diff options
author | Simon Josefsson <simon@josefsson.org> | 2006-10-26 12:32:37 +0000 |
---|---|---|
committer | Simon Josefsson <simon@josefsson.org> | 2006-10-26 12:32:37 +0000 |
commit | 84e60c0ee8e9987129c27c2e703f8edfc87d7ade (patch) | |
tree | 0e8bac0952b8fb18fd2a74da6d2bf09245c618ff | |
parent | 5e6ca2c69f5436c4b711796af258592a6b271584 (diff) | |
download | gnutls-84e60c0ee8e9987129c27c2e703f8edfc87d7ade.tar.gz |
Be specific about SSLv2 security problems.
-rw-r--r-- | doc/gnutls.texi | 26 |
1 files changed, 25 insertions, 1 deletions
diff --git a/doc/gnutls.texi b/doc/gnutls.texi index 2562648d94..57447a9760 100644 --- a/doc/gnutls.texi +++ b/doc/gnutls.texi @@ -795,7 +795,31 @@ One question that may arise is why we didn't implement @acronym{SSL} 2.0 in the library. There are several reasons, most important being that it has serious security flaws, unacceptable for a modern security library. Other than that, this protocol is barely used by anyone -these days since it has been deprecated since 1996. +these days since it has been deprecated since 1996. The security +problems in @acronym{SSL} 2.0 include: + +@itemize + +@item Message integrity compromised +The @acronym{SSLv2} message authentication uses the MD5 function, and +is insecure. + +@item Man-in-the-middle attack +There is no protection of the handshake in @acronym{SSLv2}, which +permits a man-in-the-middle attack. + +@item Truncation attack +@acronym{SSLv2} relies on TCP FIN to close the session, so the +attacker can forge a TCP FIN, and the peer cannot tell if it was a +legitimate end of data or not. + +@item Weak message integrity for export ciphers +The cryptographic keys in @acronym{SSLv2} are used for both message +authentication and encryption, so if weak encryption schemes are +negotiated (say 40-bit keys) the message authentication code use the +same weak key, which isn't necessary. + +@end itemize @cindex PCT Other protocols such as Microsoft's @acronym{PCT} 1 and @acronym{PCT} |