Re: [TLS] potential attack on TLS cert compression

2018-04-20 Thread Salz, Rich
* TLS records are carried over TCP segments. What if an attacker can change the way records are divided into segments, and thereby trigger a bug in the record parser? Why do you think this is possible? The sizse of the record is part of what’s secured.

Re: [TLS] potential attack on TLS cert compression

2018-04-19 Thread Victor Vasiliev
Did we ever reach any agreement about what to do here? For me, the threat model here seems fairly far-fetched and infeasible, in the sense that the threat only exists in some very specific bugs in multithreaded decompressor. I'd be less reluctant to do this if it were not for the fact that all

Re: [TLS] potential attack on TLS cert compression

2018-03-22 Thread Thomas Pornin
On Thu, Mar 22, 2018 at 07:10:00PM +0200, Ilari Liusvaara wrote: > I think BearSSL processes messages chunk-by-chunk. I think it even can > process individual X.509 certificates chunk-by-chunk. That's correct. In fact, it can process a complete handshake, including the X.509 certificate chain,

Re: [TLS] potential attack on TLS cert compression

2018-03-22 Thread Ilari Liusvaara
On Thu, Mar 22, 2018 at 05:11:33PM +, Subodh Iyengar wrote: > Ya I think you have the right idea. The former attack is the one > that I'm more concerned about, i.e. compression libraries almost > always provide streaming interfaces. Another case is that TLS > implementations which are the

Re: [TLS] potential attack on TLS cert compression

2018-03-22 Thread Subodh Iyengar
r <sub...@fb.com> Sent: Thursday, March 22, 2018 10:11:33 AM To: David Benjamin Cc: tls@ietf.org Subject: [Potential Spoof] Re: [TLS] potential attack on TLS cert compression Ya I think you have the right idea. The former attack is the one that I'm more concerned about, i.e. compression libr

Re: [TLS] potential attack on TLS cert compression

2018-03-22 Thread Subodh Iyengar
<david...@chromium.org> Sent: Thursday, March 22, 2018 9:58:57 AM To: Subodh Iyengar Cc: tls@ietf.org Subject: Re: [TLS] potential attack on TLS cert compression To make sure I understand the issue, the concern is that your decompression function provides a chunk-by-chunk interface, there's

Re: [TLS] potential attack on TLS cert compression

2018-03-22 Thread Ilari Liusvaara
On Thu, Mar 22, 2018 at 04:58:57PM +, David Benjamin wrote: > To make sure I understand the issue, the concern is that your decompression > function provides a chunk-by-chunk interface, there's a bug and the > division into chunks produces a different result? Or are you suggesting > that, with

Re: [TLS] potential attack on TLS cert compression

2018-03-22 Thread David Benjamin
To make sure I understand the issue, the concern is that your decompression function provides a chunk-by-chunk interface, there's a bug and the division into chunks produces a different result? Or are you suggesting that, with the same chunking pattern, the result is still non-deterministic

[TLS] potential attack on TLS cert compression

2018-03-22 Thread Subodh Iyengar
Antoine and I were discussing draft-ietf-tls-certificate-compression over lunch today and we think there could be a potential attack on the current scheme which could be fixed with some changes. Currently the CompressedCertificate is included in the handshake transcript.. However let's say a