1 / 11

Understanding the TLS Renegotiation Vulnerability and Mitigation Strategies

The TLS Renegotiation Vulnerability poses significant risks by allowing attackers to inject data processed under the client's context, potentially leading to unauthorized access and data exposure. Discovered in 2009, this vulnerability affects various protocols, including HTTP and IMAP. Mitigation can be achieved by disabling renegotiation or implementing the Renegotiation Indication Extension (RIE), which helps secure the handshake process by confirming the integrity of the renegotiated connection. This document outlines the risks, proposed fixes, and the timeline for the Renegotiation Extension.

virgo
Download Presentation

Understanding the TLS Renegotiation Vulnerability and Mitigation Strategies

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. TLS Renegotiation Vulnerability IETF-76 Joe Salowey (jsalowey@cisco.com) Eric Rescorla (ekr@rtfm.org)

  2. TLS Renegotiation Vulnerability • Discovered by Marsh Ray and Steve Dispensa of PhoneFactor - 08/2009 • Re-Discovered by Martin Rex duing Channel Binding Discussions on the TLS list – 11/2009

  3. TLS Renegotiation Client Server ---------------------Handshake------------------------- ===========Protected Data============ ============Handshake============== ===========Protected Data============ • Initial Handshake Establishes a protected channel • Re-negotiation is a new handshake run under the protection of the existing channel • Upon completion the new channel replaces the old channel

  4. Renegotiation Attack Client Attacker Server -------- Handshake------------ ===== Initial Traffic ===== -------------------------Handshake================= ============= Client Traffic=============== = • Initial traffic and client traffic are treated as originating under the same context • Attacker injected traffic may be processed under clients context • Attacker injected traffic may set up context under which client’s traffic is processed • Client handshake may use client certificates

  5. Vulnerability • Attacker injects data that is processed under client’s context • Process unauthenticated request under authenticated context • Attacker can inject data processed under client’s authorization based on client certificate • Attacker sets up context that discloses information in client’s request • Client cert authentication not necessary for attack • Complications • Renegotiation is often transparent to application • Client is not aware this is a renegotiation • Some HTTP servers support renegotiation to request client certs for a protected resource • Other protocols may be vulnerable as well • IMAP, LDAP, XMPP, SIP, SMTP, …

  6. Mitigation • Disable renegotiation • May Be required by application • Some libraries do not have interface for this • Proposed Extension • Fix TLS renegotiation • Application Mitigation • Application dependent

  7. Renegotiation Indication Extension • draft-rescorla-tls-renegotiation-00 • Hello extension containing the contents of the finished messages from the previous handshake struct { opaque renegotiated_connection<0..255>; } Renegotiation_Info;

  8. Proposed Timeline for Renegotiation Extension Document 11/15 Adopt as Working Group Item 11/16 – 11/30 Working Group Last Call 12/01 – 12/04 Resolve Comments 12/04 – 12/07 Send to IESG – AD Review 12/08 – 12/22 IETF Last Call and External Review 12/22 – 01/07 Resolve Comments 01/07 – 01/14 IESG Review 01/14 – 02/14 RFC Editor and IANA Review 02/14 RFC publication

  9. Current Open Issues • Extension Number • Requirements Language • particularly for client • Interaction with session resumption • Behavior on subsequent renegotiations • Applicability of TLS extensions • Dealing with broken extension support • SSLv3? • Needs Review

  10. Follow-on Work • Application interaction with re-negotiation • Identity comparison • API recommendations

  11. Some References • http://extendedsubset.com/Renegotiating_TLS.pdf • http://www.educatedguesswork.org/2009/11/understanding_the_tls_renegoti.html

More Related