Arguing with myself a bit here.

On 5/25/2010 12:06 PM, Marsh Ray wrote:
> On 5/20/2010 7:20 PM, Matt McCutchen wrote:
>> When
>> "security.ssl.allow_unrestricted_renego_everywhere__temporarily_available_pref"
>> is off, Firefox will refuse to perform a server-initiated
>> renegotiation with a non-RFC-5746 server.  What is the purpose of this
>> behavior?  It doesn't mitigate the vulnerability because in the attack
>> scenario, the client believes it is performing an initial
>> negotiation.
> 
> If the client goes ahead and completes the handshake, sending his client
> cert and/or cookies, he may be giving those authentication credentials
> to the bad guy's malicious request being buffered at the server.

But by that logic, the client should refuse to handshake at all with a
non-RFC-5746 server. (In reality that eventually needs to become the
default behavior).

Seeing a server-initiated renegotiation from a non-RFC-5746 server is
bad because you now know that the server is more than just theoretically
vulnerable.

I suspect that some of the "security.ssl.*" parameters may equally apply
to server side uses of NSS, in which case it is clearly a useful mitigation.

- Marsh
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to