Source: dheater
Maintainer: Szilárd Pfeiffer <szilard.pfeiffer@balasys.hu>
Section: python
Priority: optional
Build-Depends: python3-setuptools, python3-pkg-resources, python3-attr (>= 19.2.0), python3-urllib3, python3-all, debhelper (>= 9), dh-python
Standards-Version: 3.9.1
Homepage: https://github.com/balasys/dheater

Package: python3-dheater
Architecture: all
Depends: ${misc:Depends}, ${python3:Depends}
Description: D(HE)ater is an attacking tool heating the CPU by enforcing
 # D(HE)ater
 .
 D(HE)ater is an attacking tool based on CPU heating in that it forces the ephemeral variant of
 [Diffie-Hellman key exchange](https://en.wikipedia.org/wiki/Diffie%E2%80%93Hellman_key_exchange) (DHE) in given
 cryptography protocols (e.g. TLS, SSH). It is performed without calculating a cryptographically correct ephemeral key on
 the client-side, but with a significant amount of calculation on the server-side. Based on this,
 a [denial-of-service (DoS) attack](https://en.wikipedia.org/wiki/Denial-of-service_attack) can be initiated,
 called *D(HE)at attack* ([CVE-2002-20001](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-20001)).
 .
 ## Quick start
 .
 D(HE)ater can be installed directly via [pip](https://pip.pypa.io/en/stable/) from
 [PyPi](https://pypi.org/project/dheater/)
 .
 ```console
 pip install dheater
 dheat --protocol tls ecc256.badssl.com
 dheat --protocol ssh ecc256.badssl.com
 ```
 .

