Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Security IT

Man-In-the-Middle Vulnerability For SSL and TLS 170

imbaczek writes "The SSL 3.0+ and TLS 1.0+ protocols are vulnerable to a set of related attacks which allow a man-in-the-middle (MITM) operating at or below the TCP layer to inject a chosen plaintext prefix into the encrypted data stream, often without detection by either end of the connection. This is possible because an 'authentication gap' exists during the renegotiation process, at which the MitM may splice together disparate TLS connections in a completely standards-compliant way. This represents a serious security defect for many or all protocols which run on top of TLS, including HTTPS."
This discussion has been archived. No new comments can be posted.

Man-In-the-Middle Vulnerability For SSL and TLS

Comments Filter:
  • Re:oh joy (Score:3, Insightful)

    by toleraen ( 831634 ) * on Thursday November 05, 2009 @10:41AM (#29994652)
    If the only place the exploiters were getting their info from was Slashdot, this world would be a much more secure place, and the attacks that did make it through would have more ponies.
  • Re:oh joy (Score:5, Insightful)

    by Albanach ( 527650 ) on Thursday November 05, 2009 @10:44AM (#29994700) Homepage

    Millions of potential exploiters didn't know about it, until now.

    Millions of ordinary people didn't know there was a vulnerability until now. Who knows how many bad guys knew already though?

    Knowing of a potential vulnerability allows people to alter their behaviour if they deem that an appropriate response. Systems administrators can examine setups to see if they can use other methods to secure communications and it also allows all those who have written applications to examine their code.

    I'd rather know of a vulnerability and respond, than not know while others are potentially exploiting it.

  • by AbbeyRoad ( 198852 ) <p@2038bug.com> on Thursday November 05, 2009 @11:06AM (#29994938)

    Am OpenSSL patch (http://www.links.org/files/no-renegotiation-2.patch) disables SSL
    renegotiation, closing the security hole.

    But let me ask this : who would ever require SSL renegotiation in practice?

    I mean seriously -- changing the cipher in the middle of an SSL session??
      -- no mainstream scenario would ever do this.

    A question comes to mind why renegotiation was ever supported in the first place.

    The next question is what OTHER seldom-used "features" are supported by
    most SSL implementations that are just supported so that the implementation
    can claim full RFC compliance, but are never actually used by real web sites.

    My own SSL builds disable everything except RC4-*-RSA

  • Use PGP/GNUPG auth (Score:2, Insightful)

    by elucido ( 870205 ) on Thursday November 05, 2009 @11:07AM (#29994948)

    Maybe its time we stop using SSL and just use GNUPG Auth. Let the user generate their own key and be responsible for their own security, or lets just use smart card readers. We make impossible to secure our machines due to our institutional insecurity. This way we can use it as an excuse to blame terrorists and get the feds involved.

    Why aren't smart cards the norm? Why are we using passwords at all?

  • by Anonymous Coward on Thursday November 05, 2009 @11:09AM (#29994980)

    It's news in the sense that TLS provides an authentication mechanism specifically designed against this kind of attack.

  • by L4t3r4lu5 ( 1216702 ) on Thursday November 05, 2009 @11:15AM (#29995050)
    Unfortunately, that's incorrect. By hearing (reading) the joke, you have observed its state. This has destroyed the alternative quantum state of the joke.

    What will really irritate quantum physicists in this instance is that, unfortunately, the joke is both funny and unfunny at the same time. The state of the joke relies upon the opinion of the observer, not any quantum juxtaposition.

    In fact, I'm not so sure this is related to quantum phy... Oh.
  • Wrong Impression? (Score:3, Insightful)

    by Dareth ( 47614 ) on Thursday November 05, 2009 @11:27AM (#29995190)

    I had the impression that we paid money to SSL certificate providers because they provided security and identify confirmation. Maybe that was just a wrong impression.

  • by John Hasler ( 414242 ) on Thursday November 05, 2009 @11:53AM (#29995510) Homepage

    > The second situation occurs ALL THE TIME in web services that require
    > different levels of trust for different content within the same site.

    Don't do that.

  • by John Hasler ( 414242 ) on Thursday November 05, 2009 @11:55AM (#29995542) Homepage

    You pay money to certificate providers so that your customers won't be frightened away by scary browser warnings.

  • by Anonymous Coward on Thursday November 05, 2009 @12:23PM (#29995888)

    Most people don't use client authentication and there is typically little reason to ever configure a server to change ciphers or otherwise initiate renegotiation.

    If the server does not initiate renegotiation the MITM attack does not apply! This is why there is such focus on client authentication because this is realistically the only real world case where renegotiation makes any logical sense. Sure you can dream up other scenarios where the server forces you to use a higher strenght cipher to access specific content but realistically this is nonsensical. Operators make a global stand WRT cipher strength at the site level.

    TLS was written back in the day when we had low and ultra low export quality ciphers and more international encryption issues than exist today. All sane operators have since disabled these and all browsers that matter have reasonably high strength ciphers available to them mitigating any reason to renegotiate.

    Yes it should be fixed.
    No its not the end of the world.

  • by Nursie ( 632944 ) on Thursday November 05, 2009 @12:24PM (#29995900)

    Of course it is! This is terrible advice!

    SSLv2 isn't widely used any more precisely because it's got systemic vulnerabilities. What's needed is a new revision of the protocol or the removal of the renegotiation feature.

  • by muckracer ( 1204794 ) on Thursday November 05, 2009 @12:30PM (#29995992)

    > You pay money to certificate providers so that your customers won't be
    > frightened away by scary browser warnings.

    Which they get anyway....and next ignore. Yippie Skippy!

    While the SSL crypto part is pretty neat, I always felt the commercial CA
    thing is one of the biggest money-making rip-off's in the entire IT field.
    Nor do I believe it to be secure or "trust" it. We always assume MITM's to be
    someone without access to the CA's themselves. Frankly, the people I worry
    more about are those, that DO have access to the CA's and are thus able to
    create perfectly valid certificates at a whim for any application, incl. a
    chained MITM attack. SSL is, IMHO, not in any shape safe from certain
    government intrusions. Ironically, likely due to the so-called "trust" model
    it employs.

  • by Anonymous Coward on Thursday November 05, 2009 @12:41PM (#29996118)

    No, SSL client auth works just fine w/o renegotiates. Only some scenarios (client auth only for some resources on the site) or implementations (a webserver made in the american north-west) use renegotiates.

  • by schon ( 31600 ) on Thursday November 05, 2009 @01:14PM (#29996532)

    Let the user [...] be responsible for their own security

    Yes, because as all of the botnets have shown, that works so well in practice.

I tell them to turn to the study of mathematics, for it is only there that they might escape the lusts of the flesh. -- Thomas Mann, "The Magic Mountain"

Working...