Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

1/12/2010
04:16 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

IETF Fix For SSL Protocol Complete

Security extension to the SSL/TLS protocol that protects against man-in-the middle attack is ready for prime time, security experts say

The Internet Engineering Task Force (IETF) has completed a security extension to the Secure Sockets Layer (SSL) protocol that fixes a flaw affecting browsers, servers, smart cards, and VPN products, as well as many lower-profile devices, such as Webcams, that contain the protocol embedded in their firmware.

Members of the IETF, the Industry Consortium for the Advancement of Security on the Internet, and several vendors, including Google, Microsoft, and PhoneFactor, have been working on a fix since October for the bug, which is basically a gap in the authentication process that lets an attacker execute a man-in-the-middle (MITM) attack and inject his own text into the encrypted SSL connection. The gap occurs in the renegotiation process of the session, when some applications require the encryption process be refreshed at a certain point.

Marsh Ray, a senior software development engineer for PhoneFactor who first discovered the SSL bug in August, says the IETF's extension to SSL, which is the Transport Layer Security (TLS) protocol in IETF parlance, secures the renegotiation process.

"This is a short extension to the handshake protocol of TLS," Ray says. "Some identifiers from the previous session are carried over to the handshake in the subsequent session."

The IETF has not yet formally published the official request for comments (RFC) document for the protocol extension, formally called the Transport Layer Security (TLS) Renegotiation Indication Extension, but Ray says it's stable now, and several open-source groups and vendors are working on implementing it.

So far, OpenSSL, GNU TLS, and NSS have been integrating and testing the new SSL/TLS security extension into their code, says Steve Dispensa, CTO at PhoneFactor.

"Some vendors are working with experimental code now in-house, as well," PhoneFactor's Ray says.

Actual deployment of the patch or protocol extension will take time, however, especially for commercial products that include SSL. "Any security vulnerability is going to be traumatic to a vendor. And this vulnerability, in particular, requires a lot of interoperability testing before vendors can ship it," he says. "That adds another layer of testing, and [quality assurance] has to be done before vendors are ready to ship it."

But, he says, vendors have had information about the flaw since September, so "they are not starting from zero now."

SSL's weaknesses have been under the microscope for the past year, first with the MITM hack by researcher Moxie Marlinspike that dupes a user into thinking he's in an HTTPS session when he has actually been redirected by the attacker elsewhere. Then came Dan Kaminsky's research, which exposed critical bugs in the X.509 digital certificate technology used in SSL.

But PhoneFactor's Marsh says this is the most "severe" attack against TLS. "There were some earlier attacks against SSL Version 2," he says. "This is probably the most significant attack against the core protocol itself."

Not all security experts agree it's a game-stopper, but the flaw definitely affects a wide range of vendor products. And the trouble is, not all of them will get patched. "Most of the major hardware vendors are aware of this, and many have been working with us," Marsh says. "But, realistically, some devices will probably never be [patched]," such as low-end printers and Webcams.

"Hopefully, they will not be handling anything critical enough so a man-in-the-middle attack is something serious they need to worry about," he says.

Meanwhile, the draft specification, which the IETF and the Internet Engineering Steering Group have deemed stable save for some copy editing, can be found here.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Navigating Security in the Cloud
Diya Jolly, Chief Product Officer, Okta,  12/4/2019
US Sets $5 Million Bounty For Russian Hacker Behind Zeus Banking Thefts
Jai Vijayan, Contributing Writer,  12/5/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Our Endpoint Protection system is a little outdated... 
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-3667
PUBLISHED: 2019-12-11
DLL Search Order Hijacking vulnerability in the Microsoft Windows client in McAfee Tech Check 3.0.0.17 and earlier allows local users to execute arbitrary code via the local folder placed there by an attacker.
CVE-2019-19719
PUBLISHED: 2019-12-11
Tableau Server 10.3 through 2019.4 on Windows and Linux allows XSS via the embeddedAuthRedirect page.
CVE-2019-19720
PUBLISHED: 2019-12-11
Yabasic 2.86.1 has a heap-based buffer overflow in the yylex() function in flex.c via a crafted BASIC source file.
CVE-2019-19707
PUBLISHED: 2019-12-11
On Moxa EDS-G508E, EDS-G512E, and EDS-G516E devices (with firmware through 6.0), denial of service can occur via PROFINET DCE-RPC endpoint discovery packets.
CVE-2019-19708
PUBLISHED: 2019-12-11
The VisualEditor extension through 1.34 for MediaWiki allows XSS via pasted content containing an element with a data-ve-clipboard-key attribute.