On Mon, Dec 02, 2013 at 12:23:54PM -0500, Alex wrote:
> > No need. This is the problem with Exchange on Windows 2003, and
> > the broken DES-CBC3-SHA ciphersuite. Work-around in the list
> > archives.
>
> I believe I've found your post in the archives from just a few weeks
> ago that describes this a bit further, but it doesn't describe where
> you got the info from, so that I may understand this further.
>
> Do you know where I can find more info about this? Perhaps there's a
> MS tech bulletin or something that I can forward to the ISP?
I am not aware of any definitive Microsoft technical articles
covering this issue. My posts on the subject to this list are
based information I discovered for myself. My report is sufficiently
authoritative to stand on its own.
A quick Google search uncovers the following, which is either the
same issue or a related issue:
http://support.microsoft.com/kb/938857
the description is rather poor (surely wrong, written by some poor
sod who is mis-reporting it second hand):
Block ciphers algorithms are unusual because they change the
size of the data that is encrypted. When the encrypted data is
returned, the size of the data may be smaller than the size of
the data that was sent to be encrypted. In other words, the
size of the encrypted data that the Exchange 2003 server sends
back to the client is different by several bytes. For example,
a program uses an SSL connection to send 1,000 bytes of data
to be encrypted. When the data is encrypted and then returned
to the client, the size of the data is 980 bytes. This can
remove the client's ability to decrypt the encrypted data.
Back on planet Earth, block encryption algorithms add a variable
amount of padding, but they never shrink the payload. Mix in
sufficient skepticism about the expertise of the author and the
core issue is the same ("several bytes" of CBC padding mishandled
by Exchange 2003).
--
Viktor.