tls renegotiation https://www.gremwell.com/ en Impact of TLS/SSL Renegotiation Vulnerability on HTTPS: Less Known Issues https://www.gremwell.com/ssl_tls_renegotiation_less_known_issues <span>Impact of TLS/SSL Renegotiation Vulnerability on HTTPS: Less Known Issues</span> <div><p>There is a couple of issues with TLS/SSL renegotiation vulnerability in the context of HTTPS protocol, which appear not to have made their way to the public.</p> <p> 1. Plain text prefix injection is not the only risk. The original advisory [1] mentions the possibility of "forwarding and repurposing of client certificate authentication credentials". In oss-sec maillist Marsh Ray goes in more details [2], and [3] dedicates one slide to "client certificate redirection".</p> <p> 2. The renegotiation vulnerability provides for an additional attack vector to exploit web application vulnerabilities. For example, MiTM attackers can use it to deliver an exploit for a non-persistent XSS bug to client's browser.</p> <p>References:</p> <p> [1] <a href="http://www.phonefactor.com/sslgapdocs/Renegotiating_TLS.pdf">http://www.phonefactor.com/sslgapdocs/Renegotiating_TLS.pdf</a><br /> [2] <a href="http://seclists.org/oss-sec/2009/q4/137">http://seclists.org/oss-sec/2009/q4/137</a><br /> [3] <a href="http://www.troopers10.org/content/e728/e897/e903/TROOPERS10_History_of_the_TLS_Auth_Gap_Bug_Dispensa_Ray.pdf">http://www.troopers10.org/content/e728/e897/e903/TROOPERS10_History_of_…</a></p> </div> <span><span lang="" about="/user/1" typeof="schema:Person" property="schema:name" datatype="">abb</span></span> <span>Sun, 09/12/2010 - 13:10</span> Sun, 12 Sep 2010 11:10:31 +0000 abb 56 at https://www.gremwell.com Enabling SSL/TLS Renegotiation in Java https://www.gremwell.com/enabling_ssl_tls_renegotiation_in_java <span>Enabling SSL/TLS Renegotiation in Java</span> <div><p>All the crazy SSL servers seem to come my way - ones that only support weird combinations of protocols and ciphers, ones that require client certificates stored on PKCS#11 hardware, and ones that require SSL renegotiation.</p> <p>Turns out that Sun has recently <a href="http://java.sun.com/javase/javaseforbusiness/docs/TLSReadme.html"> disabled SSL/TLS renegotiation in Java by default</a> as a workaround for <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3555">SSL/TLS renegotiation vulnerability</a>. This becomes a problem when trying to test an HTTPS server that actually requires renegotiation. Burp suite reacts to it with an error message saying "javax.net.ssl.SSLException: HelloRequest followed by an unexpected handshake message" or, if I enable only TLSv1, with a message saying "javax.net.ssl.SSLHandshakeException: renegotiation is not allowed". I expect that other Java-based proxies, such as WebScarab behave in a similar way.</p> <p>Fortunately, renegotiation can be explicitly enabled by setting the Java system property system property sun.security.ssl.allowUnsafeRenegotiation to true. For example, to run Burp suite we can do :</p> <pre> java -Dsun.security.ssl.allowUnsafeRenegotiation=true -jar burpsuite_pro_v1.3.04.jar </pre></div> <span><span lang="" about="/user/10" typeof="schema:Person" property="schema:name" datatype="">alla</span></span> <span>Tue, 06/08/2010 - 14:40</span> Tue, 08 Jun 2010 12:40:29 +0000 alla 45 at https://www.gremwell.com