On 2/19/15 10:03 AM, Peter Saint-Andre - &yet wrote:

On 2/18/15 6:12 PM, Peter Saint-Andre - &yet wrote:

On 2/18/15 5:16 PM, Barry Leiba wrote:

<snip/>

-- Section 3.5 --

    TLS clients
    SHOULD apply the same validation policy for all certificates
received
    over a connection, bind the master secret to the full handshake, and
    bind the abbreviated session resumption handshake to the original
    full handshake.

Some of those recommendations are not yet fully baked (e.g., binding the
master secret to the full handshake is described in
draft-ietf-tls-session-hash) or in the early stages of development
(e.g., RFC 5746 does not explicitly apply to abbreviated handshakes and
the triple-handshake authors say only that they propose to define a
secure resumption indication extension along the lines of RFC 5746) so
it is probably premature to say that they are best *current* practices.

OLD
    To counter the Triple Handshake attack, the recommended
    countermeasures from [triple-handshake] are adopted: TLS clients
    SHOULD apply the same validation policy for all certificates received
    over a connection, bind the master secret to the full handshake, and
    bind the abbreviated session resumption handshake to the original
    full handshake.  In some usages, the most secure option might be to
    refuse any change of certificates during renegotiation.

NEW
    To counter the Triple Handshake attack, the recommended
    countermeasures from [triple-handshake] are adopted: TLS clients
    SHOULD apply the same validation policy for all certificates received
    over a connection, SHOULD bind the master secret to the full
    handshake (one emerging approach is documented in
    [I-D.ietf-tls-session-hash]), and if possible SHOULD bind the
    abbreviated session resumption handshake to the original full
    handshake (although no standardized method for this has been defined
    as yet).  Although some of these methods are still under development,
    those who implement and deploy TLS are advised to watch for further
    improvements in these technologies.  If none of these countermeasures
    are available, the most secure option is to refuse any change of
    certificates during renegotiation.

The authors have been discussing this text. The problem is that some of these recommendations are not yet deployable, and we have strenuously avoided any forward-looking statements (no matter how tempting) in favor of recommendations that can be considered current practices.

Thus I would propose the following text:

   The most secure option for countering the Triple Handshake attack is
   to refuse any change of certificates during renegotiation.  In
   addition, TLS clients SHOULD apply the same validation policy for all
   certificates received over a connection.  The [triple-handshake]
   document suggests several other possible countermeasures, such as
   binding the master secret to the full handshake (see
   [I-D.ietf-tls-session-hash]) and binding the abbreviated session
   resumption handshake to the original full handshake.  Although the
   latter two techniques are still under development and thus do not
   qualify as current practices, those who implement and deploy TLS are
   advised to watch for further development of appropriate
   countermeasures.

Peter


_______________________________________________
Uta mailing list
Uta@ietf.org
https://www.ietf.org/mailman/listinfo/uta

Reply via email to