On Mon, Dec 02, 2013 at 12:23:54PM -0500, Alex wrote:

> > No need.  This is the problem with Exchange on Windows 2003, and
> > the broken DES-CBC3-SHA ciphersuite.  Work-around in the list
> > archives.
> 
> I believe I've found your post in the archives from just a few weeks
> ago that describes this a bit further, but it doesn't describe where
> you got the info from, so that I may understand this further.
> 
> Do you know where I can find more info about this? Perhaps there's a
> MS tech bulletin or something that I can forward to the ISP?

I am not aware of any definitive Microsoft technical articles
covering this issue.  My posts on the subject to this list are
based information I discovered for myself.  My report is sufficiently
authoritative to stand on its own.

A quick Google search uncovers the following, which is either the
same issue or a related issue:

    http://support.microsoft.com/kb/938857

the description is rather poor (surely wrong, written by some poor
sod who is mis-reporting it second hand):

    Block ciphers algorithms are unusual because they change the
    size of the data that is encrypted. When the encrypted data is
    returned, the size of the data may be smaller than the size of
    the data that was sent to be encrypted.  In other words, the
    size of the encrypted data that the Exchange 2003 server sends
    back to the client is different by several bytes. For example,
    a program uses an SSL connection to send 1,000 bytes of data
    to be encrypted.  When the data is encrypted and then returned
    to the client, the size of the data is 980 bytes. This can
    remove the client's ability to decrypt the encrypted data.

Back on planet Earth, block encryption algorithms add a variable
amount of padding, but they never shrink the payload.  Mix in
sufficient skepticism about the expertise of the author and the
core issue is the same ("several bytes" of CBC padding mishandled
by Exchange 2003).

-- 
        Viktor.

Reply via email to