On 07/31/2014 07:37 PM, Kurt Roeckx wrote:
> On Thu, Jul 31, 2014 at 05:15:58PM +0200, Ondrej Mikle wrote:
>> On 07/31/2014 09:54 AM, Kurt Roeckx wrote:
>>> On 2014-07-31 01:29, Ondrej Mikle wrote:
>>>> I should probably add that a MitM attacker like an ISP can generally 
>>>> tamper with
>>>> certificate chains sent in TLS handshake anyway, but AIA fetching would 
>>>> allow an
>>>> adversary more hops away on a different continent to tamper with the 
>>>> connection.
>>>
>>> How would an ISP tamper with the certificates send in TLS without TLS 
>>> giving an
>>> error that the packets were tampered with?
>>>
>>> I understand that it's possible with SSL 3.0 but not with TLS 1.0.
>>
>> IIRC the Server Certificate message in hanshake protocol is not 
>> authenticated.
>> Thus one could exchange an intermediate certificate(s) for a different one
>> having identical public key etc, but for example different validity period or
>> extensions (if such certificate exists, but CA reissue intermediates).
> 
> As far as I understand, the Finished message will detect that
> the certificates have been changed.  You might be validating
> some other chain first, but you'll end up with an error.

This is interesting. I checked TLS 1.2 RFC 5246 whether Finished message should
work this way, but I'm not sure. I think you mean that
"Hash(handshake_messages)" should detect this, right? But it's still just hash,
thus again not authenticated and malleable by a MitM attacker.

Ondrej
_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to