Re: [TLS] SSL Renegotiation DOS

Martin Rex <> Tue, 15 March 2011 16:06 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id 56D623A690F for <>; Tue, 15 Mar 2011 09:06:20 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -10.221
X-Spam-Status: No, score=-10.221 tagged_above=-999 required=5 tests=[AWL=0.028, BAYES_00=-2.599, HELO_EQ_DE=0.35, RCVD_IN_DNSWL_HI=-8]
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id JKm0Vn7+WT+d for <>; Tue, 15 Mar 2011 09:06:19 -0700 (PDT)
Received: from ( []) by (Postfix) with ESMTP id E215D3A6DA1 for <>; Tue, 15 Mar 2011 09:06:18 -0700 (PDT)
Received: from by (26) with ESMTP id p2FG7g6l010180 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Tue, 15 Mar 2011 17:07:43 +0100 (MET)
From: Martin Rex <>
Message-Id: <>
Date: Tue, 15 Mar 2011 17:07:42 +0100
In-Reply-To: <> from "Jorge A. Orchilles" at Mar 15, 11 08:31:28 am
MIME-Version: 1.0
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 8bit
X-SAP: out
Subject: Re: [TLS] SSL Renegotiation DOS
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "This is the mailing list for the Transport Layer Security working group of the IETF." <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Tue, 15 Mar 2011 16:06:20 -0000

Jorge A. Orchilles wrote:
> Marsh Ray has invited me to present my research and report on SSL/TLS
> Renegotiation Denial of Service on this mailing list. I have posted this on
> my site and will paste here for your feedback:
> *SSL/TLS Renegotiation Denial of Service*
> An SSL/TLS handshake requires at least 10 times more processing power on the
> server than on the client.

I'm sorry, I completely fail to see what renegotiation has to do
with the DoS capability here.

The TLS protocol is a cryptographic protocol, and servers that expect
to talk to real clients performing the protocol as designed will attempt
to perform the cryptographic operations as requested.

A DoS-client could simply open new connections to the SSL server and
blindly fire away precompiled static SSL handshake messages, forcing the
server to do crypto work.  You should be able to make most servers
perform RSA decrypts on arbitrary data, and a significant number
to perform DHE computations.