[Nea] Fwd: [TLS] MITM Attacks on Client Authentication after Resumption

"Joseph Salowey (jsalowey)" <jsalowey@cisco.com> Tue, 04 March 2014 11:06 UTC

Return-Path: <jsalowey@cisco.com>
X-Original-To: nea@ietfa.amsl.com
Delivered-To: nea@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7758C1A0495 for <nea@ietfa.amsl.com>; Tue, 4 Mar 2014 03:06:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -15.047
X-Spam-Level:
X-Spam-Status: No, score=-15.047 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.547, SPF_PASS=-0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xw_7-VNJjVmH for <nea@ietfa.amsl.com>; Tue, 4 Mar 2014 03:06:45 -0800 (PST)
Received: from rcdn-iport-1.cisco.com (rcdn-iport-1.cisco.com [173.37.86.72]) by ietfa.amsl.com (Postfix) with ESMTP id D75141A069C for <nea@ietf.org>; Tue, 4 Mar 2014 03:06:44 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=1801; q=dns/txt; s=iport; t=1393931202; x=1395140802; h=from:to:subject:date:message-id:references:mime-version; bh=bHkNaaEFL/BDUFUrDvb2ifp2dg8B3/EZ1wE0j9jCdiU=; b=aWR8AEYjHg80XCN9PSdoWSjXAXd8ZpVQnCzEqjmTuDFpcbzf7vsstHK4 O7LVSfPdeCe2uLnCHG7SpCMmMfnWLPGqv3pMlnwOcZfZ9NfY4E6q7sHsG UDRTEhcc1418YWzPjnx1x6vxJv2GFoG8xhBSZLxFJYFFyohhRT5klJxps A=;
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: ApYRAPCyFVOtJXG//2dsb2JhbABagwY7V4gWuFeBIBZ0ghwKAQEEgQkCAQsBQjIbCgIEiAzMPRMEjk2DL4EUBJg8kiuDLYIq
X-IronPort-AV: E=Sophos; i="4.97,584,1389744000"; d="scan'208,217"; a="307716135"
Received: from rcdn-core2-4.cisco.com ([173.37.113.191]) by rcdn-iport-1.cisco.com with ESMTP; 04 Mar 2014 11:06:40 +0000
Received: from xhc-aln-x13.cisco.com (xhc-aln-x13.cisco.com [173.36.12.87]) by rcdn-core2-4.cisco.com (8.14.5/8.14.5) with ESMTP id s24B6elC029480 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL) for <nea@ietf.org>; Tue, 4 Mar 2014 11:06:40 GMT
Received: from xmb-rcd-x09.cisco.com ([169.254.9.247]) by xhc-aln-x13.cisco.com ([173.36.12.87]) with mapi id 14.03.0123.003; Tue, 4 Mar 2014 05:06:40 -0600
From: "Joseph Salowey (jsalowey)" <jsalowey@cisco.com>
To: "nea@ietf.org" <nea@ietf.org>
Thread-Topic: [TLS] MITM Attacks on Client Authentication after Resumption
Thread-Index: AQHPNvQ8MwvLIF45O0S80vyn0IwaCw==
Date: Tue, 04 Mar 2014 11:06:39 +0000
Message-ID: <BCE812CE-A07A-4339-9D88-28D07BFA0490@cisco.com>
References: <BB2FE60E-A7CA-4EA7-BFC8-AB794EC6FF00@inria.fr>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.61.222.63]
Content-Type: multipart/alternative; boundary="_000_BCE812CEA07A43399D8828D07BFA0490ciscocom_"
MIME-Version: 1.0
Archived-At: http://mailarchive.ietf.org/arch/msg/nea/6p0imR-ykRtlpjSTGGt3OjPZ0ho
Subject: [Nea] Fwd: [TLS] MITM Attacks on Client Authentication after Resumption
X-BeenThere: nea@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Network Endpoint Assessment discussion list <nea.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/nea>, <mailto:nea-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/nea/>
List-Post: <mailto:nea@ietf.org>
List-Help: <mailto:nea-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/nea>, <mailto:nea-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 Mar 2014 11:06:47 -0000

The link below details a vulnerability involving session resumption and TLS channel bindings that is applicable to PT-TLS.  There is ongoing discussion on the TLS and Kitten lists.

 https://secure-resumption.com<https://secure-resumption.com/>

Basically if the TLS connection is torn down and resumed before channel binding within the EMA takes place a man-in-the-middle will not be discovered.

Joe