On Tue, Aug 06, 2013 at 09:20:06AM -0500, Rodney Beede wrote:

> Why can't we get a simplified version of TLS that has only one option of
> the most secure cipher and isn't vulnerable to things like BEAST, CRIME, or
> BREACH?

These are not TLS problems, these are a special case of cross-site
HTML/HTTP problems, that TLS fails to exclude.  Most application
protocols are not subject to the chosen plaintext injection attacks
facilitated by browsers.

> Could we define a TLS version 2.0 with one cipher that was not vulnerable
> and one simple config?  All clients would simply be vulnerable until they
> upgraded or patched to support TLS 2.0.  For web servers that don't support
> the fixed and simplified version have the browser show a warning that the
> site is not secure regardless whether or not the ssl cert is valid.

TLS can't prevent all problems with HTTP.  Avoiding compression
helps.  Browsers should disable compression at the TLS layer, and
let the application layer handle compression when applicable.

When I compiled OpenSSL for previous employer, I always disabled
compression, even before the various compression attacks were made
public.  I always thought that compression belonged elsewhere in the
protocol stack, and the SSL layer never had enough information about
whether to optimize for bandwidth or CPU cost.

-- 
        Viktor.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to