TLS server keys in DNS: proof-of-concept NSS implementation

2011-02-15 Thread Matt McCutchen
On Feb 5, 4:13 pm, Nelson B Bolyard nel...@bolyard.me wrote: With regard to NSS, I think that if NSS ignores it, and is found to not adequately facilitate the implementation of DANE, it may become irrelevant. Here is a start: https://mattmccutchen.net/cryptid/#nss-dane Obviously, this has a

Re: PK11_CipherOp with RC4 and invalid memory access

2010-06-22 Thread Matt McCutchen
On Jun 22, 1:49 am, Nelson Bolyard nonelsons...@nobolyardspam.me wrote: I presume that there must be some incantation that one can give to valgrind that will force it to shut up about arcfour. You can write a valgrind suppression, which is essentially a stack trace pattern that will cause

Re: (nss-3.12.6) unable to engage FIPS mode: security library: invalid arguments.

2010-06-12 Thread Matt McCutchen
On Jun 12, 2:25 pm, Nelson B Bolyard nel...@bolyard.me wrote: On 2010-06-10 22:59 PDT, Robin H. Johnson wrote: The testcase has been run on Arch and Fedora now, and both of those cases it works fine. Does that mean this problem is resolved? As I read, it is not; it was reported on Gentoo

Re: Purpose of refusing to renegotiate with non-RFC-5746 servers

2010-05-25 Thread Matt McCutchen
On May 25, 2:24 pm, Wan-Teh Chang w...@google.com wrote: On Tue, May 25, 2010 at 11:06 AM, Marsh Ray ma...@extendedsubset.com wrote: But by that logic, the client should refuse to handshake at all with a non-RFC-5746 server. (In reality that eventually needs to become the default behavior).

Re: The Rational Rejection of Security Advice by Users by Cormac Herley

2010-05-21 Thread Matt McCutchen
On May 21, 1:46 am, Kurt Seifried k...@seifried.org wrote: m...@mattmccutchen.net wrote: I'm not claiming that the user knows.  I only said that if there is in fact no impersonation, then the error is a false positive. [...] For you to claim that the browser should be able to determine the

Re: The Rational Rejection of Security Advice by Users by Cormac Herley

2010-05-20 Thread Matt McCutchen
On Mon, 2010-05-17 at 13:25 -0500, Marsh Ray wrote: Imagine how fast sites would fix their certs if the scary page proposed keyword alternative sites that did not have cert issues. You can't assume that it's the site's fault. A competitor could be MITM-ing the connection and showing a bad

Purpose of refusing to renegotiate with non-RFC-5746 servers

2010-05-20 Thread Matt McCutchen
When security.ssl.allow_unrestricted_renego_everywhere__temporarily_available_pref is off, Firefox will refuse to perform a server-initiated renegotiation with a non-RFC-5746 server. What is the purpose of this behavior? It doesn't mitigate the vulnerability because in the attack scenario, the

Re: The Rational Rejection of Security Advice by Users by Cormac Herley

2010-05-20 Thread Matt McCutchen
On May 19, 11:28 am, Eddy Nigg eddy_n...@startcom.org wrote: Well, just for the record, lets get this strait - there are no false positives. I have NEVER encountered an error with a web site and there was no reason for it. Either the certificate was not trusted or the domain did not match or

Re: The Rational Rejection of Security Advice by Users by Cormac Herley

2010-05-20 Thread Matt McCutchen
On Fri, 2010-05-21 at 04:02 +0300, Eddy Nigg wrote: On 05/21/2010 03:23 AM, From Matt McCutchen: On May 19, 11:28 am, Eddy Niggeddy_n...@startcom.org wrote: Well, just for the record, lets get this strait - there are no false positives. I have NEVER encountered an error with a web site

Re: Alerts on TLS Renegotiation

2010-04-21 Thread Matt McCutchen
On Mon, 2010-04-19 at 15:10 -0500, Marsh Ray wrote: Direct your energy at the problem you want to solve. Talk to some server admins. Ask them why they are reluctant to take action. Find some real industry representatives. Ask for their help. The first thing they need from you is a

Re: Alerts on TLS Renegotiation

2010-04-21 Thread Matt McCutchen
On Mon, 2010-04-19 at 14:00 -0700, Robert Relyea wrote: It's not going to look so great for Mozilla when another prominent browser vendor ships another patch which also notifies the user of the insecure connection. Mozilla is phasing in, just like Opera. You can see some in the list is

