Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 14 Aug 2021 23:15:38 +0200
From:      Carlo Strub <cs@freebsd.org>
To:        Katherine Mcmillan <kmcmi046@uottawa.ca>
Cc:        "freebsd-security@freebsd.org" <freebsd-security@freebsd.org>
Subject:   Re: bug in Lynx' SSL certificate validation -> leaks password in clear text via SNI (under some circumstances)
Message-ID:  <CABSZnjPp40QEKEFwefw9XyAm81cve3hcirwBSDHANoDjrcMERw@mail.gmail.com>
In-Reply-To: <YTXPR0101MB12291D09D7F6F1D597CB4956E8F49@YTXPR0101MB1229.CANPRD01.PROD.OUTLOOK.COM>
References:  <Pine.BSM.4.64L.2108061711590.28219@herc.mirbsd.org> <20210807015102.ea4f5immh2l5ku4n@sym.noone.org> <Pine.BSM.4.64L.2108070210210.904@herc.mirbsd.org> <ab519dc0-7354-8e5-8855-ffea2534ea34@dereferenced.org> <YTXPR0101MB12291D09D7F6F1D597CB4956E8F49@YTXPR0101MB1229.CANPRD01.PROD.OUTLOOK.COM>

next in thread | previous in thread | raw e-mail | index | archive | help
Thanks a lot for your email. I added a vuxml entry to inform users.

Best,
Carlo


On Sat, 7 Aug 2021 at 17:07, Katherine Mcmillan <kmcmi046@uottawa.ca> wrote=
:

> FYI
>
> ________________________________
> From: Lynx-dev <lynx-dev-bounces+kmcmi046=3Duottawa.ca@nongnu.org> on
> behalf of Ariadne Conill <ariadne@dereferenced.org>
> Sent: 07 August 2021 10:17
> To: oss-security@lists.openwall.com <oss-security@lists.openwall.com>
> Cc: Axel Beckert <abe@debian.org>; lynx-dev@nongnu.org <
> lynx-dev@nongnu.org>; security@debian.org <security@debian.org>;
> 991971@bugs.debian.org <991971@bugs.debian.org>
> Subject: Re: [Lynx-dev] [oss-security] Re: bug in Lynx' SSL certificate
> validation -> leaks password in clear text via SNI (under some
> circumstances)
>
> Attention : courriel externe | external email
>
> Hi,
>
> On Sat, 7 Aug 2021, Thorsten Glaser wrote:
>
> > Axel Beckert dixit:
> >
> >> This is more severe than it initially looked like: Due to TLS Server
> >> Name Indication (SNI) the hostname as parsed by Lynx (i.e with
> >> "user:pass@" included) is sent in _clear_ text over the wire even
> >
> > I *ALWAYS* SAID SNI IS A SHIT THING ONLY USED AS BAD EXCUSE FOR NAT
> > BY PEOPLE WHO ARE TOO STUPID TO CONFIGURE THEIR SERVERS RIGHT AND AS
> > BAD EXCUSE FOR LACKING IPv6 SUPPORT, AND THEN THE FUCKING IDIOTS WENT
> > AND MADE SNI *MANDATORY* FOR TLSv1.3, AND I FEEL *SO* VINDICATED RIGHT
> > NOW! IDIOTS IN CHARGE OF SECURITY, FUCKING IDIOTS=E2=80=A6
>
> It turns out SNI is only marginally related to this issue.  The issue
> itself is far more severe: HTParse() does not understand the authn part o=
f
> the URI at all.  And so, when you call:
>
>    HTParse("https://foo:bar@example.com", "", PARSE_HOST)
>
> It returns:
>
>    foo:bar@example.com
>
> Which is then handed directly to SSL_set_tlsext_host_name() or
> gnutls_server_name_set().  But it will also leak in the Host: header on
> unencrypted connections, and also probably SSL ones too.
>
> As a workaround, I taught HTParse() how to parse the authn part of URIs,
> but Lynx itself needs to actually properly support the authn part really.
>
> I have attached the patch Alpine is using to work around this infoleak.
>
> Ariadne
> _______________________________________________
> freebsd-security@freebsd.org mailing list
> https://lists.freebsd.org/mailman/listinfo/freebsd-security
> To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.or=
g
> "
>



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CABSZnjPp40QEKEFwefw9XyAm81cve3hcirwBSDHANoDjrcMERw>