Professional Webmasters Community
Would you like to react to this message? Create an account in a few clicks or log in to continue.

TLS / SSLv3 renegotiation vulnerability explained

Go down

TLS / SSLv3 renegotiation vulnerability explained Empty TLS / SSLv3 renegotiation vulnerability explained

Post  andry Mon Dec 20, 2010 4:48 am

When speaking of a “Man in the Middle” attack, it is often assumed that data can be altered or changed. Indeed an attacker that sits in the middle of a connection (hence it’s name) is often able to do so. In this particular case however the attacker piggybacks an existing authenticated and encrypted TLS sessions in order t(prefix) inject arbitrary text of its choice. The attacker may not read/alter the other TLS session between the “client” and the “server”. See Chapter 3 - “Example of an attack scenario...” for more details

This paper explains the vulnerability for a broader audience and summarizes the information that is currently available. The document is prone to updates and is believed to be accurate by the time of writing.


Download TLS / SSLv3 renegotiation vulnerability explained PDF
andry
andry
Moderator
Moderator

Posts : 467
Join date : 2010-05-07

Back to top Go down

Back to top

- Similar topics

 
Permissions in this forum:
You cannot reply to topics in this forum