[erlang-questions] POODLE 2.0 and Erlang
Andreas Schultz
aschultz@REDACTED
Tue Dec 9 10:21:37 CET 2014
Hi,
The SSL POODLE attacks is back and this time it affects TLS 1.0:
https://www.imperialviolet.org/2014/12/08/poodleagain.html
The blog entry refers to an interesting discussion on TLS WG
maillinglist:
https://www.ietf.org/mail-archive/web/tls/current/msg14072.html
It went to check the Erlang SSL stack and it does contain this
comment:
%% For interoperability reasons we do not check the padding content in
%% SSL 3.0 and TLS 1.0 as it is not strictly required and breaks
%% interopability with for instance Google.
In other words, Erlangs TLS 1.0 implementation is 100% RFC compliant
and still vulnerable to a POODLE attack on TLS 1.0.
For the paranoid, this is a quick fix hack to check padding
bytes on TLS 1.0:
diff --git a/lib/ssl/src/ssl_cipher.erl b/lib/ssl/src/ssl_cipher.erl
index a6e5e1b..9e23229 100644
--- a/lib/ssl/src/ssl_cipher.erl
+++ b/lib/ssl/src/ssl_cipher.erl
@@ -1638,8 +1638,7 @@ generic_stream_cipher_from_bin(T, HashSz) ->
%% SSL 3.0 and TLS 1.0 as it is not strictly required and breaks
%% interopability with for instance Google.
is_correct_padding(#generic_block_cipher{padding_length = Len,
- padding = Padding}, {3, N})
- when N == 0; N == 1 ->
+ padding = Padding}, {3, 0}) ->
Len == byte_size(Padding);
%% Padding must be check in TLS 1.1 and after
is_correct_padding(#generic_block_cipher{padding_length = Len,
Andreas
--
--
Dipl. Inform.
Andreas Schultz
More information about the erlang-questions
mailing list