it is a misdetection on the Qualys test or your script. Any insights?

Thanks,
Ben.]]></description>
		<content:encoded><![CDATA[<p>Hi Jerome, I do not know if you can see this, but this is something I&#8217;d still like to ask.</p>
<p>After running a test on <a href="http://www.finalsite.com" rel="nofollow">http://www.finalsite.com</a> , your script told me that it is not vulnerable. However, after executing the Qualys SSL Test: <a href="https://www.ssllabs.com/ssltest/analyze.html?d=finalsite.com&#038;s=184.106.184.118" rel="nofollow">https://www.ssllabs.com/ssltest/analyze.html?d=finalsite.com&#038;s=184.106.184.118</a> one of the IPs for this site resulted to be shown as &#8220;vulnerable to TLS POODLE attack&#8221;. I do not know whether it is a misdetection on the Qualys test or your script. Any insights?</p>
<p>Thanks,<br />
Ben.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Jerome</title>
		<link>http://www.exploresecurity.com/testing-for-poodle_tls-manually/#comment-5329</link>
		<dc:creator>Jerome</dc:creator>
		<pubDate>Thu, 13 Aug 2015 08:54:47 +0000</pubDate>
		<guid isPermaLink="false">http://www.exploresecurity.com/?p=362#comment-5329</guid>
		<description><![CDATA[I&#039;d be interested to hear of any examples you can share that you believe are false positives or negatives.]]></description>
		<content:encoded><![CDATA[<p>I&#8217;d be interested to hear of any examples you can share that you believe are false positives or negatives.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: How to test POODLE over TLS? - BlogoSfera</title>
		<link>http://www.exploresecurity.com/testing-for-poodle_tls-manually/#comment-5189</link>
		<dc:creator>How to test POODLE over TLS? - BlogoSfera</dc:creator>
		<pubDate>Mon, 03 Aug 2015 08:59:34 +0000</pubDate>
		<guid isPermaLink="false">http://www.exploresecurity.com/?p=362#comment-5189</guid>
		<description><![CDATA[[&#8230;] There are already several ways to do this like Qualys SSLLabs for instance, but it is too restrictive (only TCP port 443 of servers available on the Internet). There is also this link, but I got a lot false positives/negatives when tested: http://www.exploresecurity.com/testing-for-poodle_tls-manually/ [&#8230;]]]></description>
		<content:encoded><![CDATA[<p>[&#8230;] There are already several ways to do this like Qualys SSLLabs for instance, but it is too restrictive (only TCP port 443 of servers available on the Internet). There is also this link, but I got a lot false positives/negatives when tested: <a href="http://www.exploresecurity.com/testing-for-poodle_tls-manually/" rel="nofollow">http://www.exploresecurity.com/testing-for-poodle_tls-manually/</a> [&#8230;]</p>
]]></content:encoded>
	</item>
</channel>
</rss>
