Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add support for legacy clients using SSLv2 and SSLv3 #35

Open
wants to merge 8 commits into
base: master
Choose a base branch
from

Conversation

no0be
Copy link

@no0be no0be commented Feb 20, 2019

Use a local build of OpenSSL in order to add support for legacy clients using SSLv2 or SSLv3 (s.a. Windows 7) while maintaining support for modern systems, without compromising the integrity of the attacker's operating system.

Since OpenSSL needs to be compiled with special flags for this to work, this also adds a small script to automate the building process.

This is completely based on s0lst1c3's recent update to eaphammer for which details can be found here:

@adde88
Copy link

adde88 commented Mar 11, 2019

This caught my interest. I'm following Sensepost for updates to the project, as i'm porting it to OpenWRT.
I've added these changes to a branch of my project, just for testing.
I also compiled openssl-1.1.1b with the custom arguments successfully.

If people are interested in testing this on OpenWRT, feel free to head to my repos below:
hostapd-mana (hostapd source)
hostapd-mana-openwrt (openwrt Makefiles, and packages)
Just checkout the branch "ssl-testing"

@singe
Copy link
Contributor

singe commented Mar 11, 2019 via email

@adde88
Copy link

adde88 commented Mar 12, 2019

Yeah, i understand the issue.
Ideally would properly be as a run-time option (perhaps providing an argument), but i think that would be tough to implement.
The easiest options sounds like a build option, as compiling this was relatively straight forward, and didn't require much changes to the source files.
I'll definitely be giving it some more thought.

@no0be
Copy link
Author

no0be commented Mar 13, 2019

As @adde88 pointed-out, I think that you could successfully use the latest OpenSSL version (1.1.1b). The key part is to compile it to support legacy ciphers and to link hostapd-mana with the local build. You would have to manually upgrade the OpenSSL submodule used by the repo with every version upgrade though.

@no0be
Copy link
Author

no0be commented Mar 13, 2019

Upgrading the OpenSSL submodule is quite straight forward and I confirm that hostapd-mana builds fine with the latest OpenSSL 1.1.1b version. Check-out my last commit on no0be:openssl-patch.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants