Re: Can'somebody tell me why SSL2 is still by default

2005-06-21 Thread Nelson B

Julien Pierre wrote:


RFC 2817 has serious security implications for clients, because it does 
not specify a distinct URL scheme for TLS upgrade. Browsers are left 
without a means to enforce encryption on the connection. It is up to the 
server to upgrade the connection to TLS - or not . I would say that the 
HTTP TLS upgrade protocol is flawed. For this reason, it should not be 
implemented in general-purpose browsers such as mozilla.


Indeed, this is the very problem that makes people want to abandon SSL2.

RFC 2817 is vulnerable to a roll-back attack.  An active attacker need only
intercept the request to ugprade to TLS and return a response saying that
it cannot do so.  The client will then continue without any SSL/TLS at all.
Even SSL2 isn't that bad!

--
Nelson B
___
Mozilla-security mailing list
Mozilla-security@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-security


Re: Can'somebody tell me why SSL2 is still by default

2005-06-14 Thread Ian G

On this thread [EMAIL PROTECTED] said to me:

  "One quick comment (I will likely respond in more detail later) - SSL V2 
  should now be off across our entire complex.  If you know of any cases 
  where we have specific servers that are still accepting V2 connections, 
  please can you let me know - I will request that it gets turned off."

The word is spreading!

iang
-- 
Advances in Financial Cryptography, Issue 1:
   https://www.financialcryptography.com/mt/archives/000458.html
Daniel Nagy, On Secure Knowledge-Based Authentication
Adam Shostack, Avoiding Liability: An Alternative Route to More Secure Products
Ian Grigg, Pareto-Secure
___
Mozilla-security mailing list
Mozilla-security@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-security


Re: Can'somebody tell me why SSL2 is still by default

2005-06-13 Thread Nelson Bolyard

Peter Gutmann wrote:

[snip] Are there products around that will
actually reject an MSIE handshake with its wrong version number?  


Yes, All NSS-based server products will do that by default.
There is a configuration option to disable the version roll-back
detection, and it is conceivable that some NSS-based server products
have turned it on, but I doubt it.  When NSS-based server products
have problems, I always hear about it, and I've yet to hear a complaint
that boils down to "IE with TLS enabled doesn't work with our servers".
___
Mozilla-security mailing list
Mozilla-security@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-security


Re: Can'somebody tell me why SSL2 is still by default

2005-06-03 Thread Peter Gutmann
Nelson B <[EMAIL PROTECTED]> writes:

>Peter Gutmann wrote:
>> Gervase Markham <[EMAIL PROTECTED]> writes:

>>>SSL3 has a mechanism for detecting an attacker attempting to downgrade a 
>>>connection between two SSL3 endpoints to SSL2 in order to MITM it, if 
>>>that's what you mean.
>> 
>> However for TLS Microsoft got their implementation of this wrong (it's still
>> wrong in the latest versions of MSIE, last time I checked), so all other
>> implementations don't use it in order to work with MSIE/IIS:

>Actually, quite a few server products DO properly implement version roll-back
>detection.  I think that's one reason why IE keeps TLS disabled by default.
>Dunno why they don't just fix it.

Because in order to be compatible with MSIE, everyone else has to break their
code, so there's no need to fix it :-).  Are there products around that will
actually reject an MSIE handshake with its wrong version number?  Since I
never use MSIE (apart from testing my own code), I haven't noticed any
problems with connecting.  I know that when I first saw it I asked another SSL
developer about it and he said it was a known problem, and the solution was
just to ignore the invalid version number for an MSIE connect.

Peter.

___
Mozilla-security mailing list
Mozilla-security@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-security


Re: Can'somebody tell me why SSL2 is still by default

2005-06-01 Thread Julien Pierre

Ian,

Ian G wrote:


That was my thought also.  And what's more, Ben posted on my
blog at https://www.financialcryptography.com/mt/archives/000463.html
a week back that

Apache 2.1 supports TLS upgrade -
http://httpd.apache.org/docs-2.1/mod/mod_ssl.html#sslengine

"New in Apache 2.1, SSLEngine can be set to optional.
This enables support for RFC 2817, Upgrading to TLS
Within HTTP/1.1. At this time no web browsers support
RFC 2817."

The only thing I've ever run into in "the wild" that actually
does TLS upgrade as a client is CUPS.

Posted by: Ben at May 21, 2005 03:22 PM

Sounds very cool and desirable, but it also sounds different
to vhosts support.

iang


RFC 2817 has serious security implications for clients, because it does 
not specify a distinct URL scheme for TLS upgrade. Browsers are left 
without a means to enforce encryption on the connection. It is up to the 
server to upgrade the connection to TLS - or not . I would say that the 
HTTP TLS upgrade protocol is flawed. For this reason, it should not be 
implemented in general-purpose browsers such as mozilla.


The TLS server name indication extension for CLIENT HELO does not have 
this security problem, and is the preferred solution to solve the 
problem of multiple server certs on a single IP/port .

___
Mozilla-security mailing list
Mozilla-security@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-security


Re: Can'somebody tell me why SSL2 is still by default

2005-06-01 Thread Ian G
On Wednesday 01 June 2005 19:01, Gervase Markham wrote:
> Duane wrote:
> > This is especially important for web related uses
> > as you could also send the hostname you wanted to connect to before
> > doing the handshaking, which means if a server has 50 certificates to
> > choose from, and you send a specific hostname it can try and match that
> > and send you the right certificate, rather then sending a certificate
> > which is currently the case. Due to being able to reuse ports it was
> > also supposed to serve the (perceived) purpose of reducing the number of
> > IPs needed by web hosting companies for encrypted websites.
>
> As I understand it, this ability (vhosting) is part of SSL 3 as well...

That was my thought also.  And what's more, Ben posted on my
blog at https://www.financialcryptography.com/mt/archives/000463.html
a week back that

Apache 2.1 supports TLS upgrade -
http://httpd.apache.org/docs-2.1/mod/mod_ssl.html#sslengine

"New in Apache 2.1, SSLEngine can be set to optional.
This enables support for RFC 2817, Upgrading to TLS
Within HTTP/1.1. At this time no web browsers support
RFC 2817."

The only thing I've ever run into in "the wild" that actually
does TLS upgrade as a client is CUPS.

Posted by: Ben at May 21, 2005 03:22 PM

Sounds very cool and desirable, but it also sounds different
to vhosts support.

iang
-- 
Advances in Financial Cryptography:
   https://www.financialcryptography.com/mt/archives/000458.html
___
Mozilla-security mailing list
Mozilla-security@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-security


Re: Can'somebody tell me why SSL2 is still by default

2005-06-01 Thread Gervase Markham

Duane wrote:

This is especially important for web related uses
as you could also send the hostname you wanted to connect to before
doing the handshaking, which means if a server has 50 certificates to
choose from, and you send a specific hostname it can try and match that
and send you the right certificate, rather then sending a certificate
which is currently the case. Due to being able to reuse ports it was
also supposed to serve the (perceived) purpose of reducing the number of
IPs needed by web hosting companies for encrypted websites.


As I understand it, this ability (vhosting) is part of SSL 3 as well...

Gerv
___
Mozilla-security mailing list
Mozilla-security@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-security


Re: Can'somebody tell me why SSL2 is still by default

2005-06-01 Thread Duane
Ian G wrote:

> Something I've been meaning to ask - is there any particular
> reason to continue to discuss SSLv3 when instead we could
> just talk about and promote TLSv1 ?  That is, is there anything
> in the two specs and the deployed implementations that might
> make one or the other incompatible?

TLS was supposed to replace SSLv3 because of functionality reasons more
then security ones, in that you could have a port (say 80) that could
then escalate to encryption if asked.

One of the most widely deployed uses of this is SMTP-TLS, both encrypted
and non-encrypted uses the same port (port 25) but when the client first
connects to the server it sends a signal to start the encryption
handshaking process. This is especially important for web related uses
as you could also send the hostname you wanted to connect to before
doing the handshaking, which means if a server has 50 certificates to
choose from, and you send a specific hostname it can try and match that
and send you the right certificate, rather then sending a certificate
which is currently the case. Due to being able to reuse ports it was
also supposed to serve the (perceived) purpose of reducing the number of
IPs needed by web hosting companies for encrypted websites.

-- 

Best regards,
 Duane

http://www.cacert.org - Free Security Certificates
http://www.nodedb.com - Think globally, network locally
http://www.sydneywireless.com - Telecommunications Freedom
http://happysnapper.com.au - Sell your photos over the net!
http://e164.org - Using Enum.164 to interconnect asterisk servers

"In the long run the pessimist may be proved right,
but the optimist has a better time on the trip."
___
Mozilla-security mailing list
Mozilla-security@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-security


Re: Can'somebody tell me why SSL2 is still by default

2005-06-01 Thread Ian G

> Nelson B wrote:
> > Please read appendix E.2 of the SSL3 specification and TLS standard.
> > (It's the same appendix and same text in both documents).
> > SSL3 spec:http://wp.netscape.com/eng/ssl3/draft302.txt
> > TLS standard: http://www.rfc-editor.org/rfc/rfc2246.txt

Something I've been meaning to ask - is there any particular
reason to continue to discuss SSLv3 when instead we could
just talk about and promote TLSv1 ?  That is, is there anything
in the two specs and the deployed implementations that might
make one or the other incompatible?

Now, this is a completely minor and forgettable question - It is
clearly much more important to seek&destroy SSLv2 wherever
she may be found so as to get to the possibility of running more
vhosts and much more TLS.  I wouldn't want to derail that, but
I was curious briefly...

iang
-- 
Advances in Financial Cryptography:
   https://www.financialcryptography.com/mt/archives/000458.html
___
Mozilla-security mailing list
Mozilla-security@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-security


Re: Can'somebody tell me why SSL2 is still by default

2005-05-31 Thread Kikx
Nelson B wrote:

> I agree.  In fact that's my point.  If you're worried about the potential
> use of 40-bit ssl2 ciphers, then disable the 40-bit ciphers.

It's not just for me ... because i have already done that ... but it is
for 90% of the people using mozilla ... and who don't know about what is
a cipherlist ...


Anyway ... I believe that we get the same point
___
Mozilla-security mailing list
Mozilla-security@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-security


Re: Can'somebody tell me why SSL2 is still by default

2005-05-31 Thread Nelson B

Kikx wrote:

Nelson Bolyard wrote:


2. That SSL2 allows an attacker to "force you ... to use a very weak
  encryption".  That's just not true.  3DES and 128-bit RC43 are no
  weaker with SSL2 than with SSL3.  An SSL2 client can choose to disallow
  the "40-bit" ciphers, just as an SSL3 client can.  Likewise, an SSL3
  client that allows 40-bit ciphers is just as vulnerable with those
  ciphers as is an SSL2 client.



I 'm totally on your side and I approve what you say
But the fact is I consider that an attack is an attack if It successes
most of the time ... As 40 bit cipher are allowed 


Perhaps you mean "when the client allows 40-bit ciphers".
But the client does not always allow 40-bit ciphers.
I have configured my mozilla client to disallow ssl2 40-bit ciphers.
No version roll-back attack can force my ssl2 client to use weaker
ciphers than those it has been configured to use.

it is possible to lower the encryption (for most of the people) 


For all  of the people who enable  ssl2's 40-bit ciphers, and
for NONE of the people who disable ssl2's weaker ciphers.


but only that we should not accuse it of being vulnerable to things it
is not.


To be really clear
- SSLv2 with high encryption is as secure as SSLv3 with high encryption
- SSLv2 allows to downgrade the encryption (perhaps we can detect it but
most of the time it is not implemented on servers)


ssl2 allows an active attacker to force the connection to use a cipher of
its choose from among the ciphers enabled mutually by the client and server.
If a client enables only "128-bit" ssl2 ciphers, the attacker cannot force
the client to use weaker encryption.


