Re: [TLS] TLS renegotiation issue

Eric Rescorla <ekr@rtfm.com> Thu, 05 November 2009 03:31 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: tls@core3.amsl.com
Delivered-To: tls@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7ECC928C0E9 for <tls@core3.amsl.com>; Wed, 4 Nov 2009 19:31:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level:
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9zQbCTZggyEK for <tls@core3.amsl.com>; Wed, 4 Nov 2009 19:30:59 -0800 (PST)
Received: from mail-pw0-f50.google.com (mail-pw0-f50.google.com [209.85.160.50]) by core3.amsl.com (Postfix) with ESMTP id 6E1A328C10E for <tls@ietf.org>; Wed, 4 Nov 2009 19:30:59 -0800 (PST)
Received: by pwi4 with SMTP id 4so3856388pwi.29 for <tls@ietf.org>; Wed, 04 Nov 2009 19:31:18 -0800 (PST)
Received: by 10.114.50.8 with SMTP id x8mr3744828wax.219.1257391877879; Wed, 04 Nov 2009 19:31:17 -0800 (PST)
Received: from ?10.78.249.58? ([166.205.133.87]) by mx.google.com with ESMTPS id 23sm187960pxi.9.2009.11.04.19.31.13 (version=TLSv1/SSLv3 cipher=RC4-MD5); Wed, 04 Nov 2009 19:31:17 -0800 (PST)
References: <73843DF9-EFCB-4B8D-913E-FE2235E5BDD3@rtfm.com>
Message-Id: <054CC553-7D2E-435E-ADE3-4FBE7B2DB3F8@rtfm.com>
From: Eric Rescorla <ekr@rtfm.com>
To: Eric Rescorla <ekr@rtfm.com>
In-Reply-To: <73843DF9-EFCB-4B8D-913E-FE2235E5BDD3@rtfm.com>
Content-Type: multipart/alternative; boundary="Apple-Mail-5--88206456"
Content-Transfer-Encoding: 7bit
X-Mailer: iPhone Mail (7C144)
Mime-Version: 1.0 (iPhone Mail 7C144)
Date: Wed, 04 Nov 2009 19:31:07 -0800
Cc: "tls@ietf.org" <tls@ietf.org>
Subject: Re: [TLS] TLS renegotiation issue
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/tls>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 05 Nov 2009 03:31:00 -0000


On Nov 4, 2009, at 7:26 PM, Eric Rescorla <ekr@rtfm.com> wrote:

> TLS WG members will want to check out this announcement of a
> new attack on the TLS renegotiation logic. See here:
>
> http://www.extendedsubset.com/
>
> The high-level summary is that the attacker negotiates TLS with the
> server and then subsequently proxies the client's negotiation *over*
> that channel. This allows the attacker to inject arbitrary content of
> their choice in front of data sent from the TLS client to the TLS
> server. This data will be treated by the server as if it came from the
> client. Once the new handshake has finished, the attacker can't
> do anything else useful.
>
> The attacker doesn't get to directly see any of the client's plaintext
> messages but could potentially:
>
> - Issue commands which would then piggyback on subsequent  
> authentications
>  by the client, including certificate-based authentication.
> - Potentially get access to data sent by the client by issuing
>  an earlier command which causes the application layer (e.g., HTTP)
>  to send the client's traffic to the server.
>
> Marsh Ray, the initial discoverer, has been working with a bunch of
> people in the security community to deal with this issue and develop
> a fix.

I should also mention his colleague from phonefactor, steve dispensa.

Ekr
> Tomorrow AM I'll be posting an initial draft that describes
> the obvious fix, which is to cryptographically bind negotiations
> to any enclosing connection (if any). I won't be in Hiroshima but
> I expect the WG will want to discuss this topic.
>
> -Ekr