-
-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
HSTS-like feature to prevent end user from clicking through a TLS certificate warning (Anti MITM) #6224
Comments
I think before something like this makes sense, #4544 needs to be implemented. Otherwise, I think server admins will run into issues when they have to renew their certificate. |
I did skim #4544, but it seemed to me that it was targeting an issue outside of the scope of ensuring the user not being able to bypass a trusted TLS channel (which is protecting all keys transmitted after that) and into the realm of securing self signed root certificates by cross-signing. This applies to that the domain contacted in the hostname field should always have a trusted certificate assigned to it. It would not pin to more than the hostname defined by the server (and shown in the signed certificate). HTTP-related, but still decent info: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security Ideally for this HSTS-like flag you can rely on the host OS vendor to provide the trusted root & the server operator to provide the trusted leaf certificate + chain to the user (how it currently functions, if you're using TLS via QT's verification), rather than needing to "roll your own" cryptographic trust system (which has bitten other projects with vulnerabilities in the past, and adds a lot of complexity!) that seems to be part of #4544 As far as some of the details, the flag should probably not be the default (as it isn't in many web server implementations, to prevent server operators from shooting themselves in the foot), and should probably be user-clearable per server in the event the of a mess up server-side (like clearing all the offline browser cache for a site in firefox or such). You can transmit the flag over the TLS channel after the first connection from server to client. You then just have to have the client prevent bypass of TLS trust for that hostname. Eliminates a security risk that most end users won't understand the consequences of clicking through. Thanks for the reply! |
This future is an ABSOLUTE MUST NOWADAYS, especially in installations where Mumble is used for more sensitive conversations than gaming. It should be controlled by dedicated option in murmur.ini. |
Context
TLS/SSL Security / Remote Server authentication / Anti MITM
Description
Ideally, the server owner should be able to set a flag server side to force client-side TLS signature verification for a configurable & refreshing period of time (like HSTS).
This would not be intended to prevent all MITM scenarios, as the flag could in theory be unset by an attacker on first connection, but the user would still get a warning of the event.
Screenshot shows current behavior, which should probably remain the default server-side to keep the software accessible (unless you want the user to be able manually cache the untrusted certificate fingerprint first, then enable strict verification every connection post that initial event).
Thanks for everything!
Mumble component
Both
OS-specific?
No
Additional information
No response
The text was updated successfully, but these errors were encountered: