46 min listen
Episode 19: Cross-Protocol Attacks on TLS with ALPACA!
FromCryptography FM
ratings:
Length:
42 minutes
Released:
Jul 12, 2021
Format:
Podcast episode
Description
TLS is an internet standard to secure the communication between servers and clients on the internet, for example that of web servers, FTP servers, and Email servers. This is possible because TLS was designed to be application layer independent, which allows its use in many diverse communication protocols.
ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. Attackers can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.
Links and papers discussed in the show:
* ALPACA Attack Website (https://alpaca-attack.com/)
Music composed by Toby Fox and performed by Sean Schafianski (https://seanschafianski.bandcamp.com/). Special Guests: Marcus Brinkmann and Robert Merget.
ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. Attackers can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.
Links and papers discussed in the show:
* ALPACA Attack Website (https://alpaca-attack.com/)
Music composed by Toby Fox and performed by Sean Schafianski (https://seanschafianski.bandcamp.com/). Special Guests: Marcus Brinkmann and Robert Merget.
Released:
Jul 12, 2021
Format:
Podcast episode
Titles in the series (24)
Episode 3: BLAKE3, A Parallelizable Hash Function Using Merkle Trees!: Jack O'Connor and Jean-Philippe Aumasson discuss how Merkle Trees make the new BLAKE3 hash function special, and talk about the design process for the BLAKE family of hash functions in general. by Cryptography FM