oss-sec mailing list archives
Re: Validating OCSP response signatures
From: cve-assign () mitre org
Date: Thu, 25 Jun 2015 16:44:54 -0400 (EDT)
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Do we consider failing (by policy) to validate the signature of OCSP responses to be a vulnerability? I did nudge SMC on Twitter but he was reticent to give a definitive view? Affects open and closed source code bases.
We're not sure that the MITRE CVE team can provide a useful answer unless
the question is made more specific.
Do you mean something like:
The product's documentation states that it is fully compliant with
RFC 2560 including "3.2 ... Prior to accepting a signed response as
valid, OCSP clients SHALL confirm that: ... 2. The signature on the
response is valid."
There is a comment in the source code such as:
/* by policy, we do not validate the signature */
Also, the actual implementation does not validate the signature.
? This type of issue could typically have a CVE ID for something like
"misleads users about whether a security feature is offered."
Or, do you mean that the product's documentation doesn't claim full
RFC 2560 compliance, and signatures aren't validated for a reason such as:
- the vendor feels that online revocation checking, for certificates
of web sites, is a fundamentally flawed idea and does not want to
bother writing any code (such as the signature-validation part) to
support that
- the vendor feels that online revocation checking, for certificates
of web sites, is a fundamentally flawed idea and has disabled
their already-written code in a political/advocacy move to try
to discourage use of OCSP
- the vendor feels that validation loops are a more relevant threat
than bad signatures
- the vendor is willing to accept the risk of bad signatures
because they feel it's important to accept information about
a revocation whenever that information is even possibly valid
? These would not have CVE IDs. If "by policy" means "for an unknown
policy reason" then we feel that there probably wouldn't be a CVE ID.
Vendors that don't want to develop or maintain OCSP code are very
often doing that for arguably legitimate reasons.
- --
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)
iQEcBAEBAgAGBQJVjGfFAAoJEKllVAevmvmsQvYIAIrkHX4rCC5fxox1xDTKZEyz
M/blTwJg1oMWhdS3YUIKLRE1B8wEp6WNvPzfhnsLTMHq0ssn1ci646xdsCPZO/TI
siT8MUIYKircOdKm12HVLu12/maEN4KZHq4xqtETJpLYSV+sUFkEBlGv4tFAdgt1
iDItm+cZhrLmYsIcnbt+q08dIj733DRsLHzGm7Dx8VV9bMI+4HjJhuKpSazmIZBe
/eANPvSLerHDycClsqKmxEjWZ+x3d/YhCmIhs8EMXhDT8RyQmmANCrD5iVeOgJF1
xvPy8jErVQkUW5B87AE8IsLvywACotTyStKiq2QhKbNDGrLoizkUvpVawBd4Fws=
=Uh4a
-----END PGP SIGNATURE-----
Current thread:
- Validating OCSP response signatures Tim Brown (Jun 22)
- Re: Validating OCSP response signatures cve-assign (Jun 25)
