Releases: tls-attacker/TLS-Anvil
Releases · tls-attacker/TLS-Anvil
v1.2.9
What's Changed
- Added workaround for TLS-Scanner serialization issue again
Full Changelog: v1.2.8...v1.2.9
v1.2.8
What's Changed
- Enabled subset of lengthfield tests for DTLS
- Added new variation of Close Notify test
- Fixed wrong DerivationParameters assigned for GREASE elements
- Fixed NPE in DTLS Test
- Restricted parallel test cases for DTLS to 1 due to a limitation of TLS-Attacker
Full Changelog: v1.2.7...v1.2.8
v1.2.7
What's Changed
- Update BuildPushDockerImage.yml to Apple Silicon build and ARM build by @feidens in #13
- Fix: CCS in HelloRetryRequest tests by @FAlbertDev in #14
- DTLS Support (Experimental)
- Integration with Anvil Core
- Support for the new web interface Anvil Web
- New metadata format
Full Changelog: v1.2.2...v1.2.7
TLS-Anvil v1.2.2
Fixes:
- Implemented workaround for serialization of scan report
TLS-Anvil v1.2.1
Changes:
- Updated TLS-Attacker dependency to fix an issue with reexecuted tests
TLS-Anvil v1.2.0
- Replaced own client scanner with TLS-Scanner's client scanner.
- Fixed RenegotiationInfo extension added to ServerHellos when the client did not offer it (Thanks @maxammann)
- Fixed exceptions thrown during test preparation missing in log
TLS-Anvil v1.1.0
Changes
- Fixed broken close notify test template
- Fixed signature validation bug
- Fixed tcpdump not stopped when TLS-Anvil terminated
- Added warning for when no interface was specified for tcpdump
- Removed stack traces from console output
- Grouped identical failure messages for individual connections of a test to get better overview in console output
- Refactored Validator and removed unnecessary additional result data
- Added missing documentation
- Compatibility with TLS-Attacker version 5
TLS-Anvil v1.0.3
Release for artifact appendix that adds specific versions for MongoDB in docker-compose.yml
TLS-Anvil v1.0.2
- Fixed NPE in TLS 1.2 signature validation
TLS-Anvil v1.0.1
Initial Public Release
TLS-Anvil is the foundation of the study we conducted for our USENIX Security '22 paper "TLS-Anvil: Adapting Combinatorial Testing for TLS Libraries". To learn more about how TLS-Anvil works and how to contribute, visit https://tls-anvil.com.