We  have to clearly separate the encryption and the protocol which are
definitely different


I agree.  In fact that's my point.  If you're worried about the potential
use of 40-bit ssl2 ciphers, then disable the 40-bit ciphers.


Thanks for your advise but the fact is that we can do one thing : It is
to change some things on mozilla ... not one some servers in the world
which don't want to upgrade...


Thanks for your advice.

--
Nelson BSSL/TLS engineer/developer for mozilla
___
Mozilla-security mailing list
Mozilla-security@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-security


Re: Can'somebody tell me why SSL2 is still by default

2005-05-31 Thread Kikx
Nelson B wrote:

> Please read appendix E.2 of the SSL3 specification and TLS standard.
> (It's the same appendix and same text in both documents).
> SSL3 spec:http://wp.netscape.com/eng/ssl3/draft302.txt
> TLS standard: http://www.rfc-editor.org/rfc/rfc2246.txt
Thanks for this interesting link

> But not all SSL2+SSL3 capable servers implement that rollback attack
> detection.  I'd guess that the server you used is one of those that does
> not.

Yes I think so ... I tried with a couple of servers but definitly not
all servers :)

Thanks

Kikx

Very interesting
___
Mozilla-security mailing list
Mozilla-security@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-security


Re: Can'somebody tell me why SSL2 is still by default

2005-05-31 Thread Kikx
Nelson Bolyard wrote:

> 2. That SSL2 allows an attacker to "force you ... to use a very weak
>encryption".  That's just not true.  3DES and 128-bit RC43 are no
>weaker with SSL2 than with SSL3.  An SSL2 client can choose to disallow
>the "40-bit" ciphers, just as an SSL3 client can.  Likewise, an SSL3
>client that allows 40-bit ciphers is just as vulnerable with those
>ciphers as is an SSL2 client.

I 'm totally on your side and I approve what you say
But the fact is I consider that an attack is an attack if It successes
most of the time ... As 40 bit cipher are allowed it is possible to
lower the encryption (for most of the people) ... but the fact is even
we accept lowest encryption SSL3 avoid changing the cipher list and then
the downgrading attack is just useless ... SSLv3 has been implemented in
order to be more secure than SSLv2 concerning this issue (not just for
that but it is one of the problems)

> but only that we should not accuse it of being vulnerable to things it
> is not.
To be really clear
- SSLv2 with high encryption is as secure as SSLv3 with high encryption
- SSLv2 allows to downgrade the encryption (perhaps we can detect it but
most of the time it is not implemented on servers)

We  have to clearly separate the encryption and the protocol which are
definitely different
> I think we are getting ever closer to the day when mozilla can and will
> do that.

I think so
> 
> Personally, I think we should be more concerned with servers that still
> use only the old "export" (a.k.a. 40-bit") ciphers, whether SSL2 or SSL3.

Thanks for your advise but the fact is that we can do one thing : It is
to change some things on mozilla ... not one some servers in the world
which don't want to upgrade...

One more time it is not a critisism ... I want just to have an other
point of view in order to make some improvements

Kikx
___
Mozilla-security mailing list
Mozilla-security@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-security


Re: Can'somebody tell me why SSL2 is still by default

2005-05-26 Thread Nelson B

Peter Gutmann wrote:

Gervase Markham <[EMAIL PROTECTED]> writes:


SSL3 has a mechanism for detecting an attacker attempting to downgrade a 
connection between two SSL3 endpoints to SSL2 in order to MITM it, if 
that's what you mean.


However for TLS Microsoft got their implementation of this wrong (it's still
wrong in the latest versions of MSIE, last time I checked), so all other
implementations don't use it in order to work with MSIE/IIS:


Actually, quite a few server products DO properly implement version roll-back
detection.  I think that's one reason why IE keeps TLS disabled by default.
Dunno why they don't just fix it.

