Re: [TLS] Thoughts on Version Intolerance
Peter Gutmann <pgut001@cs.auckland.ac.nz> Thu, 21 July 2016 12:25 UTC
Return-Path: <pgut001@cs.auckland.ac.nz>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9F95712DB7D for <tls@ietfa.amsl.com>; Thu, 21 Jul 2016 05:25:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.487
X-Spam-Level:
X-Spam-Status: No, score=-5.487 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-1.287] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=auckland.ac.nz
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1pLeG0zQIs92 for <tls@ietfa.amsl.com>; Thu, 21 Jul 2016 05:25:54 -0700 (PDT)
Received: from mx4.auckland.ac.nz (mx4.auckland.ac.nz [130.216.125.248]) (using TLSv1.2 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6B7A212DB8B for <tls@ietf.org>; Thu, 21 Jul 2016 05:25:53 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=auckland.ac.nz; i=@auckland.ac.nz; q=dns/txt; s=mail; t=1469103954; x=1500639954; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=8Y25ge4mOnv0Sk0WWkW9Jjc0KnRrjPB56y7DhLKOYn0=; b=rU64FbcOGxKKBtSG2yAJB7VS7dgAVMIggVr7SSM6yfFEd8RVXsI6kRi7 oQQbPfpJI3C4vl0mpV7h/jPEgfWpOSlANhdO9nYx4LK3s55CRa0GFdUfb 1+ht0exEJ3iApI66LKNYwWAiaBAIymB1ZHWJTP8fgpqk1TblxTNp3R4NT m+kkXxp1aHZSG5ZTvSfOyEZ9+kbeWjQsYQSe2AssGyzFkm/WF77O4QdS+ +TyDR8W8XOgo84A/hZMIhekjNszPlkHM2PJFlZMKT+I2LgB5h55iQwSqu N4pS9ruBvmG6SMbPlJdBjaN/cV8os+PRxt1j9EfiUroQrmSffUrGcC+2p g==;
X-IronPort-AV: E=Sophos;i="5.28,399,1464609600"; d="scan'208";a="98012712"
X-Ironport-HAT: MAIL-SERVERS - $RELAYED
X-Ironport-Source: 130.216.4.171 - Outgoing - Outgoing
Received: from uxchange10-fe4.uoa.auckland.ac.nz ([130.216.4.171]) by mx4-int.auckland.ac.nz with ESMTP/TLS/AES256-SHA; 22 Jul 2016 00:25:49 +1200
Received: from UXCN10-5.UoA.auckland.ac.nz ([169.254.5.93]) by uxchange10-fe4.UoA.auckland.ac.nz ([169.254.109.63]) with mapi id 14.03.0266.001; Fri, 22 Jul 2016 00:25:49 +1200
From: Peter Gutmann <pgut001@cs.auckland.ac.nz>
To: "mrex@sap.com" <mrex@sap.com>, Hubert Kario <hkario@redhat.com>
Thread-Topic: [TLS] Thoughts on Version Intolerance
Thread-Index: AQHR4OTM2eSp/VUo4Ee5kqtv5bpkQaAdX+GAgALlKQCAAAtbgIAAA4WAgAAnswCAAFI+gIACBjhZ
Date: Thu, 21 Jul 2016 12:25:48 +0000
Message-ID: <9A043F3CF02CD34C8E74AC1594475C73F4CCF7C1@uxcn10-5.UoA.auckland.ac.nz>
References: <7776970.MmWSFEWlvc@pintsize.usersys.redhat.com>, <20160720173027.9BC3D1A504@ld9781.wdf.sap.corp>
In-Reply-To: <20160720173027.9BC3D1A504@ld9781.wdf.sap.corp>
Accept-Language: en-NZ, en-GB, en-US
Content-Language: en-NZ
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.6.2.5]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/femDg922MgP9asysqXLKZygcfrw>
Cc: "tls@ietf.org" <tls@ietf.org>
Subject: Re: [TLS] Thoughts on Version Intolerance
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Jul 2016 12:25:58 -0000
Martin Rex <mrex@sap.com> writes: >Limiting PDU sizes to reasonably sane sizes is perfectly valid behaviour. >X.509v3 certificates can theoretically include CAT MPEGs and amount to >megabytes. We really need a TLS scanner that does this just to see what happens. When I created that cat-MPEG cert, I fed it to both MSIE and Netscape. Both happily accepted it, and then essentially become nonfunctional because although they saw nothing wrong with accepting a cert of that size, they couldn't actually deal with it. In Netscape's case I had to delete the .db file before it could be used again. I wouldn't be surprised if you can quite effectively DoS assorted TLS implementations with stuff like this. (This is one of the design features of TLS-LTS, if both sides do -LTS then the Hello only needs a single extension to specify everything. Combine that with PSK, so no certs, and you get quite an efficient protocol, the only thing of any size is the keyex and server signature). Peter.
- [TLS] Client Hello size intolerance Was: Re: Thou… Hubert Kario
- Re: [TLS] Thoughts on Version Intolerance Yuhong Bao
- Re: [TLS] Thoughts on Version Intolerance Hubert Kario
- Re: [TLS] Thoughts on Version Intolerance Hubert Kario
- Re: [TLS] Thoughts on Version Intolerance Ivan Ristić
- Re: [TLS] Thoughts on Version Intolerance Yuhong Bao
- Re: [TLS] Thoughts on Version Intolerance Yuhong Bao
- Re: [TLS] Thoughts on Version Intolerance David Benjamin
- Re: [TLS] Thoughts on Version Intolerance Brian Smith
- Re: [TLS] Thoughts on Version Intolerance Hubert Kario
- Re: [TLS] Thoughts on Version Intolerance Hubert Kario
- Re: [TLS] Thoughts on Version Intolerance Peter Gutmann
- Re: [TLS] Thoughts on Version Intolerance Ilari Liusvaara
- Re: [TLS] Thoughts on Version Intolerance Hubert Kario
- Re: [TLS] Thoughts on Version Intolerance David Benjamin
- Re: [TLS] Thoughts on Version Intolerance Watson Ladd
- Re: [TLS] Thoughts on Version Intolerance Martin Rex
- Re: [TLS] Thoughts on Version Intolerance Benjamin Kaduk
- Re: [TLS] Thoughts on Version Intolerance Hubert Kario
- Re: [TLS] Thoughts on Version Intolerance Watson Ladd
- Re: [TLS] Thoughts on Version Intolerance Hubert Kario
- Re: [TLS] Thoughts on Version Intolerance Kyle Rose
- Re: [TLS] Thoughts on Version Intolerance Hubert Kario
- Re: [TLS] Thoughts on Version Intolerance Hubert Kario
- Re: [TLS] Thoughts on Version Intolerance Martin Rex
- Re: [TLS] Thoughts on Version Intolerance Hanno Böck
- Re: [TLS] Thoughts on Version Intolerance Hubert Kario
- Re: [TLS] Thoughts on Version Intolerance David Benjamin
- Re: [TLS] Thoughts on Version Intolerance Ilari Liusvaara
- Re: [TLS] Thoughts on Version Intolerance Hubert Kario
- [TLS] Thoughts on Version Intolerance Hanno Böck
- Re: [TLS] Client Hello size intolerance Was: Re: … David Benjamin
- Re: [TLS] Client Hello size intolerance Was: Re: … Hubert Kario
- Re: [TLS] Client Hello size intolerance Was: Re: … Brian Smith
- Re: [TLS] Thoughts on Version Intolerance Dave Garrett
- Re: [TLS] Thoughts on Version Intolerance Ilari Liusvaara