Print

Print


I'm the security guy, not the local XrootD expert, but wanted to post it here just in case.

I ran an OpenVAS vulnerability against our XrootD servers which are running 5.4.2, and it flags them with the above error, which is considered 5 out of 10 for severity.

---

Summary
The remote SSL/TLS service is prone to a denial of service (DoS) vulnerability.

Detection Result
The following indicates that the remote SSL/TLS service is affected:

Protocol Version | Successful re-done SSL/TLS handshakes (Renegotiation) over an existing / already established SSL/TLS connection
----------------------------------------------------------------------------------------------------------------------------------
TLSv1.2          | 10

Insight
The flaw exists because the remote SSL/TLS service does not
properly restrict client-initiated renegotiation within the SSL and TLS protocols.

Note: The referenced CVEs are affecting OpenSSL and Mozilla Network Security Services (NSS) but
both are in a DISPUTED state with the following rationale:

> It can also be argued that it is the responsibility of server deployments, not a security
library, to prevent or limit renegotiation when it is inappropriate within a specific environment.

Both CVEs are still kept in this VT as a reference to the origin of this flaw.

Detection Method
Checks if the remote service allows to re-do the same SSL/TLS
handshake (Renegotiation) over an existing / already established SSL/TLS connection.

Details:
SSL/TLS: Renegotiation DoS Vulnerability (CVE-2011-1473, CVE-2011-5094...
OID: 1.3.6.1.4.1.25623.1.0.117761
Version used:
2021-11-15T10:28:20Z

Affected Software/OS
Every SSL/TLS service which does not properly restrict
client-initiated renegotiation.

Impact
The flaw might make it easier for remote attackers to cause a
DoS (CPU consumption) by performing many renegotiations within a single connection.

Solution
Solution Type:
Vendorfix
Users should contact their vendors for specific patch information.

A general solution is to remove/disable renegotiation capabilities altogether from/in the affected
SSL/TLS service.
References
CVE
CVE-2011-1473
CVE-2011-5094
CERT
DFN-CERT-2017-1013
DFN-CERT-2017-1012
DFN-CERT-2014-0809
DFN-CERT-2013-1928
DFN-CERT-2012-1112
CB-K17/0980
CB-K17/0979
CB-K14/0772
CB-K13/0915
CB-K13/0462
Other
https://orchilles.com/ssl-renegotiation-dos/
https://mailarchive.ietf.org/arch/msg/tls/wdg46VE_jkYBbgJ5yE4P9nQ-8IU/
https://vincent.bernat.ch/en/blog/2011-ssl-dos-mitigation
https://www.openwall.com/lists/oss-security/2011/07/08/2
https://vincent.bernat.ch/en/blog/2011-ssl-dos-mitigation



-- 
Reply to this email directly or view it on GitHub:
https://github.com/xrootd/xrootd/issues/1689
You are receiving this because you are subscribed to this thread.

Message ID: <[log in to unmask]>

########################################################################
Use REPLY-ALL to reply to list

To unsubscribe from the XROOTD-DEV list, click the following link:
https://listserv.slac.stanford.edu/cgi-bin/wa?SUBED1=XROOTD-DEV&A=1