TLS Man-in-the-middle on renegotiation vulnerability made public
TLS 1.0+ and SSL 3.0+ (known from among others "https") is vulnerable to a protocol weakness where a man in the middle attack could be worked in during the renegotiation phase in modern versions of the protocol.
While the details had been offered in a meeting with the IETF, vendors and the open source implementers of SSL privately, it appears an IETF mailing list came to finding it again. That seems to have prompted the original finders (Marsh Ray and Steve Dispensa) to offer up their finding publicly.
The news media outlets are obviously all over this. Some links aside of the usual media outlets:
- The original description (site is suffering from a slashdot effect as I write this)
- The summary by the IETF TLS workgroup, and promisses for an amended protocol
- Marsh Ray's paper
- March Ray's protocol diagrams
There does not seem to be much you can do till the protocol is fixed. The main problem seems to be with clients using certificate authentication.
Exploiting this requires the attacker to be able to intercept the traffic.
Thanks to Martin, Edward, Ken and Chris for sending this in.
--
Swa Frantzen -- Section 66
Comments
Mark Cox
Nov 5th 2009
1 decade ago
[1] http://www.win.tue.nl/hashclash/rogue-ca/
amcgregor
Nov 5th 2009
1 decade ago
amcgregor
Nov 5th 2009
1 decade ago