-
lovetox
https://notes.valdikss.org.ru/jabber.ru-mitm/
-
lovetox
Sorr if it was discussed previously✎ -
lovetox
Sorry if it was discussed previously ✏
-
MattJ
In the operators channel
-
singpolyma
Should we start verifying SCT in certificates? I wonder how hard it is to add
-
MattJ
Firstly, it wouldn't have prevented this attack at all
-
MattJ
Secondly, someone involved in CT says "no" :) https://news.ycombinator.com/item?id=37959257
-
MattJ
The jabber.ru certificates were requested in plain sight, they were in the CT log and had valid SCTs
-
singpolyma
Not this attack no, but it could make detecting similar attacks more of a sure thing
-
singpolyma
Yes, for sure, but it's possible to get valid CA certs without CT/SCT
-
MattJ
So, require SCTs? Maybe. But is that really better than, say, pushing forward channel binding?
-
singpolyma
No, not better. But maybe also good
-
singpolyma
Especially where we don't have binding, like s2s
-
MattJ
True
-
lovetox
how does channel binding work ?
-
Zash
very simplified, some stuff is mixed into the authentication exchange that needs to be the same on both sides
-
Zash
if there's a MITM, the stuff will be different, making the authentication attempt fail
-
Zash
the stuff would usually be something related to the TLS connection, either a hash of something or a hash of the certificate
-
Zash
IIRC it's something from the end of a TLS handshake that verifies the whole handshake, and if the client and the server sees the same thing then MITM would be very unlikely
-
Zash
lovetox, https://datatracker.ietf.org/doc/html/rfc5802#section-6 and https://datatracker.ietf.org/doc/html/rfc9266 may be worth reading for details
-
lovetox
Thanks zash