TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

SLOTH – Security Losses from Obsolete and Truncated Transcript Hashes

112 pointsby mukyuover 9 years ago

5 comments

nickpsecurityover 9 years ago
More interesting than the attack itself is their overall effort of combining formal verification with protocol implementation. Along the way, they&#x27;ve found all these problems in the <i>other</i> protocols because they didn&#x27;t use such rigorous methods. Quite an argument in favor of using high assurance techniques for at least critical, slow-changing protocols like TLS.<p>Anyway, I found this paper...<p><a href="http:&#x2F;&#x2F;www.ieee-security.org&#x2F;TC&#x2F;SP2015&#x2F;papers-archived&#x2F;6949a535.pdf" rel="nofollow">http:&#x2F;&#x2F;www.ieee-security.org&#x2F;TC&#x2F;SP2015&#x2F;papers-archived&#x2F;6949a...</a><p>...that reminds me of older, high assurance designs. The classic way to do it is the so-called abstract or interacting state machine models. Each component is a state-machine where you know every successful or failure state that can happen plus argument security is maintained. Then, you compose these in a semi-functional way to describe overall system. Seems the miTLS people did something similar for theirs that they call &quot;composite, state machines.&quot; The result was clean implementation and verification of what got really messy in other protocol engines. Plus, new techniques for handling that of course.<p>Really good stuff. Worth extending and improving in new projects.
评论 #10852075 未加载
jlgaddisover 9 years ago
They mention that <i>tls-unique</i> is used by FIDO. Does this include the U2F specification that is just getting starting to gain acceptance for two-factor authentication? If so, what does it mean for U2F going forward? Are there (potentially&#x2F;in theory) issues with using it for 2FA?<p>(I&#x27;m not a crypto guy, obviously...)
Tinned_Tunaover 9 years ago
The link&#x27;s not working for me, nor is any reference to SLOTH given on <a href="http:&#x2F;&#x2F;www.mitls.org&#x2F;wsgi&#x2F;tls-attacks" rel="nofollow">http:&#x2F;&#x2F;www.mitls.org&#x2F;wsgi&#x2F;tls-attacks</a>.
评论 #10851797 未加载
评论 #10852337 未加载
broheeover 9 years ago
It&#x27;s not clear if the JRE6 and the JRE7 are impacted (does the JSSE shipped with them support TLS1.2)? If so, pretty worrying as not supported anymore yet widely deployed.
评论 #10852616 未加载
评论 #10856720 未加载
tptacekover 9 years ago
It&#x27;s not clear to me that this work establishes that truncated hashes are dangerous, so much as that tls-unique is just not a very good protocol.
评论 #10851873 未加载
评论 #10852797 未加载
评论 #10852648 未加载
评论 #10852250 未加载