Dear List, I updated the whitepaper with a lot of new information, some leveraging the vulnerability in other ways that certainly increase the effectiveness and impact of this vulnerability. A brief warning to those that think they are safe because they don't accept client-side renegotiations (server + openssl). I came across major websites where the SSL loadbalancer in front of the HTTPS servers were vulnerable. Although the servers were patched it still was possible to perform the attacks (The loadbalancer merged both sessions and handed them as one to the webserver) Updates : -------- - Added a simple s_client testcase - Analysis of FTPS (vendors are encouraged to assess) - HTTPS : Injecting arbritary _responses_ into the stream - HTTPS : Downgrading HTTPS to HTTP and performing an active mitm (Discovered by Frank Heidt but details witheld, rediscovered by Thierry Zoller for this paper) With this new information G-SEC encourages Vendors and customers to reevaluate the impact of this vulnerability on their products. Brief explanations : ^^^^^^^^^^^^^^^^^^^^ HTTPS : Injecting arbritary _responses_ into the stream ------------------------------------------------------- The attacker injects a TRACE command, by doing so the attacker can indirectly control the content that is send from the server to the victim over HTTPS Downgrading HTTPS to HTTP and performing an active mitm ------------------------------------------------------- This attack leverages the known SSLStrip attack to also work on establised SSL connections. SSLstrip had the limitation that it required a user to access over HTTP in order to rewrite the html code to perform active mitm. This attack over the TLS renegotiation vulnerability now allows (if certain conditions are met) to downgrade EXISTING SSL connections to perform an SSLstrip attack. Proof of concept files ^^^^^^^^^^^^^^^^^^^^^^ G-SEC provides 2 proof of concept files : - ssl-trace.c : using TRACE to inject (partialy) arbritary content into the encrypted stream - ssl-302.c : Injecting a GET command to a 302 page redirecting the client to HTTP Whitepaper : http://blog.g-sec.lu/2009/11/tls-sslv3-renegotiation-vulnerability.html POC files : http://www.g-sec.lu/tls-ssl-proof-of-concept.html ------- This paper explains the vulnerability for a broader audience and summarizes the information that is currently available. The document is prone to updates and is believed to be accurate by the time of writing. Post: http://blog.g-sec.lu/2009/11/tls-sslv3-renegotiation-vulnerability.html Direct Download http://clicky.me/tlsvuln Disclaimer Information is believed to be accurate by the time of writing. As this vulnerability has complex implications this document is prone to revisions in the future. Thierry ZOLLER - G-SEC http://www.g-sec.lu Principal Security Consultant