On 12/30/2016 06:44 AM, Ilari Liusvaara wrote:
> On Thu, Dec 29, 2016 at 02:45:53PM -0800, Adam Langley wrote:
>>
>> An attacker could redirect a 0-RTT handshake that was destined to S1
>> and feed it to S2. If S2 ignores the SNI value (common) it could
>> accept and process the 0-RTT data even though it was destined for S1.
> Sounds like standard-issue default-vhost attack (which are sadly
> common security issues in https://).
>  

Somehow, I feel like adding text in the 1.3 spec that servers should not
do this is not really going to help anyone.

>> However, in that case TLS 1.2 is probably also affected because S2
>> would likely process a 1.2 handshake that was destined to S1 as well.
>> (Even without a shared ticket key or session cache.) See
>> http://antoine.delignat-lavaud.fr/doc/www15.pdf for more.
> You mean redirecting full handshake meant for s1.example.com to
> s2.example.com? Or redirecting a TLS 1.2 resumption handshake?

Naively, if s1 and s2 share cert and private key, and ignore the SNI, it
seems like redirecting a full handshake would work.  But I didn't think
about it very hard.

> Also, wonder how many servers don't check for SNI when resuming...
>


Me, too.

-Ben
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to