Skip to Content

Fixing a Hole in the Web

It could take a year to patch up a flaw to a key Internet protocol.
January 12, 2010

Late last week, the Internet Engineering Task Force (IETF) approved a fix to the protocol that guards most sensitive transactions and communications online. But experts expect it to take a year for the fix to be fully applied.

The patch repairs a flaw in the protocol that encrypts sensitive communications, including most banking and credit-card transactions. It repairs the Transport Layer Security (TLS) protocol, which has superseded the Secure Socket Layer (SSL) protocol. TLS is built into Web browsers and Web servers and protects high-value information.

The current flaw, discovered by Marsh Ray and Steve Dispensa of a Kansas-based authentication company called Phone Factor, gives an attacker the ability to hijack the first moment of the encrypted conversation between a Web browser and a Web server. This allows the attacker to add a command of his own, which could be as serious as an order to withdraw money from the victim’s account. One security researcher demonstrated the attack on Twitter, showing that the flaw could be used to command the server to reveal a user’s password.

“The reason it’s striking is that it’s actually a TLS error, or at least arguably so,” says Eric Rescorla, a security consultant at a company called RTFM and one of the authors of the draft fix to the protocol. Rescorla says the flaw shows how difficult it actually is to design security protocols for the Internet.

To make use of the flaw, an attacker would first have to set up a “man in the middle attack” and intercept traffic between the client and the server. This might be done by hijacking a particular server on the Internet, for example.

The attacker could then exploit a feature of TLS called “renegotiation,” which allows a Web server or client to change some of the parameters of an encrypted session while that session is happening. Dispensa explains that the protocol does not make sure that the parties communicating after renegotiation are the same ones as before.

Ray and Dispensa admit that exploiting the flaw would require considerable technical skill, but they say it is significant because it affects servers and clients even if they’ve implemented the protocol perfectly. “It’s pretty clear that nobody understood this property of TLS,” Rescorla says.

Frank Breedijk, a security professional at a provider of mission critical outsourcing services called Schuberg Philis, based in the Netherlands, says that Rescorla’s draft does fix the protocol, but notes that it effectively creates two versions of TLS. If either the client or the server haven’t yet installed the fix, he says, the attack is still possible. “TLS/SSL clients and servers are omnipresent,” he says. “It’s not just browsers and Web servers. Mobile phones, wireless access points, DECT phones, home security systems, and so on, all have the technology in them.”

“If you believe that you need SSL at all, then you need this fixed,” says Ben Laurie, a founding director of the Apache Software Foundation and an OpenSSL developer.

That may be easier said than done, however.

Ray and Dispensa disclosed the flaw to affected vendors in late September, and Laurie says it’s been “no big deal” to write software that fixes it. What’s tricky, he says, is getting the patch installed everywhere it needs to be. The fix is “unprecedented,” Laurie says, because no one is fully protected until both the client and the server have installed the patch. As a result, browser makers working to fix the problem have to allow for a period when the client will continue to communicate with unpatched and possibly vulnerable servers.

“You can’t have the clients say, ‘Evil old server, can’t connect to that,’ because that would break the whole world,” Laurie says. This means that a second patch will have to be applied to clients later, when experts determine that enough servers have been patched.

The process of getting out all the patches is complex enough that Joe Salowey, TLS working group cochair and a technical leader at Cisco Systems, believes it will be a year or more before the fix will be fully in place.

Keep Reading

Most Popular

This new data poisoning tool lets artists fight back against generative AI

The tool, called Nightshade, messes up training data in ways that could cause serious damage to image-generating AI models. 

Rogue superintelligence and merging with machines: Inside the mind of OpenAI’s chief scientist

An exclusive conversation with Ilya Sutskever on his fears for the future of AI and why they’ve made him change the focus of his life’s work.

The Biggest Questions: What is death?

New neuroscience is challenging our understanding of the dying process—bringing opportunities for the living.

Data analytics reveal real business value

Sophisticated analytics tools mine insights from data, optimizing operational processes across the enterprise.

Stay connected

Illustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at with a list of newsletters you’d like to receive.