Re: [TLS] Thoughts on Version Intolerance

Peter Gutmann <pgut001@cs.auckland.ac.nz> Thu, 21 July 2016 12:25 UTC

Return-Path: <pgut001@cs.auckland.ac.nz>
X-Original-To: tls@ietfa.amsl.com
Delivered-To: tls@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9F95712DB7D for <tls@ietfa.amsl.com>; Thu, 21 Jul 2016 05:25:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.487
X-Spam-Level:
X-Spam-Status: No, score=-5.487 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_MED=-2.3, RP_MATCHES_RCVD=-1.287] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=auckland.ac.nz
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1pLeG0zQIs92 for <tls@ietfa.amsl.com>; Thu, 21 Jul 2016 05:25:54 -0700 (PDT)
Received: from mx4.auckland.ac.nz (mx4.auckland.ac.nz [130.216.125.248]) (using TLSv1.2 with cipher RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6B7A212DB8B for <tls@ietf.org>; Thu, 21 Jul 2016 05:25:53 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=auckland.ac.nz; i=@auckland.ac.nz; q=dns/txt; s=mail; t=1469103954; x=1500639954; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=8Y25ge4mOnv0Sk0WWkW9Jjc0KnRrjPB56y7DhLKOYn0=; b=rU64FbcOGxKKBtSG2yAJB7VS7dgAVMIggVr7SSM6yfFEd8RVXsI6kRi7 oQQbPfpJI3C4vl0mpV7h/jPEgfWpOSlANhdO9nYx4LK3s55CRa0GFdUfb 1+ht0exEJ3iApI66LKNYwWAiaBAIymB1ZHWJTP8fgpqk1TblxTNp3R4NT m+kkXxp1aHZSG5ZTvSfOyEZ9+kbeWjQsYQSe2AssGyzFkm/WF77O4QdS+ +TyDR8W8XOgo84A/hZMIhekjNszPlkHM2PJFlZMKT+I2LgB5h55iQwSqu N4pS9ruBvmG6SMbPlJdBjaN/cV8os+PRxt1j9EfiUroQrmSffUrGcC+2p g==;
X-IronPort-AV: E=Sophos;i="5.28,399,1464609600"; d="scan'208";a="98012712"
X-Ironport-HAT: MAIL-SERVERS - $RELAYED
X-Ironport-Source: 130.216.4.171 - Outgoing - Outgoing
Received: from uxchange10-fe4.uoa.auckland.ac.nz ([130.216.4.171]) by mx4-int.auckland.ac.nz with ESMTP/TLS/AES256-SHA; 22 Jul 2016 00:25:49 +1200
Received: from UXCN10-5.UoA.auckland.ac.nz ([169.254.5.93]) by uxchange10-fe4.UoA.auckland.ac.nz ([169.254.109.63]) with mapi id 14.03.0266.001; Fri, 22 Jul 2016 00:25:49 +1200
From: Peter Gutmann <pgut001@cs.auckland.ac.nz>
To: "mrex@sap.com" <mrex@sap.com>, Hubert Kario <hkario@redhat.com>
Thread-Topic: [TLS] Thoughts on Version Intolerance
Thread-Index: AQHR4OTM2eSp/VUo4Ee5kqtv5bpkQaAdX+GAgALlKQCAAAtbgIAAA4WAgAAnswCAAFI+gIACBjhZ
Date: Thu, 21 Jul 2016 12:25:48 +0000
Message-ID: <9A043F3CF02CD34C8E74AC1594475C73F4CCF7C1@uxcn10-5.UoA.auckland.ac.nz>
References: <7776970.MmWSFEWlvc@pintsize.usersys.redhat.com>, <20160720173027.9BC3D1A504@ld9781.wdf.sap.corp>
In-Reply-To: <20160720173027.9BC3D1A504@ld9781.wdf.sap.corp>
Accept-Language: en-NZ, en-GB, en-US
Content-Language: en-NZ
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [10.6.2.5]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/tls/femDg922MgP9asysqXLKZygcfrw>
Cc: "tls@ietf.org" <tls@ietf.org>
Subject: Re: [TLS] Thoughts on Version Intolerance
X-BeenThere: tls@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <tls.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tls>, <mailto:tls-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tls/>
List-Post: <mailto:tls@ietf.org>
List-Help: <mailto:tls-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tls>, <mailto:tls-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Jul 2016 12:25:58 -0000

Martin Rex <mrex@sap.com> writes:

>Limiting PDU sizes to reasonably sane sizes is perfectly valid behaviour.
>X.509v3 certificates can theoretically include CAT MPEGs and amount to
>megabytes.

We really need a TLS scanner that does this just to see what happens.  When I
created that cat-MPEG cert, I fed it to both MSIE and Netscape.  Both happily
accepted it, and then essentially become nonfunctional because although they
saw nothing wrong with accepting a cert of that size, they couldn't actually
deal with it.  In Netscape's case I had to delete the .db file before it could
be used again.  I wouldn't be surprised if you can quite effectively DoS
assorted TLS implementations with stuff like this.

(This is one of the design features of TLS-LTS, if both sides do -LTS then the
Hello only needs a single extension to specify everything.  Combine that with
PSK, so no certs, and you get quite an efficient protocol, the only thing of
any size is the keyex and server signature).

Peter.