TLS Man-in-the-middle on renegotiation vulnerability made public

Published: 2009-11-05. Last Updated: 2009-11-05 19:03:13 UTC
by Swa Frantzen (Version: 2)
3 comment(s)

TLS 1.0+ and SSL 3.0+ (known from among others "https") is vulnerable to a protocol weakness where a man in the middle attack could be worked in during the renegotiation phase in modern versions of the protocol.

While the details had been offered in a meeting with the IETF, vendors and the open source implementers of SSL privately, it appears an IETF mailing list came to finding it again. That seems to have prompted the original finders (Marsh Ray and Steve Dispensa) to offer up their finding publicly.

The news media outlets are obviously all over this. Some links aside of the usual media outlets:

There does not seem to be much you can do till the protocol is fixed. The main problem seems to be with clients using certificate authentication.

Exploiting this requires the attacker to be able to intercept the traffic.

Thanks to Martin, Edward, Ken and Chris for sending this in.

--
Swa Frantzen -- Section 66

3 comment(s)

Comments

This is CVE-2009-3555
Combine this with the rogue CA[1] (200 PS3s generating certificates until an MD5 hash collision occurs) and a little ARP spoofing, and you have yourself a viable exploit.

[1] http://www.win.tue.nl/hashclash/rogue-ca/
http://www.sslshopper.com/article-ssl-and-tls-renegotiation-vulnerability-discovered.html offers an excellent summary.

Diary Archives