SSL/TLS 1.0 broken

Post » Wed Sep 21, 2011 10:01 pm

http://www.theregister.co.uk/2011/09/19/beast_exploits_paypal_ssl/

Researchers have discovered a serious weakness in virtually all websites protected by the secure sockets layer protocol that allows attackers to silently decrypt data that's passing between a webserver and an end-user browser.

The vulnerability resides in versions 1.0 and earlier of TLS, or transport layer security, the successor to the secure sockets layer technology that serves as the internet's foundation of trust. Although versions 1.1 and 1.2 of TLS aren't susceptible, they remain almost entirely unsupported in browsers and websites alike, making encrypted transactions on PayPal, GMail, and just about every other website vulnerable to eavesdropping by hackers who are able to control the connection between the end user and the website he's visiting.

...

At the moment, BEAST requires about two seconds to decrypt each byte of an encrypted cookie. That means authentication cookies of 1,000 to 2,000 characters long will still take a minimum of a half hour for their PayPal attack to work. Nonetheless, the technique poses a threat to millions of websites that use earlier versions of TLS, particularly in light of Duong and Rizzo's claim that this time can be drastically shortened.

In an email sent shortly after this article was published, Rizzo said refinements made over the past few days have reduced the time required to under 10 minutes.


This comes after the rampant fraudulent ssl cert problems of DigiNotar, Comodo, and GlobalSign. There's also been many attacks on SSL before such as SSL Strip, a MiTM attack that removes SSL encryption from requested pages, usually without the user ever being aware (always pay attention to make sure your ssl connection has the s ;)). The current attack doesn't seem really capable of doing much against SSL VPNs (such as OpenVPN) due to its slow nature, but that can change in the future.

All this seriously undermines the infrastructure used to create secure transactions over the Internet.
User avatar
Tyler F
 
Posts: 3420
Joined: Mon Aug 27, 2007 8:07 pm

Post » Thu Sep 22, 2011 9:50 am

Yeah, I read about that the other day. I read that v1.1 and 1.2 aren't affected (edit: which your quote says. Facepalm, etc), but most sites still use 1.0... but I must admit to getting a major case of "security fatigue". No doubt I'll be quickly cured if it comes back and bites me on the backside, which hopefully won't happen, but it does seem that problems are cropping up at a high rate these days and it's becoming difficult to ascertain which are important and which are mostly theoretical.
User avatar
danni Marchant
 
Posts: 3420
Joined: Sat Oct 07, 2006 2:32 am

Post » Thu Sep 22, 2011 7:59 am

:shrug:

There's no need to panic, it's not like we can all expect to be hacked. The hackers still need to get the data being passed between you and the server, and if they are able to do that then a glitch in SSL/TLS is the least of your worries.
User avatar
Melissa De Thomasis
 
Posts: 3412
Joined: Tue Feb 27, 2007 6:52 pm

Post » Thu Sep 22, 2011 5:57 am

Well, while I'm sure this is going to cause a small degree of panic amongst internet users, the actual impact is negligible. Most "hackers" rely on social engineering and spam to carry out their schemes as individual attacks just aren't that profitable (i.e. it is much more efficient for them to trick you into giving them your PayPal account info then it is for them to try and intercept and decode packets).
User avatar
flora
 
Posts: 3479
Joined: Fri Jun 23, 2006 1:48 am


Return to Othor Games