[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: [tor-bugs] #4587 [Tor Client]: Bugs in tor_tls_got_client_hello()
#4587: Bugs in tor_tls_got_client_hello()
---------------------------+------------------------------------------------
Reporter: Sebastian | Owner: nickm
Type: defect | Status: assigned
Priority: major | Milestone: Tor: 0.2.3.x-final
Component: Tor Client | Version:
Keywords: tls handshake | Parent:
Points: | Actualpoints:
---------------------------+------------------------------------------------
Comment(by asn):
I forgot to mention that if you send a ClientHello when the server expects
a Certificate (`SSL3_ST_SR_CERT_A` or `SSL3_ST_SR_CERT_B`), the server
will go back to SSL3_ST_SR_CLNT_HELLO_C, restart the handshake, send a
ServerHello, a Certificate and a ServerKeyExchange. So you don't need to
issue a renegotiation to load the server through a single TCP connection.
This means that if we are serious about SSL DoS vectors, we must discard
any clients doing the above. Furthermore, implementing this, immediately
introduces a bridge fingerprint, which this time cannot simply be removed
by disabling renegotiation/v2.
(You can PoC this using my clienthellotest.py)
--
Ticket URL: <https://trac.torproject.org/projects/tor/ticket/4587#comment:22>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs