RFC Errata
RFC 6176, "Prohibiting Secure Sockets Layer (SSL) Version 2.0", March 2011
Note: This RFC has been updated by RFC 8996
Source of RFC: tls (sec)
Errata ID: 5520
Status: Rejected
Type: Editorial
Publication Format(s) : TEXT
Reported By: Eugene Adell
Date Reported: 2018-10-11
Rejected by: EKR
Date Rejected: 2018-10-11
Section 2 says:
o Sessions can be easily terminated. A man-in-the-middle can easily insert a TCP FIN to close the session, and the peer is unable to determine whether or not it was a legitimate end of the session.
It should say:
o Sessions can be easily terminated. A man-in-the-middle can easily insert a TCP FIN to close the session, and the peer is unable to determine whether or not it was a legitimate end of the session. o The root certificate authority keys are overexposed. The server sends only one certificate signed by a root certificate authority, which means a frequent use of this authority keys for signing new certificates. This use can lead to key loss and the compromise of all certificates previously signed including the root certificate.
Notes:
Adding a deficiency.
Recent history showed that well-known authorities could loose their keys and it had a wide impact on security.
SSL 2.0 limits the certificate handshake message to one single certificate, thus making it impossible to send a certificate chain.
A certificate chain doesn't completely prevent key loss, but it gives more protection to the root certificate keys which can be stored and hidden until we need them again, which is much less often than without chaining.
--VERIFIER NOTES--
This isn't an error in the original document. It's new text you want to add.