oss-sec mailing list archives
Re: [TLS] [oss-security] CVE-2009-3555 for TLS renegotiation MITM attacks
From: Marsh Ray <marsh () extendedsubset com>
Date: Sun, 08 Nov 2009 16:32:05 -0600
ArkanoiD wrote:
BTW renegotiation handshake looks quite similar to initial handshake from the client point of view;
Yeah, currently it looks identical.
is there a way to detect the attack on client side and drop the connection?
With draft-rescorla-tls-renegotiate, the new header comes back to the client on Server Hello, and this notifies the client that the server believes it's a re-negotation. Even better, it ties it strongly to the previous session, so legit renegotiations are protected, too. - Marsh
Current thread:
- CVE-2009-3555 for TLS renegotiation MITM attacks Mark J Cox (Nov 05)
- Re: CVE-2009-3555 for TLS renegotiation MITM attacks Florian Weimer (Nov 05)
- Re: CVE-2009-3555 for TLS renegotiation MITM attacks Eygene Ryabinkin (Nov 06)
- Re: [TLS] [oss-security] CVE-2009-3555 for TLS renegotiation MITM attacks Marsh Ray (Nov 07)
- Re: [TLS] [oss-security] CVE-2009-3555 for TLS renegotiation MITM attacks Peter Gutmann (Nov 08)
- Re: CVE-2009-3555 for TLS renegotiation MITM attacks ArkanoiD (Nov 08)
- Re: [TLS] [oss-security] CVE-2009-3555 for TLS renegotiation MITM attacks Marsh Ray (Nov 08)
- Re: [TLS] [oss-security] CVE-2009-3555 for TLS renegotiation MITM attacks Marsh Ray (Nov 07)