From: "Daniel P. Berrange" <berrange@redhat.com>
To: Peter Rosin <peda@lysator.liu.se>
Cc: stewart.becker@twbc.org.uk, qemu-devel@nongnu.org
Subject: Re: [Qemu-devel] Re: PATCH: Secure TLS encrypted authentication for VNC
Date: Tue, 3 Jun 2008 23:37:08 +0100 [thread overview]
Message-ID: <20080603223708.GD14799@redhat.com> (raw)
In-Reply-To: <4845B75E.4090402@lysator.liu.se>
On Tue, Jun 03, 2008 at 11:27:58PM +0200, Peter Rosin wrote:
> Stewart Becker skrev:
> >On Tue, 2008-06-03 at 12:31 +0200, Peter Rosin wrote:
> >>Hi!
> >>
> >>Sorry for the response to this old post, but since it seems to be the
> >>best reference for the VeNCrypt protocol on the web, I don't feel too
> >>bad. Hopefully I got the message-id correct so that this post is
> >>properly linked.
> >>
> >
> ><snip>
> >
> >>I would like to point out that vencserver seems to be sending an
> >>extra U8 (== 0x01. Is that a boolean? 0x00 means failure?) before
> >>the SSL/TLS handshake is started. The QEMU implementation does
> >>this also, so the bug is clearly in this "spec". This also affects
> >>sub-types 258, 259, 260, 261 and 262.
> >>
> >>
> >>Cheers,
> >>Peter (not subscribed)
> >
> >Peter,
> >
> >It's been a while since I looked at it, and don't have time immediately
> >to check it in detail, but I think that this is the SecurityResult
> >message as detailed in section 6.1.3 of the RFB specification.
> >Re-reading it, I could probably have been more clear in my mail to Dan
> >about where the VenCrypt extension rejoins the RFB protocol. The reason
> >that I put this in the extension code instead of the "main" VNC code is
> >that only the extension knows whether the success of failure message
> >should be sent.
>
> I don't think it's the security result, because the security result
> comes after the TLS handshake. This is apparent if you consider the
> variants based on Vnc-Auth and Plain where the security result comes
> after the authentication and the authentication is clearly inside the
> encrypted tunnel. But the security result comes inside the TLS tunnel
> for the variants based on None as well, that's a fact. Another piece
> of evidence that it is not the security result is the fact that the
> security result is U32 and this "missing element" is a U8. Pretty
> strong hint in my book :-)
It is not *the* security result, rather it is an intermediate result.
Basically the client has chosen to do VeNCrypt auth and has sent its
request for the particular VeNCrypt sub-type it wants to use. This U8
is basically a boolean indication of whether the server accepts the
clients choice of sub-type. If it accepts it, then the TLS handshake
will proceed, the sub-type specific auth process takes place and you'll
eventually get the final security result. If the server rejected the
choice of sub-type, then it will be closing the connection anyway. So
this u8 doesn't technically add any security to the protocol - it could
have been left out and things would have worked just as well.
Regards,
Daniel.
--
|: Red Hat, Engineering, London -o- http://people.redhat.com/berrange/ :|
|: http://libvirt.org -o- http://virt-manager.org -o- http://ovirt.org :|
|: http://autobuild.org -o- http://search.cpan.org/~danberr/ :|
|: GnuPG: 7D3B9505 -o- F3C9 553F A1DA 4AC2 5648 23C1 B3DF F742 7D3B 9505 :|
next prev parent reply other threads:[~2008-06-03 22:37 UTC|newest]
Thread overview: 8+ messages / expand[flat|nested] mbox.gz Atom feed top
2008-06-03 10:31 [Qemu-devel] Re: PATCH: Secure TLS encrypted authentication for VNC Peter Rosin
2008-06-03 18:48 ` Stewart Becker
2008-06-03 19:24 ` Daniel P. Berrange
2008-06-03 21:27 ` Peter Rosin
2008-06-03 22:37 ` Daniel P. Berrange [this message]
-- strict thread matches above, loose matches on Subject: below --
2007-02-24 16:54 [Qemu-devel] " Daniel P. Berrange
2007-02-28 21:27 ` [Qemu-devel] " S. I. Becker
2007-03-01 16:34 ` Daniel P. Berrange
2007-03-01 18:21 ` S. I. Becker
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20080603223708.GD14799@redhat.com \
--to=berrange@redhat.com \
--cc=peda@lysator.liu.se \
--cc=qemu-devel@nongnu.org \
--cc=stewart.becker@twbc.org.uk \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).