TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

SLOTH – Security Losses from Obsolete and Truncated Transcript Hashes

112 点作者 mukyu超过 9 年前

5 条评论

nickpsecurity超过 9 年前
More interesting than the attack itself is their overall effort of combining formal verification with protocol implementation. Along the way, they&#x27;ve found all these problems in the <i>other</i> protocols because they didn&#x27;t use such rigorous methods. Quite an argument in favor of using high assurance techniques for at least critical, slow-changing protocols like TLS.<p>Anyway, I found this paper...<p><a href="http:&#x2F;&#x2F;www.ieee-security.org&#x2F;TC&#x2F;SP2015&#x2F;papers-archived&#x2F;6949a535.pdf" rel="nofollow">http:&#x2F;&#x2F;www.ieee-security.org&#x2F;TC&#x2F;SP2015&#x2F;papers-archived&#x2F;6949a...</a><p>...that reminds me of older, high assurance designs. The classic way to do it is the so-called abstract or interacting state machine models. Each component is a state-machine where you know every successful or failure state that can happen plus argument security is maintained. Then, you compose these in a semi-functional way to describe overall system. Seems the miTLS people did something similar for theirs that they call &quot;composite, state machines.&quot; The result was clean implementation and verification of what got really messy in other protocol engines. Plus, new techniques for handling that of course.<p>Really good stuff. Worth extending and improving in new projects.
评论 #10852075 未加载
jlgaddis超过 9 年前
They mention that <i>tls-unique</i> is used by FIDO. Does this include the U2F specification that is just getting starting to gain acceptance for two-factor authentication? If so, what does it mean for U2F going forward? Are there (potentially&#x2F;in theory) issues with using it for 2FA?<p>(I&#x27;m not a crypto guy, obviously...)
Tinned_Tuna超过 9 年前
The link&#x27;s not working for me, nor is any reference to SLOTH given on <a href="http:&#x2F;&#x2F;www.mitls.org&#x2F;wsgi&#x2F;tls-attacks" rel="nofollow">http:&#x2F;&#x2F;www.mitls.org&#x2F;wsgi&#x2F;tls-attacks</a>.
评论 #10851797 未加载
评论 #10852337 未加载
brohee超过 9 年前
It&#x27;s not clear if the JRE6 and the JRE7 are impacted (does the JSSE shipped with them support TLS1.2)? If so, pretty worrying as not supported anymore yet widely deployed.
评论 #10852616 未加载
评论 #10856720 未加载
tptacek超过 9 年前
It&#x27;s not clear to me that this work establishes that truncated hashes are dangerous, so much as that tls-unique is just not a very good protocol.
评论 #10851873 未加载
评论 #10852797 未加载
评论 #10852648 未加载
评论 #10852250 未加载