On 08/01/2014 01:52 AM, Ryan Sleevi wrote:
> On Thu, July 31, 2014 4:31 pm, Ondrej Mikle wrote:
>>  This is interesting. I checked TLS 1.2 RFC 5246 whether Finished message
>>  should
>>  work this way, but I'm not sure. I think you mean that
>>  "Hash(handshake_messages)" should detect this, right? But it's still just
>>  hash,
>>  thus again not authenticated and malleable by a MitM attacker.

[...]

> Different clients do this differently - some don't validate certificates
> until after the Finished message (most notably, SChannel didn't for some
> time under some cases. Likewise, Chrome validates after the Finished
> message for non-False Start, and before the Finished message but ALSO
> before any app data is sent for the False-Start).

[...]

> I agree whole-heartedly with Brian that AIA chasing is one of those
> "workarounds for the Internet" that makes everything harder to work with
> and less predictable, impinges performance, and largely should be
> unnecessary for the issues that NSS is concerned about.

Thanks for the insight on clients' side validation implementation. I also agree
that AIA chasing makes things less predictable.

Ondrej

_______________________________________________
dev-security-policy mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-security-policy

Reply via email to