I should have added that I am not arguing against patching and releasing a new RC. It will certainly help people to have warm fuzzies, but I can't see any way for it to be used against a codebase like jclouds. Hopefully someone can point out if I am wrong about that.
-- Chris Custine On October 16, 2014 at 11:04:22 PM, Chris Custine (chris.cust...@gmail.com(mailto:chris.cust...@gmail.com)) wrote: > > On October 16, 2014 at 10:49:33 PM, Niraj Tolia > (nto...@maginatics.com(mailto:nto...@maginatics.com)) wrote: > > On Thu, Oct 16, 2014 at 9:43 PM, Chris Custine wrote: > > > > > > I am hoping others can confirm this, but after reading the advisory and > > > several commentaries on it, I can’t think of any way that this exploit > > > can affect a jclouds client. My interpretation is that in addition to the > > > man in the middle requirement to force the protocol downgrade to SSL3 and > > > subsequent packet modification, the exploit also requires some injection > > > of code onto the client that will cause the client to execute repeated > > > requests to an endpoint with an incrementing http path length and > > > decrementing body length. > > > > > > > No, anyone on the network path in between the client and server can > > initiate this attack. https://www.openssl.org/~bodo/ssl-poodle.pdf and > > https://www.dfranke.us/posts/2014-10-14-how-poodle-happened.html has a > > lot more context on this but the interesting quote is: > > This is the part that enables the exploit of SSL3, but this is not the actual > exploit. > > > > > So if an attacker that controls the network between the client and the > > server interferes with any attempted handshake offering TLS 1.0 or > > later, such clients will readily confine themselves to SSL 3.0. > > I understand that part, but this is just initiating the protocol downgrade. > Downgrading to SSL3 isn’t really the issue, the issue is what is done to > exploit that. They would still need to initiate many specifically formatted > requests with varying path and body lengths from the *real* client to > eventually resolve the encrypted attributes (from a jclouds standpoint this > would probably be auth headers). This means that some part of the response > from the actual endpoint would have to have some content that causes jclouds > itself to go rogue and start making these orchestrated requests to nonsense > urls, and with body content that is decremented to match the incrementing > path, and do this many times (up to 256 times for each byte) until the server > does not reject the SSL. If we have an flaw that allows execution of > arbitrary script code of some variety in jclouds, then I am suddenly worried > about a lot more than this exploit. :-) > > My 2 cents. > > Chris > > > > > > Cheers, > > Niraj > > > > > > > > > > I don’t see any opportunities to inject random script code into a jclouds > > > client and have it execute in a way similar to javascript in a browser, > > > and from what I have read, that is what it would take to make use of this > > > exploit. > > > > > > Hopefully other will have the opportunity to interpret this and weigh in > > > with their insight as well. > > > > > > Thanks, > > > Chris > > > > > > > > > -- > > > Chris Custine > > > > > > > > > > > > On October 16, 2014 at 6:20:23 PM, Andrew Phillips > > > (aphill...@qrmedia.com(mailto:aphill...@qrmedia.com)) wrote: > > > > > > > > I prefer to exercise an abundance of caution and extend the vote until > > > > > we understand the issue. > > > > > > > > I wasn't planning to close the vote until we have more details on > > > > this, indeed. Obviously, the more people can help have a look at this, > > > > the better ;-) > > > > > > > > PR at https://github.com/jclouds/jclouds/pull/575 > > > > > > > > Thanks! > > > > > > > > ap > > > >