TLS 1.0+ and SSL 3.0+ (known from among others "https") is vulnerable to a protocol weakness where a man in the middle could work during the renegotiation phase in modern versions the protocol. While the details had been offered in a meeting with the IETF, vendors and the open source implementers of SSL privately, it appears an IETF mailing list came to finding it again. That seems to have prompted the original finders (Marsh Ray and Steve Dispensa) to offer up their finding publicly. The news media outlets are obviously all over this. Some links aside of the usual media outlets:
There does not seem to be much you can do till the protocol is fixed. The main problem seems to be with clients using certificate authentication. Exploiting this requires the attacker to be able to intercept the traffic. Thanks to Martin, Edward, Ken and Chris for sending this in. -- |
Swa 760 Posts Nov 5th 2009 |
Thread locked Subscribe |
Nov 5th 2009 1 decade ago |
This is CVE-2009-3555
|
Anonymous |
Quote |
Nov 5th 2009 1 decade ago |
Combine this with the rogue CA[1] (200 PS3s generating certificates until an MD5 hash collision occurs) and a little ARP spoofing, and you have yourself a viable exploit.
[1] http://www.win.tue.nl/hashclash/rogue-ca/ |
amcgregor 11 Posts |
Quote |
Nov 5th 2009 1 decade ago |
http://www.sslshopper.com/article-ssl-and-tls-renegotiation-vulnerability-discovered.html offers an excellent summary.
|
amcgregor 11 Posts |
Quote |
Nov 5th 2009 1 decade ago |
Sign Up for Free or Log In to start participating in the conversation!