--
Nelson B
___
Mozilla-security mailing list
Mozilla-security@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-security


Re: Can'somebody tell me why SSL2 is still by default

2005-05-26 Thread Peter Gutmann
Gervase Markham <[EMAIL PROTECTED]> writes:

>Kikx wrote:
>> Yes ...
>> but there is still 2 solutions
>>  - A very big warning if we speak in SSL3 and the answer came in SSL2

>SSL3 has a mechanism for detecting an attacker attempting to downgrade a 
>connection between two SSL3 endpoints to SSL2 in order to MITM it, if 
>that's what you mean.

However for TLS Microsoft got their implementation of this wrong (it's still
wrong in the latest versions of MSIE, last time I checked), so all other
implementations don't use it in order to work with MSIE/IIS:

/* Microsoft braindamage, even the latest versions of MSIE still send
   the wrong version number for the premaster secret (making it look
   like a rollback attack), so if we're expecting 3.1 and get 3.0, it's
   MSIE screwing up */

Reminds me of the scene from "Asterix in Egypt" where the sphinx souvenir
sellers are busy chiselling the noses off their statues, because it's more
important to be conformant than correct.

Peter.

___
Mozilla-security mailing list
Mozilla-security@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-security


Re: Can'somebody tell me why SSL2 is still by default

2005-05-25 Thread Nelson Bolyard

Kikx wrote:

Considering that it's a lack of security and allow man in the middle
attack (down negociation only) and even if you would like to use TLS or
SSL3 an attaquant can just force you to go to SSL2 and then to use a
very weak encryption without any warning ...


There are two statements (or implied statements) here that I think need
to be addressed:

1. That SSL2 "allow[s] man in the middle attack".

   Protocol version rollback is NOT the same as a Man In The Middle attack.
   Rollback is an "active" attack, and a real attack, but of limited
   consequence for SSL2.  I'm not saying we should ignore it, but only
   that we should not inflate it by calling it something worse than it is.

2. That SSL2 allows an attacker to "force you ... to use a very weak
   encryption".  That's just not true.  3DES and 128-bit RC43 are no
   weaker with SSL2 than with SSL3.  An SSL2 client can choose to disallow
   the "40-bit" ciphers, just as an SSL3 client can.  Likewise, an SSL3
   client that allows 40-bit ciphers is just as vulnerable with those
   ciphers as is an SSL2 client.

My point is not that SSL2 is flawless, nor that its life should be prolonged
but only that we should not accuse it of being vulnerable to things it is not.
Our decisions on whether or not to use SSL2 should be based on facts about
its strengths and weaknesses.

I really think that mozilla should disable SSL2 


I think we are getting ever closer to the day when mozilla can and will
do that.


or warning a lot when asking in ssl3 and the server response in SSL2 !!!


I hope you realize that means warning for EVERY SSL2 server.


Kikx


Personally, I think we should be more concerned with servers that still
use only the old "export" (a.k.a. 40-bit") ciphers, whether SSL2 or SSL3.

/Nelson
___
Mozilla-security mailing list
Mozilla-security@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-security


Re: Can'somebody tell me why SSL2 is still by default

2005-05-21 Thread Nelson B

Kikx wrote:

Gervase Markham wrote:



SSL3 has a mechanism for detecting an attacker attempting to downgrade a
connection between two SSL3 endpoints to SSL2 in order to MITM it, if
that's what you mean.



I don't understand your point ... I have writen a program a couple of
month before with downgrade a connection to SSL 2 without any warning ...


So, you've implemented a version rollback attack.  That's an active attack,
but is not the same as an MITM.


And I can't understand how the "mechanism" works because before the
handshake you have no security and as the attaker ask for an SSL2
connexion, there is no more checksum for the transaction in clear text
... then as the transaction in clear are not checked ... the attaker can
do whatever he wants  (assuming that both of endpoints will accept
such a level of encryption)


Please read appendix E.2 of the SSL3 specification and TLS standard.
(It's the same appendix and same text in both documents).
SSL3 spec:http://wp.netscape.com/eng/ssl3/draft302.txt
TLS standard: http://www.rfc-editor.org/rfc/rfc2246.txt

When a client that is capable of speaking SSL3 does an SSL2 RSA encryption
operation, it includes some information in the encrypted data that
identifies it as an SSL3 capable client.  If the server is a real ssl2-only
server, it will ignore this information and proceed normally.  If the
server is one that is capable of using both SSL2 and SSL3/TLS, then it
should detect that it is talking with the SSL2 protocol to an SSL3-capable
client, and should treat that as a sign of a version rollback attack.
It can then terminate the handshake with an SSL3/TLS alert about the
rollback, or if it is an https server, it can complete the handshake but
then return a web page that reports the attack.