Re: Alerts on TLS Renegotiation

2010-04-18 Thread Matt McCutchen
On Fri, 2010-04-09 at 02:45 +0200, Kai Engert wrote: On 09.04.2010 00:41, Matt McCutchen wrote: On Thu, 2010-04-08 at 09:59 -0700, Robert Relyea wrote: The yellow larry is a good proposal, and probably implementable much sooner than noisy warnings. I'm glad you like it. I guess

Re: Alerts on TLS Renegotiation

2010-04-18 Thread Matt McCutchen
On Sat, 2010-04-10 at 08:10 -0700, johnjbarton wrote: On 4/9/2010 6:06 PM, Matt McCutchen wrote: Are you saying that Mozilla shouldn't encourage users to bother their server operators because if the problem were real, the server operators would already have fixed it? I think you give

Re: Alerts on TLS Renegotiation

2010-04-09 Thread Matt McCutchen
On Fri, 2010-04-09 at 09:34 -0700, johnjbarton wrote: On 4/8/2010 12:13 PM, Matt McCutchen wrote: On Thu, 2010-04-08 at 09:35 -0700, johnjbarton wrote: On 4/7/2010 9:35 PM, Nelson B Bolyard wrote: ... Inconveniencing the users is a NECESSARY part of getting this vulnerability fixed

Re: Alerts on TLS Renegotiation

2010-04-08 Thread Matt McCutchen
On Thu, 2010-04-08 at 09:35 -0700, johnjbarton wrote: On 4/7/2010 9:35 PM, Nelson B Bolyard wrote: ... Inconveniencing the users is a NECESSARY part of getting this vulnerability fixed. Without that, the servers have NO INCENTIVE to lift a finger to fix this. ... The claim is

Re: Alerts on TLS Renegotiation

2010-04-08 Thread Matt McCutchen
On Thu, 2010-04-08 at 09:59 -0700, Robert Relyea wrote: The yellow larry is a good proposal, and probably implementable much sooner than noisy warnings. I'm glad you like it. I guess the next thing needed is for someone to actually implement it, perhaps me if I can figure out how. -- Matt

Re: Domain-validated name-constrained CA certificates?

2010-04-07 Thread Matt McCutchen
On Apr 7, 4:54 am, Jean-Marc Desperrier jmd...@gmail.com wrote: Matt McCutchen wrote: On Apr 6, 5:54 am, Jean-Marc Desperrierjmd...@gmail.com  wrote:  Matt McCutchen wrote:    An extended key usage of TLS Web Server Authentication on the    intermediate CA would constrain all sub

Re: Alerts on TLS Renegotiation

2010-04-07 Thread Matt McCutchen
On Apr 3, 9:45 am, Jean-Marc Desperrier jmd...@free.fr wrote: It's the sites that need to catch on those updates. And web developers can have power to influence those sites to update. FWIW, I am a DreamHost customer and I just submitted a support ticket with them to close the vulnerability for

Re: Alerts on TLS Renegotiation

2010-04-07 Thread Matt McCutchen
On Apr 4, 6:48 am, Eddy Nigg eddy_n...@startcom.org wrote: It's trivial from the logical point of view. That's easy for you to say. Even things that are logically trivial are easy to miss unless one goes carefully over every single step of the process. For instance, I used a little script to

Re: Domain-validated name-constrained CA certificates?

2010-04-07 Thread Matt McCutchen
On Apr 7, 12:47 am, Kurt Seifried k...@seifried.org wrote: What about www.paypal.com[NULL].yourcompany.com? I assume that would be allowed by the name constraint with respect to fixed software, but still hit some older software that has the NULL certificate bug. I think

Re: Alerts on TLS Renegotiation

2010-04-07 Thread Matt McCutchen
On Wed, 2010-04-07 at 09:55 -0700, johnjbarton wrote: On 4/4/2010 10:41 PM, Daniel Veditz wrote: On 4/3/10 9:30 AM, johnjbarton wrote: If the *users* of Firefox are truly in jeopardy, then this alert should be provided to *users*. Since this alert is not shown to users I can only assume

Re: Domain-validated name-constrained CA certificates?

