Re: [TLS] Rizzo claims implementation attach, should be interesting

=JeffH <Jeff.Hodges@KingsMountain.com> Tue, 20 September 2011 23:29 UTC

Return-Path: <Jeff.Hodges@KingsMountain.com>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7500321F8CA4 for <tls@ietfa.amsl.com>; Tue, 20 Sep 2011 16:29:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -99.777
X-Spam-Level:
X-Spam-Status: No, score=-99.777 tagged_above=-999 required=5 tests=[AWL=-0.771, BAYES_05=-1.11, FH_RELAY_NODNS=1.451, HELO_MISMATCH_COM=0.553, RDNS_NONE=0.1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id V8xGH+VoliVo for <tls@ietfa.amsl.com>; Tue, 20 Sep 2011 16:29:25 -0700 (PDT)
Received: from oproxy1-pub.bluehost.com (oproxy1.bluehost.com [IPv6:2605:dc00:100:2::a1]) by ietfa.amsl.com (Postfix) with SMTP id 89F1321F8CA2 for <tls@ietf.org>; Tue, 20 Sep 2011 16:29:24 -0700 (PDT)
Received: (qmail 6337 invoked by uid 0); 20 Sep 2011 23:31:50 -0000
Received: from unknown (HELO box514.bluehost.com) (74.220.219.114) by oproxy1.bluehost.com with SMTP; 20 Sep 2011 23:31:50 -0000
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=kingsmountain.com; s=default; h=Content-Transfer-Encoding:Content-Type:Subject:To:MIME-Version:From:Date:Message-ID; bh=QtyV+B2Vfo536hZedgJBj56n4joHoynoJD9goEbSR6U=; b=rhkol7+b9JfxDMnUPxCVBjow2V7IQzCFlVqGK5KlZlgbAORQeyTE6/ccVIb/mhZnS+0bIJpqjk0+oSJNP2AbsX2cdHMpFDmrzT3SO8KvwaOdzJYEuMq3EhT5nIfuT3sk;
Received: from outbound4.ebay.com ([216.113.168.128] helo=[10.244.137.14]) by box514.bluehost.com with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.76) (envelope-from <Jeff.Hodges@KingsMountain.com>) id 1R69n4-0005As-C7 for tls@ietf.org; Tue, 20 Sep 2011 17:31:50 -0600
Message-ID: <4E792266.3050601@KingsMountain.com>
Date: Tue, 20 Sep 2011 16:31:50 -0700
From: =JeffH <Jeff.Hodges@KingsMountain.com>
User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.2.21) Gecko/20110831 Thunderbird/3.1.13
MIME-Version: 1.0
To: IETF TLS WG <tls@ietf.org>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Identified-User: {11025:box514.bluehost.com:kingsmou:kingsmountain.com} {sentby:smtp auth 216.113.168.128 authed with jeff.hodges+kingsmountain.com}
Subject: Re: [TLS] Rizzo claims implementation attach, should be interesting
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tls>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 20 Sep 2011 23:29:26 -0000

Martin Rex <mrex@sap.com> noted..
 >
 > I haven't yet seen a detailed description of the BEAST attack, but
 > what has been leaked so far (and that TLSv1.1 is allegedly not
 > susceptible to this particular attack) suggests that they're
 > exploiting a definite design flaw in the web browser that exhibits an
 > obvious and serious negligence in the management of TLS connection states
 > therefore providing a free "chosen adaptive plaintext attack" facility
 > as a courtesy to the attacker besides the courtesy to run arbitrary
 > attacker-supplied active content.

uh, yes, web browsers are full of such issues, some by accident, some (more or 
less) by design.This provides a high-level & very brief survey & bibliography 
of the landscape..

The Need for a Coherent Web Security Policy Framework
<http://kingsmountain.com/doc/HodgesSteingruebl-NeedCoherentWebSecurityPolicyFramework-2010.pdf>

See also..

Browser Security Handbook
https://code.google.com/p/browsersec/wiki/Main


=JeffH