But not all SSL2+SSL3 capable servers implement that rollback attack
detection.  I'd guess that the server you used is one of those that does not.

--
Nelson B
___
Mozilla-security mailing list
Mozilla-security@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-security


Re: Can'somebody tell me why SSL2 is still by default

2005-05-20 Thread Kikx
Gervase Markham wrote:
> Kikx wrote:
> 
>> Yes ...
>> but there is still 2 solutions
>> - A very big warning if we speak in SSL3 and the answer came in SSL2
> 
> 
> SSL3 has a mechanism for detecting an attacker attempting to downgrade a
> connection between two SSL3 endpoints to SSL2 in order to MITM it, if
> that's what you mean.

I don't understand your point ... I have writen a program a couple of
month before with downgrade a connection to SSL 2 without any warning ...
And I can't understand how the "mechanism" works because before the
handshake you have no security and as the attaker ask for an SSL2
connexion, there is no more checksum for the transaction in clear text
... then as the transaction in clear are not checked ... the attaker can
do whatever he wants  (assuming that both of endpoints will accept
such a level of encryption)

After that I can understand that we can't just disable the SSL2 but a
warning should be welcomed ... and this warning is not in the SSL2 or
SSL3 protocols

Regards

Kikx
___
Mozilla-security mailing list
Mozilla-security@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-security


Re: Can'somebody tell me why SSL2 is still by default

2005-05-20 Thread Gervase Markham
Kikx wrote:
Yes ...
but there is still 2 solutions
- A very big warning if we speak in SSL3 and the answer came in SSL2
SSL3 has a mechanism for detecting an attacker attempting to downgrade a 
connection between two SSL3 endpoints to SSL2 in order to MITM it, if 
that's what you mean.

	- A simple disabling of SSL2
We can't do this until we know how many servers out there are still SSL 
2 only, and try and get them fixed. I'm working on getting some data here.

Gerv
___
Mozilla-security mailing list
Mozilla-security@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-security


Re: Can'somebody tell me why SSL2 is still by default

2005-05-19 Thread Kikx
Yes ...
but there is still 2 solutions
- A very big warning if we speak in SSL3 and the answer came in SSL2
- A simple disabling of SSL2

Honnestly I don't know what is the best 

___
Mozilla-security mailing list
Mozilla-security@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-security


Re: Can'somebody tell me why SSL2 is still by default

2005-05-19 Thread Ian G
On Thursday 19 May 2005 12:07, Kikx wrote:
> Considering that it's a lack of security and allow man in the middle
> attack (down negociation only) and even if you would like to use TLS or
> SSL3 an attaquant can just force you to go to SSL2 and then to use a
> very weak encryption without any warning ...
>
> I really think that mozilla should disable SSL2 or warning a lot when
> asking in ssl3 and the server response in SSL2 !!!

Yes, you are not alone.  Gerv recently posted for
internal Mozilla consumption (I think) a proposal
to test this more formally.

http://weblogs.mozillazine.org/gerv/archives/008157.html

Spread the word ... turn off SSLv2 everywhere
manually.  In servers, browsers, etc.  If any
problems come to light, we can then at least
examine them and decide what to do, but
given the terribly low numbers of SSL v2 only
servers out there (under 2%) I don't see that
there will be a problem.

iang
-- 
Advances in Financial Cryptography:
   https://www.financialcryptography.com/mt/archives/000458.html
___
Mozilla-security mailing list
Mozilla-security@mozilla.org
http://mail.mozilla.org/listinfo/mozilla-security