Stories
Slash Boxes
Comments

SoylentNews is people

posted by CoolHand on Thursday May 21 2015, @06:20AM   Printer-friendly
from the vulnerability-of-the-week dept.

There's a new TLS protocol security vulnerability found that can be exploited using protocol downgrade that was left in place due to previous U.S. government export restrictions its been named "Logjam". It affects servers supporting the Diffie-Hellman key exchange, and it's caused by export restrictions mandated by the U.S. government during the Clinton administration. "Attackers with the ability to monitor the connection between an end user and a Diffie-Hellman-enabled server that supports the export cipher can inject a special payload into the traffic that downgrades encrypted connections to use extremely weak 512-bit key material. Using precomputed data prepared ahead of time, the attackers can then deduce the encryption key negotiated between the two parties."

Internet Explorer is the only browser yet updated to block such an attack — patches for Chrome, Firefox, and Safari are expected soon. The researchers add, "Breaking the single, most common 1024-bit prime used by web servers would allow passive eavesdropping on connections to 18% of the Top 1 Million HTTPS domains. A second prime would allow passive decryption of connections to 66% of VPN servers and 26% of SSH servers. A close reading of published NSA leaks shows that the agency's attacks on VPNs are consistent with having achieved such a break." Here is their full technical report (PDF).

Time for a complete overhaul?

[Update: Thanks to Canopic Jug for locating and providing a link to the Common Vulnerabilities and Exposures entry CVE-2015-4000; check there for official information and updates.]

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 0) by Anonymous Coward on Thursday May 21 2015, @11:40AM

    by Anonymous Coward on Thursday May 21 2015, @11:40AM (#185993)

    that SSL and TLS are a battlefield of special interests and have been so thoroughly compromised, that its meaningless to call SSL for "security measure" anymore.

    Dont get me wrong, that math is probably fine, the methods are tested, the review is rigorous. (boy i hope so)

    BUT THE IMPLEMENTATIONS ARE COMPROMISED. And the moment there comes one that isn't, people in civilian clothes come and infiltrate it and then its same story as OpenSSL...

    There can be no definitive technical solution to this social problem, only can and mouse games. We can patch, we can fork, They will come, They will infiltrate and compromise. Software like that is too valuable not to compromise...

    I think +Fravia was right all along, we are heading into new dark ages. Boot, meet face.

  • (Score: 2) by Yog-Yogguth on Saturday May 23 2015, @12:46AM

    by Yog-Yogguth (1862) Subscriber Badge on Saturday May 23 2015, @12:46AM (#186729) Journal

    A lot of the math is wishful thinking or assumptions, at least that is the impression I've been left with recently [ams.org] (same link as in the journal post I made earlier).

    --
    Bite harder Ouroboros, bite! tails.boum.org/ linux USB CD secure desktop IRC *crypt tor (not endorsements (XKeyScore))