On Tue, Aug 06, 2013 at 09:20:06AM -0500, Rodney Beede wrote: > Why can't we get a simplified version of TLS that has only one option of > the most secure cipher and isn't vulnerable to things like BEAST, CRIME, or > BREACH?
These are not TLS problems, these are a special case of cross-site HTML/HTTP problems, that TLS fails to exclude. Most application protocols are not subject to the chosen plaintext injection attacks facilitated by browsers. > Could we define a TLS version 2.0 with one cipher that was not vulnerable > and one simple config? All clients would simply be vulnerable until they > upgraded or patched to support TLS 2.0. For web servers that don't support > the fixed and simplified version have the browser show a warning that the > site is not secure regardless whether or not the ssl cert is valid. TLS can't prevent all problems with HTTP. Avoiding compression helps. Browsers should disable compression at the TLS layer, and let the application layer handle compression when applicable. When I compiled OpenSSL for previous employer, I always disabled compression, even before the various compression attacks were made public. I always thought that compression belonged elsewhere in the protocol stack, and the SSL layer never had enough information about whether to optimize for bandwidth or CPU cost. -- Viktor. ______________________________________________________________________ OpenSSL Project http://www.openssl.org User Support Mailing List openssl-users@openssl.org Automated List Manager majord...@openssl.org