2010-04-06 Thread Matt McCutchen
On Apr 6, 5:54 am, Jean-Marc Desperrier jmd...@gmail.com wrote: Matt McCutchen wrote: An extended key usage of TLS Web Server Authentication on the intermediate CA would constrain all sub-certificates, no? You are here talking about a proprietary Microsoft extension of the X509 security

Re: Domain-validated name-constrained CA certificates?

2010-04-06 Thread Matt McCutchen
On Apr 6, 5:58 am, Jean-Marc Desperrier jmd...@gmail.com wrote: Ah ! The direction of restricting people who currently use sub-CA for their purpose to make it more secure will certainly be much more successful than presenting it as allowing many more people to have their own sub-CA. But I do

Re: Domain-validated name-constrained CA certificates?

2010-04-06 Thread Matt McCutchen
On Wed, 2010-04-07 at 05:17 +0300, Eddy Nigg wrote: On 04/07/2010 05:01 AM, Matt McCutchen: But I do want to allow many more people to have their own sub-CAs, unless there is an actual technical reason why it is a bad idea, in which case I am hoping you will tell me. Yes, for example do

Domain-validated name-constrained CA certificates?

2010-04-04 Thread Matt McCutchen
[This thread is to continue the discussion from bug 554442; this message recaps the substance of the existing discussion.] It would be great if a Mozilla-recognized CA would be willing to give me, as the registrant of mattmccutchen.net, an intermediate CA certificate with a critical name

Different services on the same server - RFC 4985

2010-04-04 Thread Matt McCutchen
On Sat, 2010-04-03 at 23:34 -0700, Nelson B Bolyard wrote: Let me tell you about one very simple attack. (I think this is old enough now that the details are no longer big news in the hacking community.) The MITM has an account on an SMTP server on the same host as an https server. The SMTP

Re: Different services on the same server - RFC 4985

2010-04-04 Thread Matt McCutchen
On Sun, 2010-04-04 at 13:31 +0300, Eddy Nigg wrote: On 04/04/2010 10:19 AM, Matt McCutchen: - RFC 4985 section 4 should be clearer that dNSName constraints as such apply to SRVNames and the SRVName type is only used for constraints that contain a service name. I may raise that on the pkix

Re: Different services on the same server - RFC 4985

2010-04-04 Thread Matt McCutchen
On Sun, 2010-04-04 at 03:19 -0400, Matt McCutchen wrote: The real problem there is that TLS uses DNS names and thus does not distinguish different services on the same server. Using RFC 4985 SRVNames such as _SMTP.example.com in certificates would solve that. I meant to add: Server Name

Re: Exploitability of the TLS renegotiation prefix-injection attack

2010-04-04 Thread Matt McCutchen
On Sun, 2010-04-04 at 13:07 +0300, Eddy Nigg wrote: On 04/04/2010 07:44 AM, Matt McCutchen: Such configurations are uncommon, but they are not intrinsically unreasonable. Sites that put parameters in URI path components are likely to keep the same approach for their write requests

Re: Exploitability of the TLS renegotiation prefix-injection attack

2010-04-04 Thread Matt McCutchen
On Sun, 2010-04-04 at 14:06 +0300, Eddy Nigg wrote: On 04/04/2010 01:49 PM, Matt McCutchen: Which is simply another user input (modifiable by the user). That's irrelevant. The Referer is an effective XSRF defense because a malicious site cannot spoof a Launchpad referrer when

Re: Domain-validated name-constrained CA certificates?

2010-04-04 Thread Matt McCutchen
On Apr 4, 6:30 pm, Jean-Marc Desperrier wrote: On 04/04/2010 08:32, Matt McCutchen wrote: [...] It would be great if a Mozilla-recognized CA would be willing to give me, as the registrant of mattmccutchen.net, an intermediate CA certificate with a critical name constraint limiting

Exploitability of the TLS renegotiation prefix-injection attack

2010-04-03 Thread Matt McCutchen
On Wed, 2010-03-31 at 18:48 +0300, Eddy Nigg wrote: On 03/31/2010 04:45 PM, Kai Engert: == snip quote begin == E.g., the attacker would send: GET /pizza?toppings=pepperoni;address=attackersaddress HTTP/1.1 X-Ignore-This: And the server uses the victim's account to send a