Michael Sierchio wrote:

> Are you or are you not the same David Schwartz who claimed that SSLv3 is
> vulnerable to MITM?  If so, what have you learned since then?

        If a browser has a maliciously-included root certificate placed there 
by an attacker and is using a SOCKS proxy also controlled by an attacker, is it 
vulnerable to a MITM attack? Is there anything wrong with its SSLv3 
implementation? The correct answers are "yes, it's vulnerable to a MITM attack" 
and "no, it's still doing SSLv3 exactly right".

        SSLv3's protection against a MITM attack in the case of my browser 
connecting to https://www.amazon.com relies on no MITM having a certificate 
that my browser will accept as vaild for https://www.amazon.com. (Otherwise, he 
can successfully interpose himself in the SSL connection and decrypt all the 
data passed and re-encrypt it for the other end.)

        SSLv3 itself cannot assure me of the nonexistence of an attacker with 
such a certificate. Yet that nonexistence is part of my assurance that I'm 
immune to MITM attacks.

        If you're talking about this post:

http://www.mail-archive.com/[EMAIL PROTECTED]/msg32016.html

        The key excerpt from that post is this:

        "The MITM can run separate SSL sessions to both the server and the 
client
and proxy the plaintext between the two connections. That's well within the
scope of what a MITM can do.

        SSLv3 only provides protection against a MITM attack if one of two 
things
is the case:

        1) The end that cares about authentication (the client for HTTPS) 
compares
the name in the certificate against the name of the server it wants to talk
to, OR

        2) Only trusted parties have access to certificates signed by any CA the
end that cares about authentication trusts.

        The Internet security model employs option 1. Without it, there would 
be no
protection whatsoever from a MITM who closes both SSL sessions and proxies
the plaintext."

        And it is very important that people who use OpenSSL understand this.

        SSLv3's protection against a MITM attack when your custom program 
conneects to some other custom program relies on you designing the scheme such 
that some equivalent guarantee exists. SSLv3 can't provide that guarantee all 
by itself.

        SSLv3 provides a mechanism to protect against MITM attacks. It's up to 
the program using it to take advantage of that mechanism. You can't say "I use 
SSLv3 so I'm invulnerable to MITM attacks", but you can say, "I use SSLv3 as 
part of a comprehensive security scheme that prevents MITM attacks".

        See, for example:
http://www.pburkholder.com/sysadmin/SSL-mitm/index.php

        DS


______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [email protected]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to