NetTalk Central

Author Topic: Man-in-the-middle vulnerability  (Read 3751 times)

CaseyR

  • Sr. Member
  • ****
  • Posts: 448
    • View Profile
    • Email
Man-in-the-middle vulnerability
« on: January 14, 2015, 01:40:37 PM »
Hi, Bruce

A sophisticated client of ours has been running some vulnerability tests on our NT app and reported this issue:
--------------------
SSL / TLS Renegotiation Handshakes MiTM Plaintext Data Injection
Description

The remote service encrypts traffic using TLS / SSL but allows a client to insecurely renegotiate the connection after the initial handshake.
An unauthenticated, remote attacker may be able to leverage this issue to inject an arbitrary amount of plaintext into the beginning of the application protocol stream, which could facilitate man-in-the-middle attacks if the service assumes that the sessions before and after renegotiation are from the same 'client' and merges them at the application layer.
Solution

Contact the vendor for specific patch information.
--------------------------

I am thinking the problem can be addressed by binding the IP address for the session.  Would that work?  Are there other options?

Thanks.

 

urayoan

  • Full Member
  • ***
  • Posts: 222
    • View Profile
    • AZ Rock Radio
Re: Man-in-the-middle vulnerability
« Reply #1 on: January 15, 2015, 12:59:30 PM »
Casey, what version of NT are you running?

CaseyR

  • Sr. Member
  • ****
  • Posts: 448
    • View Profile
    • Email
Re: Man-in-the-middle vulnerability
« Reply #2 on: January 16, 2015, 02:05:27 PM »
8.24,

Thanks

Bruce

  • Global Moderator
  • Hero Member
  • *****
  • Posts: 11250
    • View Profile
Re: Man-in-the-middle vulnerability
« Reply #3 on: January 18, 2015, 11:10:24 PM »
try with the latest build. There were OpenSSL DLL updates in 8.29, and the default value for  SSLMethod property changed in 8.30

cheers
Bruce
 

CaseyR

  • Sr. Member
  • ****
  • Posts: 448
    • View Profile
    • Email
Re: Man-in-the-middle vulnerability
« Reply #4 on: January 19, 2015, 04:20:12 PM »
Thanks, Bruce

I had already set the SSLMethod manually for POODLE but I guess it is time to bring everything up to date.