Re: [Standards] Proposed XMPP Extension: SASL SCRAM Downgrade Protection

2022-10-19 Thread Dave Cridland
On Wed, 19 Oct 2022 at 16:02, Thilo Molitor wrote: > Am Mittwoch, 19. Oktober 2022, 16:32:55 CEST schrieb Dave Cridland: > > Small point: GS2 doesn't ever allow clients to know if channel binding is > > proven, since the channel binding data is passed in the clear to the > > server. It does

Re: [Standards] Proposed XMPP Extension: SASL SCRAM Downgrade Protection

2022-10-19 Thread Thilo Molitor
Am Mittwoch, 19. Oktober 2022, 16:32:55 CEST schrieb Dave Cridland: > Small point: GS2 doesn't ever allow clients to know if channel binding is > proven, since the channel binding data is passed in the clear to the > server. It does prove the server saw the channel binding data as sent by > the

Re: [Standards] Proposed XMPP Extension: SASL SCRAM Downgrade Protection

2022-10-19 Thread Dave Cridland
On Wed, 19 Oct 2022 at 14:59, Thilo Molitor wrote: > That's a wekness of SCRAM itself. Channel-binding problems will be > detected > after the client-final-message as well. > Small point: GS2 doesn't ever allow clients to know if channel binding is proven, since the channel binding data is

Re: [Standards] Proposed XMPP Extension: SASL SCRAM Downgrade Protection

2022-10-19 Thread Thilo Molitor
Hi Marvin, > I think the specification partially exaggerates on what it is able to > actually achieve security-wise. > > The requirements say: "Allow detection of SASL mechanism downgrades > even if no channel-binding is in use.". However, as this is an > extension to SCRAM, it only allows

Re: [Standards] Proposed XMPP Extension: SASL SCRAM Downgrade Protection

2022-10-19 Thread Thilo Molitor
Hi Peter, > In any case, if the client has a local policy not to use PLAIN (or other > mechanisms that it considers to be too weak), then it simply wouldn't > use those in case of a downgrade attack. Similar policies are in place > already for things like old versions of TLS, see here: >

Re: [Standards] Proposed XMPP Extension: SASL SCRAM Downgrade Protection

2022-10-19 Thread Thilo Molitor
Hi Daniel, Am Mittwoch, 19. Oktober 2022, 09:23:10 CEST schrieb Daniel Gultsch: > > But that leaves clients not able to implement this type, or any > > channel-binding at all, vulnerable to downgrades of channel-binding types > > and SASL mechanisms. > This specification protects clients that are

Re: [Standards] Proposed XMPP Extension: SASL SCRAM Downgrade Protection

2022-10-19 Thread Daniel Gultsch
> But that leaves clients not able to implement this type, or any > channel-binding at all, vulnerable to downgrades of channel-binding types and > SASL mechanisms. This specification protects clients that are not able to support channel binding from being tricked into thinking the server

Re: [Standards] Proposed XMPP Extension: SASL SCRAM Downgrade Protection

2022-10-18 Thread Marvin W
I think the specification partially exaggerates on what it is able to actually achieve security-wise. The requirements say: "Allow detection of SASL mechanism downgrades even if no channel-binding is in use.". However, as this is an extension to SCRAM, it only allows detection of SASL machanism

Re: [Standards] Proposed XMPP Extension: SASL SCRAM Downgrade Protection

2022-10-17 Thread Peter Saint-Andre
On 10/17/22 5:27 PM, Thilo Molitor wrote: Thanks for your feedback Dave! Am Montag, 17. Oktober 2022, 15:36:56 CEST schrieb Dave Cridland: Any attacker able to manipulate the data coming from the server such that the client sees a restricted set of TLS channel bindings can also manipulate the

Re: [Standards] Proposed XMPP Extension: SASL SCRAM Downgrade Protection

2022-10-17 Thread Thilo Molitor
Thanks for your feedback Dave! Am Montag, 17. Oktober 2022, 15:36:56 CEST schrieb Dave Cridland: > Any attacker able to manipulate the data coming from the server such that > the client sees a restricted set of TLS channel bindings can also > manipulate the data coming from the server such that

Re: [Standards] Proposed XMPP Extension: SASL SCRAM Downgrade Protection

2022-10-17 Thread Dave Cridland
On Wed, 12 Oct 2022 at 17:17, Jonas Schäfer wrote: > Title: SASL SCRAM Downgrade Protection > URL: https://xmpp.org/extensions/inbox/xep-downgrade-prevention.html Any attacker able to manipulate the data coming from the server such that the client sees a restricted set of TLS channel bindings

Re: [Standards] Proposed XMPP Extension: SASL SCRAM Downgrade Protection

2022-10-16 Thread Jonas Schäfer
I thought we had automatic pulls of the built images... apparently we don't, pulled manually, fixed, thanks for the hint. On Samstag, 15. Oktober 2022 16:34:20 CEST Dave Cridland wrote: > 404? > > On Wed, 12 Oct 2022 at 17:17, Jonas Schäfer wrote: > > The XMPP Extensions Editor has received a

Re: [Standards] Proposed XMPP Extension: SASL SCRAM Downgrade Protection

2022-10-15 Thread Dave Cridland
404? On Wed, 12 Oct 2022 at 17:17, Jonas Schäfer wrote: > The XMPP Extensions Editor has received a proposal for a new XEP. > > Title: SASL SCRAM Downgrade Protection > Abstract: > This specification provides a way to secure the SASL and SASL2 > handshakes against method and channel-binding

[Standards] Proposed XMPP Extension: SASL SCRAM Downgrade Protection

2022-10-12 Thread XSF Editor
The XMPP Extensions Editor has received a proposal for a new XEP. Title: SASL SCRAM Downgrade Protection Abstract: This specification provides a way to secure the SASL and SASL2 handshakes against method and channel-binding downgrades. URL: