Closed Bug 1421572 Opened 7 years ago Closed 6 years ago

Early exporters don't include ClientHello

Categories

(NSS :: Libraries, enhancement)

enhancement
Not set
normal

Tracking

(Not tracked)

RESOLVED FIXED

People

(Reporter: mt, Assigned: mt)

Details

(Keywords: sec-low)

Attachments

(1 file)

Peter Wu caught this: we aren't currently folding ClientHello into the early exporter secret.  This was a pretty serious oversight, which would have made QUIC interop a fun exercise.  Also, we would have had key synchronization.
Group: crypto-core-security
Comment on attachment 8932799 [details]
Bug 1421572 - Correct early exporter secret derivation, r?ekr

Peter Wu has approved the revision.

https://phabricator.services.mozilla.com/D297#7209
Attachment #8932799 - Flags: review+
Hi Martin, what is the security impact of this? We'd like to rate it.
Flags: needinfo?(martin.thomson)
The early exporter secret was only determined by the PSK, an attacker would be able to modify the Client Hello message containing the PSK extension followed by 0-RTT data and the server would not reject it. The attacker cannot modify nor read the 0-RTT data though.

Specifically for QUIC, this would allow the negotiated QUIC version in the quic_transport_parameters Client Hello extension to be modified, resulting in a different interpretation of QUIC 0-RTT packets on the server side. Note that the 1-RTT handshake cannot be completed in this case.

It does not affect TLS application data (such as HTTP/2) because the export secret is not used there.

It has some integrity impact for applications using the TLS Exporter (both of them must use NSS), but I don't know if such applications exist.
mwobensmith: Let's say sec-low based on Peter's analysis.  I don't believe that anyone is using this right now, otherwise we'd hear about the interop problems: NSS wouldn't talk to another implementation successfully.
Flags: needinfo?(martin.thomson)
OK, thanks Martin and Peter.
Keywords: sec-low
https://hg.mozilla.org/projects/nss-try/rev/401de5188538
Status: NEW → RESOLVED
Closed: 6 years ago
Resolution: --- → FIXED
Group: crypto-core-security → core-security-release
Group: core-security-release
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: