Clemens Hlauschek <clemens.hlausc...@rise-world.com> writes:

>I published a paper today on KCI-attacks in TLS. This might be of interest to
>the TLS WG.
>
>https://www.usenix.org/conference/woot15/workshop-program/presentation/hlauschek

Some comments on this, it looks like it requires a "cert with static (EC)DH
key" in order to work, which would mean an X9.42 cert.  Since no (public) CA
that I know of can handle or issue such certs, this probably provides a
reasonable amount of defence against this attack...

In terms of the suggested countermeasures:

>Set appropriate X509 Key Usage extension for ECDSA and DSS certificates, and
>disable specifically the KeyAgreement flag

Since the keyUsage flags are widely ignored by implementations, this won't
provide the protection that the text implies.

Peter.
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to