Bug #2098
closedOpenSSL renegotiation vulnerability
Description
http://www.ietf.org/mail-archive/web/tls/current/msg03928.html
http://tools.ietf.org/html/draft-rescorla-tls-renegotiation-00
Potential man-in-the middle attack that appears to need a fix on both the client and server side.
Updated by darix about 15 years ago
yeah it needs a fix in your openssl implementation. what apache did was just a workaround for installations of openssl without the fix afaik.
Updated by guidot about 15 years ago
This is from http://blog.g-sec.lu/2009/11/tls-sslv3-renegotiation-vulnerability.html:
Vulnerability requirements¶
The preconditions for a TLS or SSLv3 connection to be vulnerable are- The server acknowledges and accepts full TLS renegotiations in the middle of a
connection and after the initial handshake
and - The server assumes that both TLS sessions were negotiated with the same client
and - The server treats both sessions as one and merges them at the application layer
As such this vulnerability might not been seen as a vulnerability in TLS but the as the bad choice
to merge two different requests together by the endpoint.
Updated by stbuehler about 15 years ago
- Status changed from New to Invalid
I disagree. If the ssl implementation does a "full renegotation" it still has to verify that the remote endpoint doesn't change, everything else is just stupid. It is not the job of the application to handle this; that is the point of using a library.
Also available in: Atom