channel binding notes
authorJeremy Harris <jgh146exb@wizmail.org>
Sun, 10 Jan 2021 20:10:21 +0000 (20:10 +0000)
committerJeremy Harris <jgh146exb@wizmail.org>
Sun, 10 Jan 2021 23:13:59 +0000 (23:13 +0000)
doc/doc-docbook/spec.xfpt
src/src/auths/gsasl_exim.c

index bb053ed783de692d3c6e9551ea61c8e051eb05b9..4c79e87cf81aae44eb0bbd798ddd53f058d7ee79 100644 (file)
@@ -28181,6 +28181,10 @@ supplied by the server.
 .option server_channelbinding gsasl boolean false
 Do not set this true and rely on the properties
 without consulting a cryptographic engineer.
+. Unsure what that's about.  It might be the "Triple Handshake"
+. vulnerability; cf. https://www.mitls.org/pages/attacks/3SHAKE
+. If so, we're ok, requiring Extended Master Secret if TLS
+. Session Resumption was used.
 
 Some authentication mechanisms are able to use external context at both ends
 of the session to bind the authentication to that context, and fail the
index 12713705b4c1a776547e0c8773d305a471234568..afd745bd7f8269411abaf81cf6bbc1fe26f77d20 100644 (file)
@@ -831,7 +831,8 @@ if (tls_out.channelbinding && ob->client_channelbinding)
   {
 # ifndef DISABLE_TLS_RESUME
   if (!tls_out.ext_master_secret && tls_out.resumption == RESUME_USED)
-    {          /* per RFC 7677 section 4 */
+    {  /* Per RFC 7677 section 4.  See also RFC 7627, "Triple Handshake"
+       vulnerability, and https://www.mitls.org/pages/attacks/3SHAKE */
     string_format(buffer, buffsize, "%s",
       "channel binding not usable on resumed TLS without extended-master-secret");
     return FAIL;