summaryrefslogtreecommitdiff
path: root/doc/gnutls.texi
diff options
context:
space:
mode:
authorSimon Josefsson <simon@josefsson.org>2010-04-30 16:50:14 +0200
committerSimon Josefsson <simon@josefsson.org>2010-04-30 16:50:14 +0200
commit468b1d0d428cb36042ee4014bcac4a4513d1e74a (patch)
tree6a08a72d9a6e54b928ce579c275c0cf221c3d273 /doc/gnutls.texi
parentcfbed93c9dab1aca7b01a4bb42bcf86a15c8d832 (diff)
downloadgnutls-468b1d0d428cb36042ee4014bcac4a4513d1e74a.tar.gz
Improve text, based on suggestions from Tomas Hoger <thoger@redhat.com>.
Diffstat (limited to 'doc/gnutls.texi')
-rw-r--r--doc/gnutls.texi27
1 files changed, 16 insertions, 11 deletions
diff --git a/doc/gnutls.texi b/doc/gnutls.texi
index 1e09e4114f..17483067a4 100644
--- a/doc/gnutls.texi
+++ b/doc/gnutls.texi
@@ -1238,18 +1238,23 @@ Some application protocols and implementations uses the TLS
renegotiation feature in a manner that enables attackers to insert
content of his choice in the beginning of a TLS session.
-The simplest example is HTTP. For HTTP one attack works by having the
-attacker simulate a client and connect to a server, with server-only
-authentication, and send some data intended to cause harm. When the
-proper client attempts to contact the server, the attacker hijacks
-that connection and uses the TLS renegotiation feature with the server
-and splices in the client connection to the already established
-connection between the client and server. The attacker will not be
-able to read the data exchanged between the client and the server.
-However, some server implementations will (incorrectly) assume that
-the data sent by the attacker was sent by the now authenticated
+One easy to understand vulnerability is HTTPS when servers request
+client certificates optionally for certain parts of a web site. The
+attack works by having the attacker simulate a client and connect to a
+server, with server-only authentication, and send some data intended
+to cause harm. When the proper client attempts to contact the server,
+the attacker hijacks that connection and uses the TLS renegotiation
+feature with the server and splices in the client connection to the
+already established connection between the attacker and server. The
+attacker will not be able to read the data exchanged between the
+client and the server. However, the server will (incorrectly) assume
+that the data sent by the attacker was sent by the now authenticated
client. The result is a prefix plain-text injection attack.
+The above is just one example. Other vulnerabilities exists that do
+not rely on the TLS renegotiation to change the client's authenticated
+status (either TLS or application layer).
+
While fixing these application protocols and implementations would be
one natural reaction, an extension to TLS has been designed that
cryptographically binds together any renegotiated handshakes with the
@@ -1266,7 +1271,7 @@ extension has not been negotiated, as this would break backwards
compatibility and cause too much operational problems. We will likely
reconsider these defaults in the future.
-To modify the default behaviour, we have introduced three new priority
+To modify the default behaviour, we have introduced four new priority
strings. The priority strings can be used by applications
(@pxref{gnutls_priority_set}) and end users (e.g., @code{--priority}
parameter to @code{gnutls-cli} and @code{gnutls-serv}).