Since this is a rather old topic with both sides having valid points I will keep this post short and sweet. I have had no time to measure of investigate in depth and I don't think I will find any.
Both have understandable view points, so let's have a look.
Secure renegotiation makes it easier - THC-SSL DoS
Short non technical background story, when SSL connections are setup they require server-side computational effort (RSA decryption), if you try to setup connections repeatedly this will consume a lot of ressources on the server and might lead to Denial of Service.
THC makes use of the secure renegotiation feature recently introduced to setup ssl connections repeatably, in fact they are using a security feature for abuse.
On the word press site it is claimed that :
Interesting here is that a security feature that was supposed to make SSL more secure makes it indeed more vulnerable to this attack:URLs :
- http://www.thc.org/thc-ssl-dos/
- Wordpress (not sure under which control)
By Design (Eric Rescorla)
If I want to mount the old, multiple connection attack, I need to incur the following costs:His viewpoint on the same exhaustion attack using the secure renegotiation mechanism that is claimed to be make it "more vulnerable" :
- Do the TCP handshake (3 packets)
- Send the SSL/TLS ClientHello (1 packet). This can be a canned message.
- Send the SSL/TLS ClientKeyExchange, ChangeCipherSpec, Finished messages (1 packet). These can also be canned.
Now let's look at the "new" single connection attack based on renegotiation. I need to incur the following costsEric goes on with :
- Do the TCP handshake (3 packets) [once per connection.]
- Send the SSL/TLS ClientHello (1 packet). This can be a canned message.
- Receive the server's messages and parse the server's ServerHello to get the ServerRandom (1-3 packets).
- Send the SSL/TLS ClientKeyExchange and ChangeCipherSpec messages (1 packet).
- Compute the SSL/TLS PRF to generate the traffic keys.
- Send a valid Finished message.
- Repeat steps 2-7 as necessary.
Briefly then, we've taken an attack which was previously limited by network bandwidth and slightly reduced the bandwidth (by a factor of about 2 in packets/sec and less than 10% in number of bytes) at the cost of significantly higher computational effort on the attacker's client machines. Depending on the exact characteristics of your attack machines, this might be better or worse, but it's not exactly a huge improvement in any case.and finally concludes with :
All the known defenses are about trying to make it easier to distinguish legitimate users from attackers before you've invested a lot of resources in them, but this turns out to be inherently difficult and we don't have any really good solutionsI for one rest my case, there isn't anything more to say on this particular subject.
URL :
Recommendations / FAQ
http://orchilles.com/2011/04/ssl-renegotiation-dos-faq.html