On Wed, Feb 21, 2018 at 6:13 AM, Hubert Kario <hka...@redhat.com> wrote:

> On Friday, 16 February 2018 18:06:41 CET The IESG wrote:
> > The IESG has received a request from the Transport Layer Security WG
> (tls)
> > to consider the following document: - 'The Transport Layer Security (TLS)
> > Protocol Version 1.3'
> >   <draft-ietf-tls-tls13-24.txt> as Proposed Standard
>
> The current draft states that if the server recognises an identity but is
> unable to verify corresponding binder, it "MUST abort the handshake"
>

Which text are you referring to here?

-Ekr

at the same time, they "SHOULD select as single PSK and validate solely the
> binder that corresponds to that PSK"
> (Page 60, draft-ietf-tls-tls13-24).
>
> That allows for trivial enumeration of externally established identities -
> the
> attacker just needs to send to the server a list of identity guesses, with
> random data as binders, if the server recognises any identity it will abort
> connection, if it doesn't, it will continue to a non-PSK handshake.
>
> Behaviour like this is generally considered a vulnerability:
> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0190
> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-5229
>
> I was wondering if the document shouldn't recommend ignoring any and all
> identities for which binders do not verify to prevent this kind of attack.
> --
> Regards,
> Hubert Kario
> Senior Quality Engineer, QE BaseOS Security team
> Web: www.cz.redhat.com
> Red Hat Czech s.r.o., Purkyňova 115, 612 00  Brno, Czech Republic
> _______________________________________________
> TLS mailing list
> TLS@ietf.org
> https://www.ietf.org/mailman/listinfo/tls
>
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to