[Date Prev][Date Next] [Chronological] [Thread] [Top]

Re: POODLE SSLv3 downgrade attack



* Erwann Abalea:

> Or more commonly because some equipment (a firewall, most of the time)
> closes the connection at both ends, and the browser retries the connection
> with a protocol downgrade. Web browsers don't intentionally break the
> handshake, they try to adapt to various servers+networks environments to
> get the resource desired by the end user.

They enable server operators to get away with non-compliant behavior.
Now they even punish those who actually maintain their web servers by
forcing them to implement TLS_FALLBACK_SCSV support.  Web browsers are
very much too blame for this particular mess.

And even worse, developers now rush in client application changes to
send TLS_FALLBACK_SCSV on every handshake, even if they do not perform
a browser-style insecure protocol version downgrade.  This will make
deployment of TLS 1.3 on servers rather difficult.