mpgn / poodle-PoC

:poodle: Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566 :poodle:
MIT License
249 stars 75 forks source link

SSLv3 Downgrade Error #9

Closed christypriory closed 6 years ago

christypriory commented 6 years ago

I was testing the script and got the following error.

TLSv1.0  downgrade 
Sending handshake failure

Exception happened during processing of request from ('192.168.86.29', 58339)
Traceback (most recent call last):
  File "/usr/lib/python3.6/socketserver.py", line 317, in _handle_request_noblock
    self.process_request(request, client_address)
  File "/usr/lib/python3.6/socketserver.py", line 348, in process_request
    self.finish_request(request, client_address)
  File "/usr/lib/python3.6/socketserver.py", line 361, in finish_request
    self.RequestHandlerClass(request, client_address, self)
  File "/usr/lib/python3.6/socketserver.py", line 696, in __init__
    self.handle()
  File "poodle-exploit.py", line 203, in handle
    ssl_header = self.request.recv(5)
ConnectionResetError: [Errno 104] Connection reset by peer
Exception happened during processing of request from ('192.168.86.29', 38795)
Traceback (most recent call last):
  File "/usr/lib/python3.6/socketserver.py", line 317, in _handle_request_noblock
    self.process_request(request, client_address)
  File "/usr/lib/python3.6/socketserver.py", line 348, in process_request
    self.finish_request(request, client_address)
  File "/usr/lib/python3.6/socketserver.py", line 361, in finish_request
    self.RequestHandlerClass(request, client_address, self)
  File "/usr/lib/python3.6/socketserver.py", line 696, in __init__
    self.handle()
  File "poodle-exploit.py", line 211, in handle
    traffic.protocol_current = traffic.protocol_all[version][0]
KeyError: 29295
christypriory commented 6 years ago

Exception happened during processing of request from ('192.168.86.29', 38795) Traceback (most recent call last): File "/usr/lib/python3.6/socketserver.py", line 317, in _handle_request_noblock self.process_request(request, client_address) File "/usr/lib/python3.6/socketserver.py", line 348, in process_request self.finish_request(request, client_address) File "/usr/lib/python3.6/socketserver.py", line 361, in finish_request self.RequestHandlerClass(request, client_address, self) File "/usr/lib/python3.6/socketserver.py", line 696, in init self.handle() File "poodle-exploit.py", line 211, in handle traffic.protocol_current = traffic.protocol_all[version][0] KeyError: 29295

mpgn commented 6 years ago

Hello,

Which client did you use ? (firefox, chrome, opera, ie)

mpgn commented 6 years ago

Okay, I think you try on Safari ! I find a bug and will push it at the end of the day.

Safari try to negotiate first with SSLv2, this is why you get :

traffic.protocol_current = traffic.protocol_all[version][0]
KeyError: 29295

Also, i notice only chrome seems to handle the downgrade attack

christypriory commented 6 years ago

I was using Android device 4.4.2 (very old chrome and firefox)

Please let me know if there is any log i can share.

mpgn commented 6 years ago

can you try with code pushed on dev branch ?

the best i can ask, it's a dump of the ssl traffic with wireshark or tcpdump 👍